Series-1 (MayJune 2020)May-June 2020 Issue Statistics
- Citation
- Abstract
- Reference
- Full PDF
- Index Page
- Cover Paper
Paper Type | : | Research Paper |
Title | : | Network Penetration Testing |
Country | : | India |
Authors | : | Asmita Rajendra Shingan || R.S Kawitkar |
: | 10.9790/2834-1503010136 |
Abstract: The demand for sophisticated tools for intrusion detection,vulnerability analysis, forensic investigations, and possible responses has increased because of the increasing volume of attacks on the internet. Authorization of reengineering to show cyber crime and homeland security is given by present tools and technologies of hacker. To assure the details base by collecting intelligence, topology of network, penetration testing and inner/outer accountability test it is essential to create network scanners. Cyberspace (IP),SS7, radiotelegraphy, and merged system are the variety of networks on which scanners can be functioned. To assist use by a wide range of end users and policy; such elasticity permits to keep up with present technician mechanics expansile and elevate scanners should be used.
Key Word: Linux, Network security, Vulnerabilities, Phyton, Scan, Security tool, Data Security, Viruses, Attacks.
[1]. Penetration Testing- https://www.tcdi.com/services/cybersecurity/penetration-testing-pen-test/
[2]. Information Gathering- https://www.w3schools.in/ethical-hacking/information-gathering-techniques/.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: We implement a general Convolutional Neural Network (CNN) to design a real-time model and validates our model by creating a real-time vision that accomplishes the task of face detection, gender, and emotion classification simultaneously. We got accuracies of 95% in the IMDB-WIKI age and gender dataset and 66% in the FER emotion recognition dataset. We have used a real-time guided back-propagation technique to visualize the weighed of real-time CNN that uncovered the dynamic weight change and evaluate the learning feature. We think in the modern CNN architecture regularization and visualization of previously hidden layer features are necessary to reduce the gap between slow performances and real-time architectur.
Keywords: Back Propagation, Convolutional Neural Network (CNN), Computer Vision (CV), Emotion Detection, Face Detection, Gender Classification
[1].
Arriaga, Octavio et al. "Real-time Convolutional Neural Networks for Emotion and Gender Classification." CoRR abs/1710.07557 (2017): n. pag.
[2].
Goodfellow, Ian J., et al. "Challenges in Representation Learning: A report on three machine learning contests." Neural networks: the official journal of the International Neural Network Society 64 (2013): 59-63.
[3].
Chollet, François. "Xception: Deep Learning with Depthwise Separable Convolutions." 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2017): 1800-1807
[4].
Levi, Gil, and Tal Hassner. "Age and gender classification using convolutional neural networks." 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2015): 34-42.
[5].
Rothe, Rasmus et al. "DEX: Deep Expectation of Apparent Age from a Single Image." 2015 IEEE International Conference on Computer Vision Workshop (ICCVW) (2015): 252-257
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Fingerprint contains ridge and valley which together form distinctive patterns. A fingerprint Biometric trait is one of the important traits working with good results in the gender classification. The plan agreements with the problem of gender classification using fingerprint images. The project proposed a technique for classifying the gender based on feature extraction. The related feature to be removed and differentiate the gender is on and Minutiae extraction and ROI. The extracted feature is used to train neural network based model on the extracted data.....
Keywords: Fingerprint, ROI; MM; OCM; RTVTR; MFANNs; SVRRBF;
[1]. IEEE COMPUTER SOCIETY 1540-7993/03 © 2003 IEEE "Biometric Recognition: Security and Privacy Concerns", IEEE SECURITY AND PRIVACY SALIL PRABHAKAR Digital Persona, SHARATH PANKANTI IBM T.J. Watson Research Center, ANIL K. JAIN Michigan State University.
[2]. International Journal of Engineering Trends and Technology- Volume 4 Issue 2- 2013 "Fingerprint Based Gender Classification Using 2D Discrete Wavelet Transforms and Principal Component Analysis" Rijo Jackson Tom and T. Arulkumaran.
[3]. A. Badawi, M. Mahfouz, R. Tadross, and R. Jantz "Fingerprint - based gender classification" et al, (June, 2006).
[4]. Manish Verma, Manish Verma and Suneeta Agarwal. "Fingerprint Based Male - Female Classification." et al, (2008).
[5]. JenFeng Wang, et al, "Gender Determination using Fingertip Features" et al, (2008).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Smart PUC Monitoring System |
Country | : | India |
Authors | : | Sunil Kale || Amol Bhoi |
: | 10.9790/2834-1503015660 |
Abstract: PUC Measurement system is used to check Concentration of Carbon mono-oxide in vehicle. When person visit PUC center to gen PUC certificate, he has to check concentration of CO in vehicle. First he swap RFID card in front of RFID reader, this 12 digit unique code along with concentration of CO in % is sent to RTO office using GSM modem. GSM modem connected to central PC station receives this SMS. Vehicle information is saved in access database against unique RFID card. If concentration exceed above limit auto SMS will be send to PUC center that servicing required for vehicle. Do not allow to....
Keywords: MQ-7 Sensor, GSM Module, RFID, PUC, Carbon Monoxide, RFID, NPVIS
[1]. A.N.SLOSS,"ARM System Developer's Guide", Morgan Kaufmann Publishers, 2006, 3rd Edition
[2]. M.A.MAZIDI,"Microcontroller and Embedded System", Perason publishers, 2006, 2nd edition
[3]. https://www.tashika.co.jp/pdfs/822.pdf
[4]. http://www.bioenabletech.com/line-attendance-acess-control/2009/05/18/gp20-22-125kHz-proximity-serial-reader/
[5]. http://www.gprsmodems.co.uk/acatalog/online-catalogue-wavecom-GSM-GPRS-modems-100.htmls.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: From a national economic viewpoint, earthquakes are the most destructive category of natural hazards in India. The economic losses to homes and personal property are major manifestations. India is highly vulnerable to earthquakes, in that scenario there is a urgent requirement for development of enhanced surveillance vehicles. In this paper, we describe the design and implementation of a sensor-based robot.With the use and integration of Ultrasonic sensors and PIR sensor on a common coding platform Arduino we were able to create a working disaster relief assisting robot which not only reduces complexity but is easily made and user friendly.....
Key Words: Arduino ,Ultrasonic sensors , Surveillance vehicles , PIR sensor
[1]. Kenneth G. Eskildsen, Great Neak, "Method and apparatus for large signal detection inPIRapplications", u.s.7176469b2, abbrev. Feb,13.2007.
[2]. Reiner quad, Taunusstein, Karlheinz Stock, Loach, "Infrared detector with direction identification capability", u.s.4914298a, abberev.appr,3.1990.
[3]. Mr.SpVijayaragavanandHardeeppalSharma,"Live human detection robot for earthquake rescue operation", International journal of buisnessintelligents, vol.02,issue 01,page:83-87,june:2013.
[4]. A. Rogalski, K. Chrzanowski, "Infrared devices and techniques", Warsaw,2002.
[5]. J. Casper "Human-Robot Interactions during the Robot-Assisted Urban Search And Rescue Response at The World Trade Center", MS Thesis, Computer Science and Engineering, USF, South Florida,2002
Series-2
- Citation
- Abstract
- Reference
- Full PDF
- Index Page
- Cover Paper
Paper Type | : | Research Paper |
Title | : | Energy Storage in Communications & Data Center Infrastructures |
Country | : | |
Authors | : | |
: | 10.9790/2834-1503020112 |
Abstract: As communications technology is ubiquitous, and energy savings are ever more crucial in communications and data storage infrastructures, it is timely to revisit the technologies used for energy storage. Thismultidisciplinary paper especially focusses on the specific requirements onto energy storage for communications and data storage,derived from traffic, climate, high availability, and resilience, irrespective from energy sources used. It also addresses techno-economic, environmental &emissions tradeoffs offered by a model, and concludes with discussing future energy storage technologies.
Keywords: Energy storage, Communications networks, Data centers, Batteries, Battery power loss, AD-DC power conversion, Life-cycle costs, Environmental life-cycle cost, Emissions life-cycle cost
[1]. G. Hedlund, Monitoring of lead acid batteries, ELTEK White paper, 19/12/2013 www.eltek.com
[2]. R.R. Schmidt, H. Shaukatullah, Computer and telecommunications equipment room cooling: a review of literature, Proc. 8 th Intersociety conference on thermal and thermo mechanical phenomena in electronic systems, 2002, 751-766,Publ. by IEEE, DOI: http://dx.doi.org/10.1109/ITHERM.2002.1012531
[3]. ETSI ,5G PPP Architecture Working Group: View on 5G Architecture, https://5g-ppp.eu/wp-content/uploads/2014/02/5G-PPP-5G-Architecture-WP-For-public-consultation.pdf
[4]. DOE/EPRI 2013 Electricity storage handbook (in collaboration with NRECA), EPRI and DOE, 2013
[5]. G. Koutitas, P. Demestichas, A review of energy efficiency in telecommunication networks, TELFOR Journal, Vol 2, no 1, 2010, 2-7 http://journal.telfor.rs/published/no3/no03_p01_fin.pdf
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design and Implementation of Smart Rationing By Face Recognition System |
Country | : | India |
Authors | : | Dr. VENKATESWARA RAO JILLELLA |
: | 10.9790/2834-1503021317 |
Abstract: Ration card plays a vital role for the household details such as to get gas connection, family member details; it acts as address proof etc. In this regard, we have wished for a smart measure card system using Face Recognition Technique and IOT to thwart the derelictions and corruption in the current ration distribution system. In this system conventional quota card will be replaced by a Face Recognition system. This Faces will be verified with family members for authentication of the user. If user is found to be authentic then monthly quota of the ration available for the user is displayed. After successful transaction the database will be updated stating the ration content delivered to the user. This system will require very less human efforts for operation and is also very secure. By implementing this system government can keep track of all the delivered ration content very easily.
Keywords: Internet of Things; Face recognitiong system; Haar algorithm; Rasbherry pi; Universal Serial Bus, Public Distribution System.
[1]. Gaikwad PriyaB.. Prof. Sangita Nikumbh , "E – Public distribution system using SMART card and GSM technology" International Conference on Intelligent Sustainable Systems(ICISS 2017) IEEEISBN:978-1-5386-1959-9.
[2]. Mrs. Subhasini Shukla, Mr. Akash Patil, Mr. BrightsonSelvin , "A Step Towards Smart Ration Card System Using RFID & IOT" ", IEEE International Conference on Inventive Communication and Computational Technologies(ICICCT), 2017.
[3]. Prof. Shital A. Aher, Akshay D. Saindane, Suved P. Patil, Shivsagar K. Chakor , "Smart Ration Card Using RFID and Biometrics ", Vol-3 Issue-2 2017, IJARIIE-ISSN(O)-2395-4396,2017.
[4]. Vinayak T. Shelar, Mahadev S. Patil , "RFID and GSM based Automatic Rationing System using LPC2148", International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 4 Issue 6, June 2015.
[5]. Anshu Prasad, Aparna Ghenge, SonaliZende, Sashikala Mishra, Prashant Godakh, "Smart Ration Card Using RFID, Biometrics and SMS Gateway", IEEE International Conference on Inventive Communication and Computational Technologies(ICICCT), 2017.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The paper presents the research results of building a remote monitoring system of independent power stations in rural and mountainous areas in Vietnam, where there is no electricity and telephone reception. Wireless communication technologies were considered and LoRa was chosen. Monitoring system model includes monitoring station at independent power station and remote monitoring station. At the independent power stations, power parameters are measured for on-site display and sent via the LoRa protocol to the central monitoring station. The central station receives signals from independent stations and displays the operating status of these stations. Experimental models were built and tested in Vietnam Academy of Science and Technology..
Keywords: LoRa, independent power station, IoT, LPWAN, LoRaWAN.
[1]. M. Centenaro, L. Vangelista, A. Zanella, M. Zorzi, , "Longrange communications in unlicensed bands: The rising stars in the IoT and smart city scenarios,," IEEE J. Wir. Commun, vol. 23, nº 5, pp. 60-67, 2016.
[2]. D. Patel, M. Won, "Experimental Study on Low Power Wide Area Networks for Mobile Internet of Things," em Proc. of VTC, Sydney, Australia, 2017.
[3]. U. Raza, P. Kulkarni, M. Sooriyabandara,, "Low Power Wide Area Networks: An Overview," IEEE J. Commun. Surv. Tuto. , vol. 19, nº 2, pp. 855-873, 2017.
[4]. Mekki, K., Bajic, E., Chaxel, F., & Meyer, F. (2018)., "A comparative study of LPWAN technologies for large-scale IoT deployment..," ICT Express, 2017.
[5]. Semtech, "AN1200.22, LoRa modulation basics," Semtech, 2015.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | NOMA for Massive Cellular Internet of Things |
Country | : | India |
Authors | : | Vismaya M Kumar || Shiras S N |
: | 10.9790/2834-1503022831 |
Abstract: The Internet of Things (IoT), which represents the connectivity of everything everywhere, and promises the tremendous technology in the coming years. In 2020 about 20 billion devices will be connected to cellular networks which is beyond the number of devices. In order to support massive access of Internet of things (IoT) devices the upcoming fifth-generation wireless network need the development of the cellular Internet of Things (IoT) . There are several LPWAN(Low power wide area network)-technologies that can be used to connect the product to the internet, so it can communicate with other connected devices. The main types of LPWAN are NB-IoT, LTE, Lora, Sigfox and NOMA. As the number of connected objects is expected to increase over the coming years, in order.....
Keywords: IoT; LPWAN; NOMA; 5G.
[1]. Guanghua Yu, Xiaoming Chen, and Derrick Wing Kwan Ng, " Low cost design of massive access of cellular Internet of things," IEEE Trans. Commun., vol. 67, no. 3, pp. 2930-3208, Mar.2019
[2]. M. Shirvanimoghaddam, M. Dohler, and S. J. Johnson, "Massive nonorthogonal multiple access for cellular IoT: Potentials and limitations,"IEEECommun.Mag.,vol.55,no.9,pp.55-61, Sep.2017.
[3]. Y. Liu, Z. Qin, M. Elkashlan, Z. Ding, A. Nallanathan, and L. Hanzo, "Nonorthogonal multiple access for 5G and beyond," Proc. IEEE, vol. 105, no. 12, pp. 2347-2381, Dec.2017.
[4]. X. Chen, Z. Zhang, C. Zhong, and D. W. K. Ng, "Exploiting multiple antenna techniques for non-orthogonal multiple access," IEEE J. Sel. Areas Commun., vol. 35, no. 10, pp. 2207-2220, Oct.2017.
[5]. X. Shao, X. Chen, C. Zhong, J. Zhao, and Z. Zhang, "A unified design of massive access for cellular internet of things," IEEE Internet of Things J., vol. 6. no. 2, pp. 3934-3947, Apr.2019..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Instructional supervision is key to effective teaching. Whereas emphasis has been put on external instructional supervision, less attention has been given to Internal Instructional Supervision (IIS), probably because its influence on teaching effectiveness is yet to be established. Kakamega County is the second largest County in terms of population yet achievement in English is low at a mean score of 5.03 in Kenya Certificate of Secondary Examination (2007-2018) The County's Panel of Standards Assessment report of 2010 and 2011 pegged this to weak IIS structures. The purpose of this paper is to establish influence of frequency of checking teachers of English professional documents on their teaching effectiveness. The study used ex-post –facto, correlation and descriptive.....
Key Words: Internal instructional supervision, influence, teaching effectiveness, frequency and professional documents.
[1]. Assefa, B. (2016). Instructional supervision in government secondary schools in Borana Zone. Unpublished M.Ed. thesis, Addis Ababa University.
[2]. Atieno, A. A. (2015). Influence of head teachers' supervision of teacher curriculum development on provision of quality education in secondary schools in Kenya. Unpublished Doctoral thesis, OgingaOdingauniversity.
[3]. Barry, R. A. (2010). Teaching effectiveness and why it matters. Unpublished Doctoral thesis, Marylhurst University and Chalkboard project.
[4]. Chenge, D., &Syomwene, A. (2016). Internal curriculum supervision of life skills education in public secondary schools, a case of Lugari Sub- County, Kenya. European Journal of Education Studies, 2(10), 14-34.
[5]. Eneastor, G.O. (2001). Towards goals oriented management of secondary schools in Nigeria: The Place of supervision instruction. Journal of Educational Studies and Research, 2(1), 50-58.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: 5G mobile communications system is offering very high speed data communications technology having connectivity to all sorts of the networks like 2G, 3G, 4G, WiMAX, MANET, VANET and other adhoc mobile networks. Authentication of a mobile subscriber (MS) or a sub-network and a main network are an important issue to check and minimize security threats or attacks. An artificial intelligence based mutual authentication system applying fuzzy neural network with four biometric entities is proposed. Voice frequency matching of the salutation or the selective words used by a subscriber like Hello, Good Morning, etc. with his/her stored voice frequency of that particular word is taken as first entity. Second entity is chosen as matching the flipping or clapping sound frequency of the calling subscriber with his/her stored flipping or clapping sound frequency.....
Keywords: Biometric entities; Face image matching; Flipping sound frequency; Fuzzy neural network; Fuzzy operation; Identifier; Mutual authentication; Packet switching; Salutation word; Threat
[1]. William C. Y. Lee, Wireless and Cellular Communications, 3rd Edition, McGraw Hill Publishers, 2008.
[2]. M. L. Roberts, M. A. Temple, R. F. Mills, and R. A. Raines "Evolution of the Air Interface of Cellular Communications Systems toward 4G Realization," IEEE Communications Surveys and Tutorials, vol. 8, no. 1, pp. 2-23, Mar 2006.
[3]. P. K. Bhattacharjee, and R. K. Pal "A Novel Approach on Mutual Authentication Techniques in 4-G Mobile Communications" International Journal of Computer Engineering and Computer Applications, California, USA, vol. 08, no. 01, pp. 42-49, July 2011.
[4]. Martin Sauter, Beyond 3G Bringing Networks, Terminals and The Web Together, A John Wiley and Sons Ltd. Publication, Sussex, U.K., 2009.
[5]. Vilem Novak, Jiri Mockor, Irina Perfilieva, Mathematical Principles of Fuzzy Logic, Kluwer Academic Publisher, 2006.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: ECG (Electrocardiogram) signal acquire noise while traveling through different tissues or blood vessels. The analysis of ECG signal is very important for researchers and careful medical diagnosis and proper treatment are also essential. For proper analysis of EGC signal noise as well as artifacts which have to be removed for proper treatment of a patient. Therefore different methodologies are used to remove noise and artifacts. This paper describes the adaptive network based fuzzy inference system which is used to reduce noise from ECG signal.
Keywords: adaptive network based fuzzy inference system, LMS, SLMS, SSLMS,NLMS, NSLMS
[1]. D. C. Dhubkarya and A. Katara; "Comparative Performance Analysis of Adaptive Algorithms for Simulation & Hardware Implementation of an ECG Signal"/ International Journal of Electronics and Computer Science Engineering Vol.No.1, pg.2184-2191.
[2]. R. Sehamby, B. Singh (2016); "Noise Cancellation using Adaptive Filtering in ECG Signals: Application to Biotelemetry" /International Journal of Bio-Science and Bio-Technology Vol.8, No.2 (2016), pp.237-244 .
[3]. El Falou et al. (2001); "Adaptive approach for change detection in EMG recordings"/ Proceedings of the 23rd Annual International Conference of the IEEE, Volume: 2..