June 17 ~ 18, 2023, Sydney, Australia
Frederick Abban, Dr. Koudjo M. KoumadiDepartment of Computer Engineering, University of Ghana, Legon, Ghana
The universal exponential increase in the demand for high data rate for mobile devices has propelled lots of research in wireless communication. Deploying and implementing a wireless network in a particular geographical area requires proper planning since all existing propagation models are not “one size fit all” models. In this study, path losses of seven empirical propagation model were simulated and compared with results of measurements of received signal strength in Non-Line of Sight (NLOS) scenario for Accra, Ghana on 2300 MHz. The study terrain is similar to most cities on the coast of West Africa. Correction factors were computed and applied to original propagation model equations and the Ericsson 9999 model showed the best fit to the measurement data, thus it can be used to predict received signal strength for Accra and other environments with similar terrains.
4G, Propagation Models, Received Signal Strength, LTE, Path Loss, NLOS.
P K Garg1, R D Garg1 and Apurva Agrawal2, 1Department of Civil Engineering, Indian Institute of Technology, Roorkee, Indiap.,2Master of Technology Student, Department of Civil Engineering, Indian Institute ofTechnology, Roorkee, India
This study focusses on developing a WebGIS system to support distributed asset management. Asset management is an economic approach adopted by organizations to help planning and decision making. It is an organized infrastructure management system which aims to improve the usability and functionality of the assets. The aim of this study is to maximize the potential of asset management and find an optimal way to integrate it with geographic information system (GIS) while leveraging the capabilities of web. The main objective of the proposed work is to create geodatabase of assets owned by an organisation as well as create a WebGIS application for visualization, analysis and querying of data. The final product contains three main functional modules. The site map is presented both in AutoCAD and GIS format. A query system is developed. These modules are integrated in a user-friendly and secure interface. The Web GIS development cycle is described in terms of four major activities i.e., requirement analysis, system and software design, application development and Web GIS use and maintenance. The application development is further divided into several stages to provide successful implementation. A fully functioning web portal and a geodatabase of assets is realised upon completion which is intended to provide an asset management transparency for public. In addition, it also provides an analysis capability for supporting decision making in the organization.
WebGIS, Asset Management, Geodatabase, System and Software Design.
Shuaiqian Yuan1, Xiangdong Jia1,2, Tongjian Shang1, Yangyang Sun1, 1College of Computer Science and Engineering, Northwest Normal University, Lanzhou, China, 2Wireless Communication Key Lab of Jiangsu Province, Nanjing University of Posts and Telecommunications, Nanjing, China
In order to solve the problem of limited channel resources of the Internet of Things (IoT) and improve the information timeliness of IoT system, a multi-access Cognitive Radio (CR) IoT system model was considered. The model included one Primary User (PU) and two Secondary User (SU) nodes. PU had spectrum access rights, and two SU could share the PU spectrum. Both SUs had Age of Information (AoI) oriented data streams. The difference was that the first user cannot control the generation of status updates and can only generate status updates according to a certain probability, while the second user generated status updates according to any generation strategy. Receiver adopted multiple antennas and transmitter adopted single antenna. Under the constraint of the main user, the average age of information of the First Secondary User node in the First Come First Served (FCFS), Last Come Last Served (LCLS) and the packet dropping queue was analyzed respectively. Then the average age of information of the second user node in the threshold strategy was derived. Finally, an optimization problem was proposed to minimize the average age of information of the first user and lower the average age of information of the second user than the given threshold. The constraint condition of the problem was convex, but the objective function was non-convex, so a suboptimal technique was introduced and the optimal solution was obtained by double convex optimization algorithm. Simulation results show the performance of the proposed algorithm under different system parameters.
Age of Information, Cognitive radio, Double convex optimization, Multiple access channel, Threshold strategy.
Seyyed Rohollah Mirhoseini1, ehrouz Minaei-Bidgoli 2, Rahil Hosseini3 and Bahareh Shaker-Ardakani1, 1Department of Computer Engineering Islamic Azad University North Tehran branch Tehran, Iran, 2Department of Computer Engineering Iran University of Science and Technology Tehran, Iran, 3Department of Computer Engineering, Shahr-e-Qods Branch, Islamic Azad University, Tehran, Iran
Today there are more than 4.39 billion internet users that almost 70 percent of them use social media on mobile devices. Network security is one of the most important aspects to consider while working over the internet, LAN or other networks, no matter how small or big your business is. We know many zero day attacks are continuously emerging because of the addition of various protocols mainly from Internet of Things (IoT). previously known attacks in cyberattacks can detect by using Artificial Intelligence (AI) solutions such as Neural Networks, Machine Learning (ML), Support Vector Machine (SVM), decision tree, Hidden Markov Model (HMM), Hierarchical Clustering, Game Theory (GT), and Natural Language Processing (NLP). But advanced mechanisms of AI are not able to detect all of attacks. On the other hand Deep Learning (DL) techniques which are capable of providing embedded intelligence in the IoT devices and networks, are emerged to cope with different security problems. Then we used Convolutional Neural Network (CNN) and Genetic Algorithm.
Network security, Convolutional Neural Network (CNN), Deep Learning and Genetic Algorithm.
Chaitanyateja Thotadi1, Monith Debbalav1, Subba Rao1, Alavalapati Goutham Reddy2*, Basker Palaniswamy3, Vanga Odelu1, 1National Institute of Technology, Andhra Pradesh, India, 2Fontbonne University, St. Louis, USA, 3Queensland University of Technology, Brisbane, Australia, 4Indian Institute of Infromation Technology Sri City, Chittoor, India
Social network providers offer a variety of entertainment services in exchange for end users’ personal information, such as their identity. The majority of users access social networking sites via their smartphones, which they utilize in conjunction with a traditional authenticator like a password. On the other hand, aggregators, which pull content from multiple social networks, are often used to get into smartphone apps that may involve mobile ticketing, identification, and access control. They are a potential target for malware and spyware injections due to their powerful position. Malware is capable of circumventing authentication mechanisms in order to get access to social networking services, which may result in stealing the personal information of users. To deflect any type of attack from malicious software, BrightPass [22], a malware-resistant method based on screen brightness, was introduced. Conversely, we have demonstrated that the BrightPass user’s personally identifiable information, such as PIN numbers, may be recovered by evaluating the variations between the recorded input from many authentication sessions. We have then offered various enhanced BrightPass versions to address the observed vulnerability. Our enhanced BrightPass versions are both simple and secure to use when it comes to accessing social networks via mobiles.
Smartphones, Social Networks, Malware, Authentication, Security.
Fatai Jimoh1, Mo Saraee2, Azar Shahgholian3, 1,2School of Engineering Science and Humanity, University of Salford, United Kingdom, 3Liverpool Business School, Liverpool John Moore University, Liverpool, United Kingdom
The conventional data mining approach to crime prediction models often depends on historical data. However, considering the current global crime trend where offenders frequently register their criminal intent on social media and also invite others to witness and/or participate in various crimes, there is a need for an alternative and more dynamic approach.This paper, therefore, applied an ensemble of machine learning algorithms to reducethe crime rate in Manchester cities by combining historical crime data with tweet data. To overcome the problem with data qualities and bias in our prediction we ensured that all the features used in this work were from the same year and same month. The ensembled method showed the highest performance in predicting different categories of crimes with the highest accuracy when compared with base models and our study also revealed the contribution of sentiment score to the overall performance of the model. Finally, we conclude that social media data if properly mined would contribute to an improved prediction on the likelihood of crimes occurrence as well as their prediction.
Data Mining, Crime Prediction, Machine learning, Sentiment Analysis, Stacked Ensemble.
Ariestelo A. Asilo1,2, Czarina Anne A. Villareiz1, Arnan B. Araza3, Jose Arnold S. Bagabaldo4, and Francis G. Balazon5, 1Varacco Inc & 2ThinnkFarm, 3Wageningen University and Research, 4Packetworx, 5Batangas State University, The National Engineering University Lipa Campus
This study focuses on the use of Internet of Things (IoT) devices for monitoring microclimate conditions in coffee production, specifically in the highland and lowland areas of the Philippines. The aim is to assess the effectiveness and accuracy of IoT-based data in decision-making for farm interventions, compared to data from the well-known weather prediction app AccuWeather. This comparison is important in developing prediction models useful for upscaling the study to other farms. The results show that there are systematic differences in the temperature, relative humidity, and amount of rainfall data collected by the two methods, indicating the importance of on-site IoT devices for localized microclimate monitoring. However, the study also highlights some challenges in the implementation of IoT, such as malfunctions and hardware issues. This research underscores the need for further testing and calibration of IoT devices in coffee production, as well as the establishment of a localized Good Agricultural Practices (GAP) reinforced by IoT-based microclimate conditions.
Coffee, IoT, Microclimate, Wireless Sensor.