P. Tiwari, Srinivasa Reddy Basireddy, Velayutham T
{"title":"Identification of Possibly Intemperate Permission Demands in Android Apps","authors":"P. Tiwari, Srinivasa Reddy Basireddy, Velayutham T","doi":"10.1109/iciptm54933.2022.9753830","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9753830","url":null,"abstract":"There are millions of android applications being developed for smartphones and tablets. These apps are collecting enormous amounts of private data, compromising user's privacy. Researchers have tried to identify the difference between 'requested permissions' and 'used permissions' as some apps ask for a permission but may use it for stealing the user data. Android has put the system of asking user's consent for certain permissions but users have been found negligent in granting those permissions. For example, a note taking app may take the user's location data and send it to its server. As long as the app has requested the user's consent and the user has granted the permission, the state of art system will consider it benign. In this paper, we will try to identify and answer the question, 'are these permissions really necessary for the app?‘. There are thousands of applications hosted on playstore providing the same functionality. And for providing the same facility, different apps ask for a different set of permissions. It is not easy to understand whether the permissions are really used in the application. We are going to utilize a different approach by comparing and comprehending the app from its peers in the playstore. We will analyze the peer app in the same category and with similar functionality for the permission difference. If the same functionality is achieved with a lesser number of permissions, the app is considered to be malicious and will require further investigation. With this approach, we designed a statistical approach to evaluate an app for excessive permission requests. Experimental results and case studies have shown that this approach is effective in identifying malicious apps.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"76 1","pages":"101-106"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76085976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methods of Congestion Control in Wired Networks with Reinforcement Learning – A Review","authors":"Mettu Jhansi Lakshmi, Mahesh BabuArrama","doi":"10.1109/iciptm54933.2022.9753983","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9753983","url":null,"abstract":"In a TCP/IP network, the TCP congestion control system (CC) ensures that network resources are shared efficiently and fairly between its users. Previously, TCP CC systems have been designed to cable hard from predefined behaviour to particular network control signal. However, as networks become more complex and competitive, the optimal feedback action mapping the invention of this analysis will be difficult to develop, and the contribution of this study is the thorough description of and comparison of the congestion control (CC) approaches. Comparatively to standard CC algorithms, which are primarily rule-based, the capacity to learn from previous knowledge is extremely valuable. According to the research, RL is a major trend among learning-based CC algorithms. In the paper we discuss the efficiency of CC algorithms on an RL basis and present current issues with CC algorithms on an RL basis. We describe the problems and dynamics of CC algorithms based on learning.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"111 1","pages":"128-136"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79625000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shipra Varshney, Prashant Vats, S. Choudhary, Deepti Singh
{"title":"A Blockchain-based Framework for IoT based Secure Identity Management","authors":"Shipra Varshney, Prashant Vats, S. Choudhary, Deepti Singh","doi":"10.1109/iciptm54933.2022.9753887","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9753887","url":null,"abstract":"Blockchain science's distributed system structure makes it an ideal option for addressing device-to-device transmission data breaches. This paper investigates the potential use of blockchain systems to enhance Information security issues in the context of the 5G Mobile communication infrastructure. Relying on blockchains, we offer a multi-layer protection network architecture for IoT networks. By splitting the IOT based platform infrastructure into a multi-layer decentralized system, the suggested approach overcomes the issues connected with the real establishment of distributed ledger technology. We split the infrastructure into K-based clusters in the conceptual scheme by utilizing Evolutionary - based methods such as Evolutionary Computation and Particle-based Swarm intelligence evaluation. Every Cluster Members selects a unique access control for identification and authorization purposes inside every cluster group head (CGH). The distributed ledgers technology's strong security and trustworthiness guarantee offers an authentication system for CGHs communicating with one another and Ground Stations via a localized blockchain application with no need for a centralized controller. In addition, we suggest a worldwide blockchain deployment for base stations communications. Furthermore, to validate the proposed methodology, we use the free software blockchain application Hyper ledger Cloud hosting Network.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"36 1","pages":"227-234"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75174485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Novel Rectangular Patch Microstrip Antenna for Ku Band Applications and Comparison of Gain with Circular Patch Antenna","authors":"S. A. Hafeez, M. Sathesh","doi":"10.1109/iciptm54933.2022.9754155","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754155","url":null,"abstract":"The aim of this work is to design a Novel rectangle shaped microstrip patch antenna with air gap technique in Ku band frequency and comparison with circular patch antenna with gain as parameter. Materials and methods: A total number of 20 samples has been taken by varying frequency. In this design, Epoxy FR4 (relative permittivity 4.4) is used as a substrate material and perfect E material for patch and ground. Since obtained significant value with G power calculation is 80%. Results: Antenna is resonating at a freq of 15.6 GHz with a gain of 4.42 decibels. This antenna has been analyzed and designed for its performance with aid of Ansoft HFSS version 15.0 software. Simulated result shows the significance value is 0.04 ($mathrm{p} < 0.05$). Conclusion: Based on the analysis, the designed antenna has a higher gain compared to circular patch antenna.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"83 1","pages":"594-599"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79794592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Akhilesh Kumar, Sarfraz Khan, Rajinder Singh Sodhi, I. Khan, Sumit Kumar, Ashish Tamrakar
{"title":"Deep learning Based Patient-Friendly Clinical Expert Recommendation Framework","authors":"Akhilesh Kumar, Sarfraz Khan, Rajinder Singh Sodhi, I. Khan, Sumit Kumar, Ashish Tamrakar","doi":"10.1109/iciptm54933.2022.9754157","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754157","url":null,"abstract":"In recent years, with the popularization of the Internet and the development of technologies such as big data analysis, people's demand for mobile medical services has become more and more urgent, which is manifested in determining their diseases based on symptoms and selecting hospitals with better service quality according to the illnesses and doctors. An inquiry recommendation system is designed and implemented based on knowledge graphs and deep learning technology to solve the above problems. Based on the open medical data on the Internet, a “disease-symptom” knowledge map is constructed to help users self-examine according to symptoms. The knowledge map embedding model trains the embedded vector representation of entities in the knowledge map. The most similar is selected according to the Euclidean distance similarity of the vector. The disease entity enriches recommendation options, and the two are combined to achieve disease diagnosis services. At the same time, based on social media comment data, combined with the existing medical service quality evaluation indicators, the deep learning analysis method is used to automatically give a multi-dimensional score of the doctor's service quality and provide users with the doctor and hospital recommendation services. Finally, by constructing test sets and designing questionnaires, it is verified that the accuracy rates of disease diagnosis service and doctor-hospital recommendation service are 74.00% and 90.91 %, respectively.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"18 1","pages":"736-741"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79969623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Enhanced Face Anti-Spoofing Model using Color Texture and Corner Feature based Liveness Detection","authors":"N. Nanthini, N. Puviarasan, P. Aruna","doi":"10.1109/iciptm54933.2022.9754068","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754068","url":null,"abstract":"In recent years, Biometric security systems have extended their uses. The systems are able to identify humans by analyzing their behavioural characteristics. Face recognition is the most popular biometric techniques, which widely used nowadays. They are treated as a suitable replacement for PINs and passwords for regular users. It is very easy to use a photo imposter to fake face recognition algorithm. To ensure the presence of real human face to a photograph or 2D masks, an enhanced face anti-spoofing model is proposed using Color Texture and Corner Feature based Liveness Detection (CTCF_LD). From the input video, the frames are extracted and cropped for the specific facial landmark points. The texture of the 2D masks and real face is analyzed by changing its colorspace. Then, the corner points are detected using various corner detection algorithms. Based on the corner points, the fake face is differentiated from the real face using a threshold value. Empirical study shows that the proposed CTCF_LD face anti-spoofing model with HSV_FCD algorithm gives better accuracy of 88%.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"184 1","pages":"63-68"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83039198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Kaushik, K. Tripathi, Rashmi Gupta, Prerna Mahajan
{"title":"Performance Analysis of AODV and SAODV Routing Protocol using SVM against Black Hole Attack","authors":"S. Kaushik, K. Tripathi, Rashmi Gupta, Prerna Mahajan","doi":"10.1109/iciptm54933.2022.9754166","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754166","url":null,"abstract":"This paper presents the performance analysis of Ad-hoc-on-Demand Distance Vector (AODV) and Secure Ad-hoc-on-Demand Distance Vector (SAODV) protocol for packets transfer and communication among the nodes using Support Vector Machine (SVM) technique. The comparative analysis of SAODV and AODV protocol are presented against blackhole attack for the parameters energy consumption, throughput, packet delivery ratio and end-to-end delay in ad hoc networks. A methodology is designed which lays rules based on learnings from the computations and estimations made at the time of packet transfer. It has been found that the proposed methodology gives promising results than the one which lays networking rules at the time of setting up the network.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"153 1","pages":"455-459"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78208253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predictive Maintenance in Forging Industry","authors":"G. K. A. Prasad, Chetan Panse","doi":"10.1109/iciptm54933.2022.9754058","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754058","url":null,"abstract":"Overall Equipment Effectiveness (OEE), which is a standard to measure equipment productivity, heavily depends on the efficiency with which it is working. Any downtime of equipment will immensely affect the efficiency and subsequently affect the OEE of the equipment. In a production line, this unplanned downtime will have repercussions over other work centres causing a catastrophic effect on the factory's throughput. If such downtime occurs on any of the bottlenecks, the entire factory remains shut, with throughput becoming zero until the issue at the jam is resolved. To avoid such equipment failures, it is imperative to conduct maintenance of the machines in the facility at subsequent intervals. Although timely maintenance has a cost attached to itself, it certainly does save a lot more than the downtime cost incurred during a failure. With that being said, the cost is not the only concern concerning a machine failure; improper maintenance can even have safety concerns and can cause injuries to workers, subsequently leading to legal issues. Hence, timely equipment maintenance is of paramount importance for any state-of-the-art facility to remain a global leader in the market. Predictive maintenance is a method that can be done by utilizing the various analytics and machine learning tools that help predict with accuracy when a machine requires support. A viable PM model, with the utilization of memorable information of disappointments, assists us with foreseeing the time at which a machine will run into disappointment.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"78 1","pages":"794-800"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77199191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dev Karan Joshi, Kirti Rattan, A. Rudhra, Nitin Verma, Mohit Pratap, Dinesh Vij
{"title":"Attendance Marking System based on Hog Descriptor Algorithm","authors":"Dev Karan Joshi, Kirti Rattan, A. Rudhra, Nitin Verma, Mohit Pratap, Dinesh Vij","doi":"10.1109/iciptm54933.2022.9753963","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9753963","url":null,"abstract":"The atmosphere of individuals in a workspace is an important part of the daily management. Attendance is however a method to keep the record of the presence and absence of the individuals. Students' attendance has been taken using paper-based methods for decades. This attendance approach has been used for a long time. This strategy may be appropriate and practicable for a small group of attendees, but it is time and energy consuming for a bigger group. The drawbacks of this procedure are well-known and well-understood: it takes time, is prone to errors, and there is always the possibility of proxy attendance. We provide a practical and fashionable way for recording attendance using face recognition technology. The technology will recognize a person's face, and compare it to the database to determine whether they are present. Furthermore, the attendance sheet is kept with student information and time, which can be manually amended if necessary. Using this approach, the problem of fraudulent attendance and proxies can be solved.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"22 3 1","pages":"194-199"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83292512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WBMS: Waste Bin Management System for densely populated urban areas","authors":"D. Singh, Prateek Chaturvedi, Garima Dhawan, Ashutosh Kumar Singh, Rashmi Aggarwal","doi":"10.1109/iciptm54933.2022.9754190","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754190","url":null,"abstract":"Management of solid waste is a major challenge in densely populated urban areas. Such areas also have other predominant health management issues and improper waste management contributes to that. With the rise of COVID in the last two years hygiene has become the first priority of the Government to control the pandemic. Traditionally, municipality vehicles come as their routine to collect solid waste from commonly collected garbage bins placed by local authorities in residential and commercial areas. These bins are usually over-full and the waste roll-out of these bins is due to botching actions of the local occupants. These openly overflowing waste bins add to the contaminated environmental conditions leading to the spread of numerous diseases. Waste-bin management is a challenge in highly populated areas for municipal corporations. Internet of Things (IoT) can be used to monitor such waste bins and notify the municipal corporations about the waste level so that the bins can be cleared on time avoiding the spilling of garbage around them. In this paper, we have proposed an approach to waste bin management using IoT in urban areas. The model is built using LoRa waste-bin surveil units that will monitor and locate waste-bins in residential/commercial areas and notify the authority about their level.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"5 1","pages":"770-774"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90845824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}