{"title":"A Review of An Idea For Secure Resource Usage And Load Balancing Using Integrated Cloud Computing Strategies","authors":"Ruchika, Dhiraj Khurana","doi":"10.1109/ICAC3N56670.2022.10074570","DOIUrl":"https://doi.org/10.1109/ICAC3N56670.2022.10074570","url":null,"abstract":"In this study, numerous cloud computing load balancing algorithms are examined, and important difficulties that must be considered while building new load balancing algorithms are also explored. Various measurement criteria, such as performance, scalability, throughput, resource usage, fault tolerance, reaction time, and others, are studied in the literature to compare current static and dynamic load balancing methods. Cloud computation offloading and work schedules have been the subject of some research. Degrading cloud computing performance is a major concern for cloud enterprises of the huge amount of data and varied sources inside this cloud that must be managed. To maximize system performance and reduce carbon emissions, load balancing aims to use resources in the most efficient way possible while minimizing the number of resources used. This paper focuses on cloud computing load balancing strategies. Several qualitative factors, including throughput, reliability, energy-saving features, performance, scalability, and associated overhead, are considered to examine, and compare the present techniques of load balancing.","PeriodicalId":342573,"journal":{"name":"2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128727078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Intrusion Detection System using ML","authors":"Raghav Kumar, Abdul Haq Nalband","doi":"10.1109/ICAC3N56670.2022.10074106","DOIUrl":"https://doi.org/10.1109/ICAC3N56670.2022.10074106","url":null,"abstract":"Technologies are making our life easier and simple, but it has both positive and negative effect. Many new methods of cybercrimes are coming which cannot be solved using earlier conventional method like using firewalls, antivirus, old ML algorithms. In recent years every device whether it’s hardware or software is being connected with IOT. Hence, there is huge growth in data also their privacy is huge concern for industries. In this model, we are implementing Network Intrusion detection system using Machine learning algorithms which would resolve security problems using KNN, SVM, LR, RF, DT and Gaussian NB with greater efficiency. Our system uses both supervised and unsupervised machine learning techniques. Both misuse and Anomaly based detection to detect malware and viruses, our system is capable to detect both known and unknown attacks. In case of misuse detection system known attacks are being easily identified using a database where list of all known attacks is available. If any attack happens on network system, then NIDS checks whether the attack is listed in dataset or not. If attack is known, then system administrator gets notified. If attack is unknown, then NIDS uses outlier detection to identify attack using several machine learning algorithms like clustering and other techniques. So, with the help of above-mentioned techniques attack is being detected. Our model improves the attack detection mechanism with high accuracy and less prediction time. It is better than previous conventional machine learning algorithms. Our model is broadly accepted in companies and organization. it is fulfilling the cyber security issue also threat prediction time of our model is quite improved and the prediction time is reduced as compared to previous model.","PeriodicalId":342573,"journal":{"name":"2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128578349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Proposed Sentiment Analysis Model for Product Reviews on Social Media","authors":"Asha Patel, Bhavesh Patel, Meghna Patel","doi":"10.1109/ICAC3N56670.2022.10074561","DOIUrl":"https://doi.org/10.1109/ICAC3N56670.2022.10074561","url":null,"abstract":"E-commerce, social medias, forums, blogs etc. become more popular among general public. Nowadays people use this social media platforms to recognize \"general public thinking what\" and \"what was their experience\" before buying any product. Internet contains huge amount of user’s data which is available in various form like comments, opinions and reviews regarding various products, services and events. This trend of reading review data from the internet is constantly growing day by day. People’s reviews or opinions which are available on the internet are unstructured. So it creates difficulty at the time of reviewing huge amount of data for both customers and Business Organization to get cumulative result with high rate of accuracy. So extracting and analyzing the useful things from this reviews content becomes challenging task. As a result, customers and Business Organizations need an automated sentiment analysis system. The proposed sentiment analysis model helps customers to take quick decision about any product or services and the Business Organizations to increase the quality of the product by getting clear idea about their product from the customer point of view.","PeriodicalId":342573,"journal":{"name":"2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124748422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Ch, Ravi Sankar Miriyala, Praveena V, V. B. Sri, Bhaavan Sri Sailesh A, R. K
{"title":"Performance Evaluation of OFDM System: With and Without Reed-Solomon Codes","authors":"V. Ch, Ravi Sankar Miriyala, Praveena V, V. B. Sri, Bhaavan Sri Sailesh A, R. K","doi":"10.1109/ICAC3N56670.2022.10074060","DOIUrl":"https://doi.org/10.1109/ICAC3N56670.2022.10074060","url":null,"abstract":"By employing multiple subcarriers within a single channel, Orthogonal Frequency Division Multiplexing (OFDM), a numerical multi-carrier variation method, enlarges the idea of sole subcarrier modulation. Instead of using a single subcarrier to transmit a high-rate stream of data, OFDM incorporated with abundant orthogonal subcarriers that are distributed synchronously. With the help of modulation algorithm (BPSK, QPSK), every subcarrier is modulated at a lower symbol rate. Though within identical bandwidths, the combining of several subcarriers permits data speeds comparable to those of traditional single-carrier modulation techniques. Hence, an efficient channel coding is required for improvising error correction capability in OFDM. Reed Solomon (RS) codes, which have strong error-correcting capabilities, were chosen as an effective channel coding scheme. As a result, the goal of this work is to create a channel coding scheme based on RS code that has been suggested to enhance the performance of OFDM. The proposed scheme has been studied over AWGN fading channel for various modulation techniques. The performance evaluation has been done based on BER analysis of proposed scheme with and without RS channel coding. The simulation results clearly depict that, the BER has been improved for the OFDM with RS channel coding.","PeriodicalId":342573,"journal":{"name":"2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126820754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. K. Sahoo, Jitendra Pramanik, S. Jayanthu, Abhaya Kumar Samal
{"title":"Slope Stability Predictions using Machine Learning Techniques","authors":"A. K. Sahoo, Jitendra Pramanik, S. Jayanthu, Abhaya Kumar Samal","doi":"10.1109/ICAC3N56670.2022.10074079","DOIUrl":"https://doi.org/10.1109/ICAC3N56670.2022.10074079","url":null,"abstract":"The geotechnical analysis is considered to be an important aspect in providing a safe mine working environment. It not only covers the active monitoring of open pit walls but also effectively predicts the slope deformations and failures. The approach or method used in slope failure is considered to be legitimate when it predicts the time of failure of slope prior to its actual failure. This research plays a paramount role in mitigating the risk associated with slope failure. The aim of this study is to demonstrate the application of the Machine Learning technique to effectively predict the occurrence of slope failure. Specifically, random forest, support vector classifier, and logistic regression algorithms are employed to assess the stability of the slopes. The dataset included in the study uses cohesion, angle of friction, and unit weight of the designed slopes. The performance of the implemented machine learning models for the factor of safety (FOS) prediction is analysed and compared.","PeriodicalId":342573,"journal":{"name":"2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123147162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of Fake News Using Machine Learning Approach","authors":"Gurupraksh Singh, Brijendra Yadav, Bhuvnesh Pratap Singh, Shelja Sharama","doi":"10.1109/ICAC3N56670.2022.10074374","DOIUrl":"https://doi.org/10.1109/ICAC3N56670.2022.10074374","url":null,"abstract":"In today’s world everyone is using internet and Social media platforms like Instagram, Twitter, Facebook etc. In such scenario fake news spreads very rapidly and reaches to millions of user in a short span of time. Riots during election, riots between different religious groups are consequences of these fake news. Many political parties utilize false information to boost their vote totals. Machine learning is important for classification of data, but it has limitations. On the basis of the kaggle dataset, a model has been suggested to classify fake and authentic news in this project. Our technology will be programmed to discern between fake and legitimate news from various social media platforms. It also aims to distinguish genuine news from a variety of sources. Our research looks into several textual qualities that can be used to tell the difference between phoney and real content. We use machine learning algorithms, such as the Passive Aggressive classifier using TF-IDF, to train our model utilizing those properties.","PeriodicalId":342573,"journal":{"name":"2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123323878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Lightweight Group Authentication scheme over Lattices","authors":"Sunil Prajapat, Pankaj Kumar, Vishnu Sharma","doi":"10.1109/ICAC3N56670.2022.10073990","DOIUrl":"https://doi.org/10.1109/ICAC3N56670.2022.10073990","url":null,"abstract":"Authentication has advanced in various fields; however, numerous authentication systems are induced via conventional cryptographic natives. Such natives don’t make it broadly acknowledged and impenetrable to quantum calculations. Under any circumstances, these schemes assist in the instance of a single user. Following the recently suggested glitches, we propose a lattice-based group authentication scheme. The proposed scheme is protected from replay attacks and man-in-the-middle attacks. Similarly, differentiated and existing lattice-based authentication schemes provide the most useful strategy for agreeing on session keys among a huddle of users, followed by our shared authentication.","PeriodicalId":342573,"journal":{"name":"2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)","volume":"34 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123362148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Improving Productivity of Crop & Enriching Farmers Using IoT Based Smart Farming","authors":"Uzmay Aseen Bhat, M. Thirunavukarasan, E. Rajesh","doi":"10.1109/ICAC3N56670.2022.10074418","DOIUrl":"https://doi.org/10.1109/ICAC3N56670.2022.10074418","url":null,"abstract":"Smart agriculture one about most essential Internet about Things applications. Smart agriculture conserves water& fertilizers while increasing agricultural yield. Temperature, moisture,& humidity are manually sensed in present agricultural system, which raises personnel costs, takes time,& prevents continuous monitoring. IoT (Internet about Things)-based agricultural convergence technology that adds value towards entire agricultural production process through improving production efficiency & increasing quality about agricultural goods. Furthermore, using convergence technology towards execute precision agriculture, which an alternative towards future agriculture, enables for supply & demand forecasting, real-time management , & quality assurance across life cycle about agricultural goods. We conduct research on referenced title & give our findings inform about this note.","PeriodicalId":342573,"journal":{"name":"2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121290678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Taxonomy on Man-in-the-Middle Attack in IoT Network","authors":"Devpriya Panda, Brojo Kishore Mishra, Kavita Sharma","doi":"10.1109/ICAC3N56670.2022.10074170","DOIUrl":"https://doi.org/10.1109/ICAC3N56670.2022.10074170","url":null,"abstract":"Recent trends in IoT networks suggests that the more the use of IoT devices, the more the threat to the network. There are various threats posed by the attackers on this type of networks. In this work we have identified Man-in-the -Middle attack for study and understand its effect on the networks like IoT, IoMT, VANET etc. Various authors have suggested several ways to mitigate the attack. Some of them have used some Machine learning techniques such as Random Forest, Decision Trees and deep learning techniques. After analyzing the works of various authors, we have tried to identify some topics for further investigation and then we would try to summarize the study in the conclusion.","PeriodicalId":342573,"journal":{"name":"2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)","volume":" 115","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113948693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Ganesan, Challapalli Manoj, Viswanathan Ramaswamy, Talluru Tejaswi, T. Akilan, Gutta Ajay Kumar
{"title":"Food Safety Checking Measures by Artificial Intelligent IOT","authors":"V. Ganesan, Challapalli Manoj, Viswanathan Ramaswamy, Talluru Tejaswi, T. Akilan, Gutta Ajay Kumar","doi":"10.1109/ICAC3N56670.2022.10074055","DOIUrl":"https://doi.org/10.1109/ICAC3N56670.2022.10074055","url":null,"abstract":"Agriculture is a vital commodity for developing countries like India, concerns itself with food safety and food security. Agricultural practices should ensure that food products are healthy for consumption and sustainable to the environment, while maintaining or even increasing the production quantities to provide for the growing population. The smart farming technologies and organic farming allows the improvements of food safety and security at the same time. The food industry is continuously challenged by the occurrences of food borne diseases. This system aims at eliminating the loss of food that is fit for consumption by humans during the storage and passage of the food chain. Food chain typically starts from the farm where it is harvested and then transported to the store houses and then to markets and finally ends up in your table. While there are multiple factors in ensuring food safety, this system aims at monitoring pathogenic presence and controlling the spread of these pathogens to minimise the loss by using Internet of things or (IoT) systems which is a low-cost solution to farmers to monitor the pathogens in the food remotely . This system helps to optimize the cost of food for the user and maximizes the benefit to farmers","PeriodicalId":342573,"journal":{"name":"2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114744218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}