{"title":"Enhancement of Quality of Service in Mobile Ad-Hoc Networks using Hybrid Load Balanced Simulator: Annealing Simulated","authors":"Anil Kumar, R. Shukla, R. Shukla, Shelendra Pal","doi":"10.1109/SMART55829.2022.10046821","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10046821","url":null,"abstract":"Wireless topologies can change rapidly and unexpectedly. Hybrid networks are connected by gateways, which act as entry points for all traffic. Some gateways may be subject to high traffic loads and therefore may be overloaded. To compare the performance of the proposed work, various parameters including end-to-end latency, power consumption, and throughput are considered. Load Balancing Hybrid Simulator (LBHS) is an algorithm used in this paper to distribute traffic load among multiple gateways to solve load balancing problems in MANET. It combines a Hybridge Annealing Simulation (HAS) network technology with Decentralized Random Search (DRS). A network that supports QoS in MANET. The Dominant Minimal Set (DMS) problem is solved using AS. The DSS heuristic algorithm provides an algorithm with a simple structure and a high degree of exploration. In addition to faster convergence than other algorithms, it also implements an axiomatic algorithm to ensure the diversity of agents and avoid falling into local optimum. The test results show that the proposed Hybridge Annealing Simulated Decentralized Random Search (HAS-DRS) procedure performs better than the dominated connection set (DCS).","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133677210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biometric System based on Eyelid Detection Innovation","authors":"J. Sahoo, Pooja Gupta","doi":"10.1109/SMART55829.2022.10046727","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10046727","url":null,"abstract":"A biometric system can automatically identify a person by using a feature or attribute that is unique to that person. This can be accomplished through the use of a biometric. The system is the one that does this identification. It is generally agreed upon that iris recognition is the most reliable and accurate kind of biometric authentication that is currently available on the market [4], [6]. The eyelid, in conjunction with the eyelashes, can commonly hide a sizeable section of the iris. This is especially noticeable in people with blue eyes. Our method offers an innovative approach to the process of iris detection by making use of curve fitting in the analysis process. Iris recognition has the potential to be used in a broad number of settings, some examples of which include electronic commerce, information security, and door access control systems.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117294933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Suhail Javed Quraishi, Rubina Liyakat Khan, Tanvir Mahmoud Hussein, Vineet Saxena, Sushovan Chaudhury, A. Rastogi
{"title":"A Study of Optimized Proposed Model for Gateway Congestion Control","authors":"Suhail Javed Quraishi, Rubina Liyakat Khan, Tanvir Mahmoud Hussein, Vineet Saxena, Sushovan Chaudhury, A. Rastogi","doi":"10.1109/SMART55829.2022.10047440","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047440","url":null,"abstract":"A congestion control mechanism is needed to balance the network load to prevent pack drops and avoid network deadlocks. The main purpose is to analyze efficient and reliable congestion control methods which will reduce the weaknesses in various existing congestion control methods and propose a framework to minimize the gateway congestion in the network. As the demand of heterogeneous users of computer network day by day dynamically and rapidly changing in many aspects, grounded on the application situations our congestion control mechanism functions well in the situations that occur in Internet. The maximum degree of dynamics can be handle efficiently by keeping the generality of its existing end-to-end solution in our congestion control design.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117156328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prediction of Stress using Machine Learning and IoT","authors":"Amit Jain, Muskan Kumari","doi":"10.1109/SMART55829.2022.10046907","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10046907","url":null,"abstract":"Stress is considered as the leading problem in healthcare. This paper is about a brief review of machine learning Algorithms and IoT, and their roles in the prediction of stress. A lot of research has been done by researchers in the prediction of stress by taking reference to previous research we compare SVM and KNN accuracy and performanceon the basis of PSS (perceived stress scale), EDR and ECG. This paper discusses ML Techniques that are implemented on the Internet of things (IoT) nowadays. Also, emphasis has been laid on identifying the causes, symptoms of stress along with studying the existing Machine Learning algorithms related to Stress.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120891398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Graph Family Characterization using the Path Length Array","authors":"Pardeep Kumar, Sanjay Arora","doi":"10.1109/SMART55829.2022.10046959","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10046959","url":null,"abstract":"Distance-based definition of graph families the range in between nodes or sides here on network is known as the shortest route size between both two nodes or sides. The degree of a specific edge is defined as the total number pf triangles that surround that apex. The node e sequence's length level series () is the quantity of nodes but rather vertices at a length I from v, where () = 0(), 1(),…,()(). Here, utilizing their distance extent sequence, they have covered the creation and classification of total circles, cycles of extremely weird and now even dimensions, and complete PPI network 2. In addition, some of the findings have really been provided with methodologies.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121166130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuvraj Sanjayrao Takey, Sai Gopal Tatikayala, M. U. Patil, Lakshmi Eswari P. R, Satyanadha Sarma Samavedam
{"title":"Real Time Multistage Attack Detection Leveraging Machine Learning and MITRE Framework","authors":"Yuvraj Sanjayrao Takey, Sai Gopal Tatikayala, M. U. Patil, Lakshmi Eswari P. R, Satyanadha Sarma Samavedam","doi":"10.1109/SMART55829.2022.10047248","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047248","url":null,"abstract":"Organizations regardless of their size are rapidly transforming, adopting and embracing digitalization amid the COVID pandemic. The pandemic forced organizations to ratio- nalize offline operations and swift towards online operations. Many organizations have digitized their services and have witnessed increasing Multistage cyber-attacks. Further, a lot of organizations have enabled remote access to the enterprise resources and services. As a result, organizations are striving to defend against Multistage cyber-attacks. These multistage attacks often spread across many stages, which is best described by MITRE Adversarial Tactics, Techniques, and Common Knowl- edge (ATT&CK) Framework. There are many research efforts for static detection of malicious binaries but very few or limited research targeting run-time detection of malicious processes in the system. Detection of these malicious processes are key for identifying new variants of multistage attacks or malware in the real world. This paper proposes a system for detecting multistage attacks in real-time or run-time by leveraging Machine learning and MITRE ATT&CK Framework. Machine learning facilitates detecting the malicious process in the system, and the MITRE ATT&CK framework offers insight into adversary techniques. Combination of these two is very effective in detecting multistage attacks and identifying individual stages. The proposed system shows promising results when tested on real-time/latest malware. Test result shows that our system can achieve 95.83% of accuracy. This paper discusses the challenges in detection of runtime malware, dataset generation","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114731043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Retinal Detachment Severity using RDidean Evaluative System and Classifier Assessment Implementation Models","authors":"L. Poongothai, K. Sharmila","doi":"10.1109/SMART55829.2022.10046999","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10046999","url":null,"abstract":"Vision loss can be a permanent disability of a human, that could be attributed to due to Retinal Detachment (RD). This is perilous disorder that could be caused due to dealignment of the layers in a retina. The choroid supplies oxygen and nutrients to the outer segments of the photoreceptors. The retina's photoreceptors will stop working if the choroid separates from the retina. The degree of dependence on the choroid is high, due to its supply of oxygen to the fovea that increases the breathability of the retinal blood vessels. This tapering of the oxygen levels can paramount to macula detachment that can be an irreversible damage to the cones and rods at the posterior pole, thereby leading to blindness. If the retina is quickly reattached, good vision can be preserved even if the macula is not removed. Retinal detachment hitherto has been studied through conceptual data processing and image processing techniques. However, this paper analyzes the retinal detachment for an individual through the various features, and the same is encompassed in an equational form to be termed as the “RDidean” evaluative system. The evaluative model thus explicitly categorizes the retinal database into normal and abnormal images based on the value obtained from the system. The performance of this system is then effectuated through diverse tree classifier models and the deep learning AlexNet classifier in MATLAB to comprehend the precision of classification. While effectively entailing another pool of algorithmic models like the SVM variations and the Naïve Bayesian methods to cognize the accuracy of retinal detachment severity that the evaluative system rendered. This indagation analyzes focusses to establish a corroborative and impeccable prediction system for the classification of normal and abnormal eye through color fundus images. Thereby aiding to improve the ergonomic environment of clinicians to improve the treatment plan, along with delivering complementary clinical decisions, and in institutionalizing affordability for patients through optimal cost for agnizing retinal detachments.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115319143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Valuation of Mergers and Acquisitions","authors":"Vipin Kumar, Priyanka Jain","doi":"10.1109/smart55829.2022.10047079","DOIUrl":"https://doi.org/10.1109/smart55829.2022.10047079","url":null,"abstract":"In the business area of India mergers and acquisitions are expanding fundamentally. Indian organizations are taking their oppositions to the next level by procuring unfamiliar organizations while permitting unfamiliar financial backers to put resources into India. The Indian business area is liable to relentless rivalry, subsequently, they have become inseparable from instruments that assist in enduring the market. Business rebuilding have frequently come about emphatically because of an expansion in the effectiveness and maintainability of the organizations. Because of globalization, numerous organizations advanced towards the Indian business area and the Indian organizations continued procuring unfamiliar foundations. Organizations are more worried about protecting their worth on the lookout because the business world has turned aggressive. Exchanges of offer or acquisition of any foundation request a computation of having fair worth which console partners and regulators. In these computation of having fair worth should be possible by different strategies. Paper talk about the valuation required during mergers and acquisitions.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121181363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joel Alanya ‒ Beltran, Jesús Padilla-Caballero, F. A. Ochoa Tataje, Claudia Poma ‒ Garcia, Adolfo Perez ‒ Mendoza, Trishu Sharma
{"title":"Implementation and Execution of Block Chain Technology in the Field of Education","authors":"Joel Alanya ‒ Beltran, Jesús Padilla-Caballero, F. A. Ochoa Tataje, Claudia Poma ‒ Garcia, Adolfo Perez ‒ Mendoza, Trishu Sharma","doi":"10.1109/SMART55829.2022.10047800","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047800","url":null,"abstract":"Occupational category or education professionals at all degrees have always been drawn to emerging innovations in order to maximize their potential for working hard and enriching the experiences of teaching and learning of both instructors and students. The increased usage of Big Data, Business Intelligence, and Intelligent Systems are a few of the breakthroughs. The usage of Block chain technology is another emerging field that is receiving attention from the education industry. The contribution to the Ir4.0 phenomena is the Block chain. It is a new technology that operates according to the autonomy and dispersion principles. The book “Block Chain Uses for School,” edited in Ramesh Vijay Yadav, Hadi Heidari, and GulsunKurubacak, was thoroughly reviewed in the article. It is among the few books that highlights the use of bitcoin technology in the classroom. The writers of the corresponding pages include a variety of potential Public Block chain management for schooling application. Additionally, the eBook focuses on managing institutions databases employing block chain, which increases the validity and safety of school data related to diplomas and grading sheet by enabling failsafe verification for all shareholders. In a couple of the pages, it is discussed how open and remote institutions of learning may handle large data using block chain. The book is essential reading for anybody involved in creating educational policies, putting them into practise, or studying education in general since it offers fresh perspectives on the numerous facets of this relatively recent field of technology application in education. This would assist students in changing how they see educational procedures.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125260790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Graph Database-Based Method for Network Log File Analysis","authors":"K. Sharma, Arvind Kumar","doi":"10.1109/SMART55829.2022.10047250","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047250","url":null,"abstract":"It is frequently required to evaluate data acquired from numerous network logs in order to offer a more accurate judgement of the severity of a cyber threat. This may be accomplished by reviewing the data. One example would be the examination of log records produced by command line tools in solitary confinement. In spite of the fact that employing a log management system makes it simpler to identify certain log documents, it might be time-consuming to examine all of them in order to determine the connection(s) between the different types of network activity. To construct these bridges, we may make use of relational databases by, for example, linking the tables by using complicated database queries that make use of a large number of join processes. Recent years have seen a rise in interest in the use of graph databases as a method for the storage and organization of data in preparation for semantic searches.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124341523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}