June 17 ~ 18, 2023, Sydney, Australia
Through NeTCoM’s journal-first initiative, authors of journal-first papers accepted in the following journals are invited to present their research work to the wider audiences. It is providing an opportunity for the authors to engage directly with the conference authors and offering an additional dimension to the research track program.
The journal-first manuscripts will not be part of the NeTCoM conference proceedings.
Frederick Abban, Dr. Koudjo M. KoumadiDepartment of Computer Engineering, University of Ghana, Legon, Ghana
The universal exponential increase in the demand for high data rate for mobile devices has propelled lots of research in wireless communication. Deploying and implementing a wireless network in a particular geographical area requires proper planning since all existing propagation models are not “one size fit all” models. In this study, path losses of seven empirical propagation model were simulated and compared with results of measurements of received signal strength in Non-Line of Sight (NLOS) scenario for Accra, Ghana on 2300 MHz. The study terrain is similar to most cities on the coast of West Africa. Correction factors were computed and applied to original propagation model equations and the Ericsson 9999 model showed the best fit to the measurement data, thus it can be used to predict received signal strength for Accra and other environments with similar terrains.
4G, Propagation Models, Received Signal Strength, LTE, Path Loss, NLOS.
P K Garg1, R D Garg1 and Apurva Agrawal2, 1Department of Civil Engineering, Indian Institute of Technology, Roorkee, Indiap.,2Master of Technology Student, Department of Civil Engineering, Indian Institute ofTechnology, Roorkee, India
This study focusses on developing a WebGIS system to support distributed asset management. Asset management is an economic approach adopted by organizations to help planning and decision making. It is an organized infrastructure management system which aims to improve the usability and functionality of the assets. The aim of this study is to maximize the potential of asset management and find an optimal way to integrate it with geographic information system (GIS) while leveraging the capabilities of web. The main objective of the proposed work is to create geodatabase of assets owned by an organisation as well as create a WebGIS application for visualization, analysis and querying of data. The final product contains three main functional modules. The site map is presented both in AutoCAD and GIS format. A query system is developed. These modules are integrated in a user-friendly and secure interface. The Web GIS development cycle is described in terms of four major activities i.e., requirement analysis, system and software design, application development and Web GIS use and maintenance. The application development is further divided into several stages to provide successful implementation. A fully functioning web portal and a geodatabase of assets is realised upon completion which is intended to provide an asset management transparency for public. In addition, it also provides an analysis capability for supporting decision making in the organization.
WebGIS, Asset Management, Geodatabase, System and Software Design.
Seyyed Rohollah Mirhoseini1, ehrouz Minaei-Bidgoli 2, Rahil Hosseini3 and Bahareh Shaker-Ardakani1, 1Department of Computer Engineering Islamic Azad University North Tehran branch Tehran, Iran, 2Department of Computer Engineering Iran University of Science and Technology Tehran, Iran, 3Department of Computer Engineering, Shahr-e-Qods Branch, Islamic Azad University, Tehran, Iran
Today there are more than 4.39 billion internet users that almost 70 percent of them use social media on mobile devices. Network security is one of the most important aspects to consider while working over the internet, LAN or other networks, no matter how small or big your business is. We know many zero day attacks are continuously emerging because of the addition of various protocols mainly from Internet of Things (IoT). previously known attacks in cyberattacks can detect by using Artificial Intelligence (AI) solutions such as Neural Networks, Machine Learning (ML), Support Vector Machine (SVM), decision tree, Hidden Markov Model (HMM), Hierarchical Clustering, Game Theory (GT), and Natural Language Processing (NLP). But advanced mechanisms of AI are not able to detect all of attacks. On the other hand Deep Learning (DL) techniques which are capable of providing embedded intelligence in the IoT devices and networks, are emerged to cope with different security problems. Then we used Convolutional Neural Network (CNN) and Genetic Algorithm.
Network security, Convolutional Neural Network (CNN), Deep Learning and Genetic Algorithm.
Chaitanyateja Thotadi1, Monith Debbalav1, Subba Rao1, Alavalapati Goutham Reddy2*, Basker Palaniswamy3, Vanga Odelu1, 1National Institute of Technology, Andhra Pradesh, India, 2Fontbonne University, St. Louis, USA, 3Queensland University of Technology, Brisbane, Australia, 4Indian Institute of Infromation Technology Sri City, Chittoor, India
Social network providers offer a variety of entertainment services in exchange for end users’ personal information, such as their identity. The majority of users access social networking sites via their smartphones, which they utilize in conjunction with a traditional authenticator like a password. On the other hand, aggregators, which pull content from multiple social networks, are often used to get into smartphone apps that may involve mobile ticketing, identification, and access control. They are a potential target for malware and spyware injections due to their powerful position. Malware is capable of circumventing authentication mechanisms in order to get access to social networking services, which may result in stealing the personal information of users. To deflect any type of attack from malicious software, BrightPass [22], a malware-resistant method based on screen brightness, was introduced. Conversely, we have demonstrated that the BrightPass user’s personally identifiable information, such as PIN numbers, may be recovered by evaluating the variations between the recorded input from many authentication sessions. We have then offered various enhanced BrightPass versions to address the observed vulnerability. Our enhanced BrightPass versions are both simple and secure to use when it comes to accessing social networks via mobiles.
Smartphones, Social Networks, Malware, Authentication, Security.