2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)最新文献

筛选
英文 中文
Enhancement of Quality of Service in Mobile Ad-Hoc Networks using Hybrid Load Balanced Simulator: Annealing Simulated 利用混合负载均衡模拟器提高移动自组网服务质量:退火模拟
Anil Kumar, R. Shukla, R. Shukla, Shelendra Pal
{"title":"Enhancement of Quality of Service in Mobile Ad-Hoc Networks using Hybrid Load Balanced Simulator: Annealing Simulated","authors":"Anil Kumar, R. Shukla, R. Shukla, Shelendra Pal","doi":"10.1109/SMART55829.2022.10046821","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10046821","url":null,"abstract":"Wireless topologies can change rapidly and unexpectedly. Hybrid networks are connected by gateways, which act as entry points for all traffic. Some gateways may be subject to high traffic loads and therefore may be overloaded. To compare the performance of the proposed work, various parameters including end-to-end latency, power consumption, and throughput are considered. Load Balancing Hybrid Simulator (LBHS) is an algorithm used in this paper to distribute traffic load among multiple gateways to solve load balancing problems in MANET. It combines a Hybridge Annealing Simulation (HAS) network technology with Decentralized Random Search (DRS). A network that supports QoS in MANET. The Dominant Minimal Set (DMS) problem is solved using AS. The DSS heuristic algorithm provides an algorithm with a simple structure and a high degree of exploration. In addition to faster convergence than other algorithms, it also implements an axiomatic algorithm to ensure the diversity of agents and avoid falling into local optimum. The test results show that the proposed Hybridge Annealing Simulated Decentralized Random Search (HAS-DRS) procedure performs better than the dominated connection set (DCS).","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133677210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometric System based on Eyelid Detection Innovation 基于眼睑检测创新的生物识别系统
J. Sahoo, Pooja Gupta
{"title":"Biometric System based on Eyelid Detection Innovation","authors":"J. Sahoo, Pooja Gupta","doi":"10.1109/SMART55829.2022.10046727","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10046727","url":null,"abstract":"A biometric system can automatically identify a person by using a feature or attribute that is unique to that person. This can be accomplished through the use of a biometric. The system is the one that does this identification. It is generally agreed upon that iris recognition is the most reliable and accurate kind of biometric authentication that is currently available on the market [4], [6]. The eyelid, in conjunction with the eyelashes, can commonly hide a sizeable section of the iris. This is especially noticeable in people with blue eyes. Our method offers an innovative approach to the process of iris detection by making use of curve fitting in the analysis process. Iris recognition has the potential to be used in a broad number of settings, some examples of which include electronic commerce, information security, and door access control systems.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117294933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study of Optimized Proposed Model for Gateway Congestion Control 网关拥塞控制的优化提议模型研究
Suhail Javed Quraishi, Rubina Liyakat Khan, Tanvir Mahmoud Hussein, Vineet Saxena, Sushovan Chaudhury, A. Rastogi
{"title":"A Study of Optimized Proposed Model for Gateway Congestion Control","authors":"Suhail Javed Quraishi, Rubina Liyakat Khan, Tanvir Mahmoud Hussein, Vineet Saxena, Sushovan Chaudhury, A. Rastogi","doi":"10.1109/SMART55829.2022.10047440","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047440","url":null,"abstract":"A congestion control mechanism is needed to balance the network load to prevent pack drops and avoid network deadlocks. The main purpose is to analyze efficient and reliable congestion control methods which will reduce the weaknesses in various existing congestion control methods and propose a framework to minimize the gateway congestion in the network. As the demand of heterogeneous users of computer network day by day dynamically and rapidly changing in many aspects, grounded on the application situations our congestion control mechanism functions well in the situations that occur in Internet. The maximum degree of dynamics can be handle efficiently by keeping the generality of its existing end-to-end solution in our congestion control design.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117156328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of Stress using Machine Learning and IoT 利用机器学习和物联网预测压力
Amit Jain, Muskan Kumari
{"title":"Prediction of Stress using Machine Learning and IoT","authors":"Amit Jain, Muskan Kumari","doi":"10.1109/SMART55829.2022.10046907","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10046907","url":null,"abstract":"Stress is considered as the leading problem in healthcare. This paper is about a brief review of machine learning Algorithms and IoT, and their roles in the prediction of stress. A lot of research has been done by researchers in the prediction of stress by taking reference to previous research we compare SVM and KNN accuracy and performanceon the basis of PSS (perceived stress scale), EDR and ECG. This paper discusses ML Techniques that are implemented on the Internet of things (IoT) nowadays. Also, emphasis has been laid on identifying the causes, symptoms of stress along with studying the existing Machine Learning algorithms related to Stress.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120891398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph Family Characterization using the Path Length Array 使用路径长度数组的图族表征
Pardeep Kumar, Sanjay Arora
{"title":"Graph Family Characterization using the Path Length Array","authors":"Pardeep Kumar, Sanjay Arora","doi":"10.1109/SMART55829.2022.10046959","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10046959","url":null,"abstract":"Distance-based definition of graph families the range in between nodes or sides here on network is known as the shortest route size between both two nodes or sides. The degree of a specific edge is defined as the total number pf triangles that surround that apex. The node e sequence's length level series () is the quantity of nodes but rather vertices at a length I from v, where () = 0(), 1(),…,()(). Here, utilizing their distance extent sequence, they have covered the creation and classification of total circles, cycles of extremely weird and now even dimensions, and complete PPI network 2. In addition, some of the findings have really been provided with methodologies.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121166130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real Time Multistage Attack Detection Leveraging Machine Learning and MITRE Framework 利用机器学习和MITRE框架的实时多阶段攻击检测
Yuvraj Sanjayrao Takey, Sai Gopal Tatikayala, M. U. Patil, Lakshmi Eswari P. R, Satyanadha Sarma Samavedam
{"title":"Real Time Multistage Attack Detection Leveraging Machine Learning and MITRE Framework","authors":"Yuvraj Sanjayrao Takey, Sai Gopal Tatikayala, M. U. Patil, Lakshmi Eswari P. R, Satyanadha Sarma Samavedam","doi":"10.1109/SMART55829.2022.10047248","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047248","url":null,"abstract":"Organizations regardless of their size are rapidly transforming, adopting and embracing digitalization amid the COVID pandemic. The pandemic forced organizations to ratio- nalize offline operations and swift towards online operations. Many organizations have digitized their services and have witnessed increasing Multistage cyber-attacks. Further, a lot of organizations have enabled remote access to the enterprise resources and services. As a result, organizations are striving to defend against Multistage cyber-attacks. These multistage attacks often spread across many stages, which is best described by MITRE Adversarial Tactics, Techniques, and Common Knowl- edge (ATT&CK) Framework. There are many research efforts for static detection of malicious binaries but very few or limited research targeting run-time detection of malicious processes in the system. Detection of these malicious processes are key for identifying new variants of multistage attacks or malware in the real world. This paper proposes a system for detecting multistage attacks in real-time or run-time by leveraging Machine learning and MITRE ATT&CK Framework. Machine learning facilitates detecting the malicious process in the system, and the MITRE ATT&CK framework offers insight into adversary techniques. Combination of these two is very effective in detecting multistage attacks and identifying individual stages. The proposed system shows promising results when tested on real-time/latest malware. Test result shows that our system can achieve 95.83% of accuracy. This paper discusses the challenges in detection of runtime malware, dataset generation","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114731043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Retinal Detachment Severity using RDidean Evaluative System and Classifier Assessment Implementation Models 应用RDidean评价系统和分类器评价实现模型分析视网膜脱离严重程度
L. Poongothai, K. Sharmila
{"title":"Analysis of Retinal Detachment Severity using RDidean Evaluative System and Classifier Assessment Implementation Models","authors":"L. Poongothai, K. Sharmila","doi":"10.1109/SMART55829.2022.10046999","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10046999","url":null,"abstract":"Vision loss can be a permanent disability of a human, that could be attributed to due to Retinal Detachment (RD). This is perilous disorder that could be caused due to dealignment of the layers in a retina. The choroid supplies oxygen and nutrients to the outer segments of the photoreceptors. The retina's photoreceptors will stop working if the choroid separates from the retina. The degree of dependence on the choroid is high, due to its supply of oxygen to the fovea that increases the breathability of the retinal blood vessels. This tapering of the oxygen levels can paramount to macula detachment that can be an irreversible damage to the cones and rods at the posterior pole, thereby leading to blindness. If the retina is quickly reattached, good vision can be preserved even if the macula is not removed. Retinal detachment hitherto has been studied through conceptual data processing and image processing techniques. However, this paper analyzes the retinal detachment for an individual through the various features, and the same is encompassed in an equational form to be termed as the “RDidean” evaluative system. The evaluative model thus explicitly categorizes the retinal database into normal and abnormal images based on the value obtained from the system. The performance of this system is then effectuated through diverse tree classifier models and the deep learning AlexNet classifier in MATLAB to comprehend the precision of classification. While effectively entailing another pool of algorithmic models like the SVM variations and the Naïve Bayesian methods to cognize the accuracy of retinal detachment severity that the evaluative system rendered. This indagation analyzes focusses to establish a corroborative and impeccable prediction system for the classification of normal and abnormal eye through color fundus images. Thereby aiding to improve the ergonomic environment of clinicians to improve the treatment plan, along with delivering complementary clinical decisions, and in institutionalizing affordability for patients through optimal cost for agnizing retinal detachments.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115319143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Valuation of Mergers and Acquisitions 并购估值
Vipin Kumar, Priyanka Jain
{"title":"Valuation of Mergers and Acquisitions","authors":"Vipin Kumar, Priyanka Jain","doi":"10.1109/smart55829.2022.10047079","DOIUrl":"https://doi.org/10.1109/smart55829.2022.10047079","url":null,"abstract":"In the business area of India mergers and acquisitions are expanding fundamentally. Indian organizations are taking their oppositions to the next level by procuring unfamiliar organizations while permitting unfamiliar financial backers to put resources into India. The Indian business area is liable to relentless rivalry, subsequently, they have become inseparable from instruments that assist in enduring the market. Business rebuilding have frequently come about emphatically because of an expansion in the effectiveness and maintainability of the organizations. Because of globalization, numerous organizations advanced towards the Indian business area and the Indian organizations continued procuring unfamiliar foundations. Organizations are more worried about protecting their worth on the lookout because the business world has turned aggressive. Exchanges of offer or acquisition of any foundation request a computation of having fair worth which console partners and regulators. In these computation of having fair worth should be possible by different strategies. Paper talk about the valuation required during mergers and acquisitions.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121181363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation and Execution of Block Chain Technology in the Field of Education 区块链技术在教育领域的实施与执行
Joel Alanya ‒ Beltran, Jesús Padilla-Caballero, F. A. Ochoa Tataje, Claudia Poma ‒ Garcia, Adolfo Perez ‒ Mendoza, Trishu Sharma
{"title":"Implementation and Execution of Block Chain Technology in the Field of Education","authors":"Joel Alanya ‒ Beltran, Jesús Padilla-Caballero, F. A. Ochoa Tataje, Claudia Poma ‒ Garcia, Adolfo Perez ‒ Mendoza, Trishu Sharma","doi":"10.1109/SMART55829.2022.10047800","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047800","url":null,"abstract":"Occupational category or education professionals at all degrees have always been drawn to emerging innovations in order to maximize their potential for working hard and enriching the experiences of teaching and learning of both instructors and students. The increased usage of Big Data, Business Intelligence, and Intelligent Systems are a few of the breakthroughs. The usage of Block chain technology is another emerging field that is receiving attention from the education industry. The contribution to the Ir4.0 phenomena is the Block chain. It is a new technology that operates according to the autonomy and dispersion principles. The book “Block Chain Uses for School,” edited in Ramesh Vijay Yadav, Hadi Heidari, and GulsunKurubacak, was thoroughly reviewed in the article. It is among the few books that highlights the use of bitcoin technology in the classroom. The writers of the corresponding pages include a variety of potential Public Block chain management for schooling application. Additionally, the eBook focuses on managing institutions databases employing block chain, which increases the validity and safety of school data related to diplomas and grading sheet by enabling failsafe verification for all shareholders. In a couple of the pages, it is discussed how open and remote institutions of learning may handle large data using block chain. The book is essential reading for anybody involved in creating educational policies, putting them into practise, or studying education in general since it offers fresh perspectives on the numerous facets of this relatively recent field of technology application in education. This would assist students in changing how they see educational procedures.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125260790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Graph Database-Based Method for Network Log File Analysis 基于图数据库的网络日志文件分析方法
K. Sharma, Arvind Kumar
{"title":"A Graph Database-Based Method for Network Log File Analysis","authors":"K. Sharma, Arvind Kumar","doi":"10.1109/SMART55829.2022.10047250","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047250","url":null,"abstract":"It is frequently required to evaluate data acquired from numerous network logs in order to offer a more accurate judgement of the severity of a cyber threat. This may be accomplished by reviewing the data. One example would be the examination of log records produced by command line tools in solitary confinement. In spite of the fact that employing a log management system makes it simpler to identify certain log documents, it might be time-consuming to examine all of them in order to determine the connection(s) between the different types of network activity. To construct these bridges, we may make use of relational databases by, for example, linking the tables by using complicated database queries that make use of a large number of join processes. Recent years have seen a rise in interest in the use of graph databases as a method for the storage and organization of data in preparation for semantic searches.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124341523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信