首页 > 最新文献

2023 2nd International Conference on Edge Computing and Applications (ICECAA)最新文献

英文 中文
AI-based Leaf Disease Identification Robot using IoT Approach 基于物联网方法的人工智能叶片病害识别机器人
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212373
P. Nagaraj, T. Rajkumar, S. Rakesh, A.Kavya Siva Durga, M. Jyothi, Ch. Guru Sai Nithin
Every area of the global economy has seen great advancements thanks to artificial intelligence, and agronomy is no exception. Modern agricultural farming faces great challenges in the cultivation of healthy crops. The “Internet of Things” is a system made up of actuators, sensors, or both that either directly or indirectly connect devices to the Internet. The development of the Internet of Things (IoT) can be used in smart farming to improve the standard of agriculture. The foundation of the Indian economy, agriculture, contributes to the country's overall economic growth. Yet, because of the usage of antiquated farming technology and the fact that individuals from rural areas now go to urban areas for more lucrative businesses rather than concentrating on agriculture, the obtained productivity is quite low compared to global standards. This artificial intelligence assists in increasing crop productivity and identifies or keeps track of crop illnesses. based on artificial intelligence to identify crop or leaf diseases, a robot or equipment has been created. It distinguishes or categorizes the plant as either disease-affected or unaffected. Image segmentation is a technique used to isolate the specific disease's affected area. This system's classification of diseased leaves offers farmers a better course of action. Faster feature collection, feature extraction, and illness classification methods based on R-CNN identify the disease afflicted.
由于人工智能,全球经济的各个领域都取得了巨大的进步,农学也不例外。现代农业在培育健康作物方面面临着巨大的挑战。“物联网”是一个由执行器、传感器或两者组成的系统,它直接或间接地将设备连接到互联网。物联网(IoT)的发展可以应用于智慧农业,提高农业水平。农业是印度经济的基础,对该国的整体经济增长做出了贡献。然而,由于使用过时的农业技术,以及农村地区的个人现在去城市地区从事更有利可图的业务,而不是专注于农业,与全球标准相比,获得的生产力相当低。这种人工智能有助于提高作物产量,并识别或跟踪作物病害。利用人工智能识别农作物或叶片病害的机器人或设备已经诞生。它将植物区分为受疾病影响的或未受疾病影响的。图像分割是一种用于分离特定疾病影响区域的技术。该系统对病叶的分类为农民提供了更好的行动方案。基于R-CNN的更快的特征收集、特征提取和疾病分类方法可以识别所困扰的疾病。
{"title":"AI-based Leaf Disease Identification Robot using IoT Approach","authors":"P. Nagaraj, T. Rajkumar, S. Rakesh, A.Kavya Siva Durga, M. Jyothi, Ch. Guru Sai Nithin","doi":"10.1109/ICECAA58104.2023.10212373","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212373","url":null,"abstract":"Every area of the global economy has seen great advancements thanks to artificial intelligence, and agronomy is no exception. Modern agricultural farming faces great challenges in the cultivation of healthy crops. The “Internet of Things” is a system made up of actuators, sensors, or both that either directly or indirectly connect devices to the Internet. The development of the Internet of Things (IoT) can be used in smart farming to improve the standard of agriculture. The foundation of the Indian economy, agriculture, contributes to the country's overall economic growth. Yet, because of the usage of antiquated farming technology and the fact that individuals from rural areas now go to urban areas for more lucrative businesses rather than concentrating on agriculture, the obtained productivity is quite low compared to global standards. This artificial intelligence assists in increasing crop productivity and identifies or keeps track of crop illnesses. based on artificial intelligence to identify crop or leaf diseases, a robot or equipment has been created. It distinguishes or categorizes the plant as either disease-affected or unaffected. Image segmentation is a technique used to isolate the specific disease's affected area. This system's classification of diseased leaves offers farmers a better course of action. Faster feature collection, feature extraction, and illness classification methods based on R-CNN identify the disease afflicted.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122344373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Deep IoT Network-Driven Anomaly Detection using Multi-Scale Deep Representation Learning 基于多尺度深度表征学习的混合深度物联网网络驱动异常检测
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212368
M. Minu, K. Reddy, DouleNithishkumar, AmbadasRithvikBhargav
Due to the exponential increase in IoT device production, the IoT (Internet of Things) business has experienced rapid expansion on the market, which gives attackers a larger attack surface from which to launch potentially more devastating assaults. There has been a rise in cyber-attacks. When intruders perform cyber-attacks utilizing unique and inventive ways, many of these attacks have effectively fulfilled the maliciousintentions. Conventional machine learning approaches seem ineffective in the context of unanticipated network technology and various penetration strategies. The introduction of new vulnerabilities is a result of cyber-physical applications leveraging Internet of Things (IoT) devices. Because of the cross-domain, cross-layer, and multidisciplinary nature of the emerging security and dependability concerns, a comprehensive solution is required.
由于物联网设备产量呈指数级增长,物联网业务在市场上迅速扩张,这为攻击者提供了更大的攻击面,从而可以发动更具破坏性的攻击。网络攻击有所增加。当入侵者利用独特和创造性的方式进行网络攻击时,许多攻击有效地实现了恶意意图。传统的机器学习方法在意想不到的网络技术和各种渗透策略的背景下似乎是无效的。引入新的漏洞是利用物联网(IoT)设备的网络物理应用程序的结果。由于出现的安全性和可靠性问题具有跨领域、跨层和多学科的性质,因此需要一个全面的解决方案。
{"title":"A Hybrid Deep IoT Network-Driven Anomaly Detection using Multi-Scale Deep Representation Learning","authors":"M. Minu, K. Reddy, DouleNithishkumar, AmbadasRithvikBhargav","doi":"10.1109/ICECAA58104.2023.10212368","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212368","url":null,"abstract":"Due to the exponential increase in IoT device production, the IoT (Internet of Things) business has experienced rapid expansion on the market, which gives attackers a larger attack surface from which to launch potentially more devastating assaults. There has been a rise in cyber-attacks. When intruders perform cyber-attacks utilizing unique and inventive ways, many of these attacks have effectively fulfilled the maliciousintentions. Conventional machine learning approaches seem ineffective in the context of unanticipated network technology and various penetration strategies. The introduction of new vulnerabilities is a result of cyber-physical applications leveraging Internet of Things (IoT) devices. Because of the cross-domain, cross-layer, and multidisciplinary nature of the emerging security and dependability concerns, a comprehensive solution is required.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122548664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malicious Webpage Detection Based on Feature Fusion Using Natural Language Processing and Machine Learning 基于自然语言处理和机器学习特征融合的恶意网页检测
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212120
P. G, Devi R
Malicious websites are purposefully designed to deceive internet users to steal sensitive personal information, infect the victim's system with malware, cause financial losses, and damage the victim's reputation. Finding these pages or links is hard for internet users. Such websites are discovered using detection tools. The majority of detection techniques use blacklisting or whitelisting strategies to find and prevent malicious websites. However, compiling such a sizable list of website links is a time-consuming job that is challenging to update regularly. Therefore, the researchers employ machine learning-based methods to identify these fraudulent connections. These methods are based on the features taken from URLs or web pages. Additionally, features such as DNS details, webpage reputation, and visual similarity data are used. However, these features are few and do not fully utilize the URLs or website contents. This work focuses on merging URL lexical features and content-based features for malicious webpage detection in order to fully exploit the dataset's potential. Natural language processing methods like Hashing, Count, and Term Frequency - Inverse Document Frequency (TF-IDF) vectorizers are employed to extract features from the content of Web pages. The suggested approach's efficiency is evaluated by using the most well-known machine learning methods. The outcome shows that the Count vectorizer with Random Forest achieves a higher accuracy of 91.17% with 500 features.
恶意网站是有目的地欺骗互联网用户窃取敏感的个人信息,用恶意软件感染受害者的系统,造成经济损失,损害受害者的声誉。互联网用户很难找到这些页面或链接。这些网站是通过检测工具发现的。大多数检测技术使用黑名单或白名单策略来查找和阻止恶意网站。然而,编制如此庞大的网站链接列表是一项耗时的工作,并且具有定期更新的挑战性。因此,研究人员采用基于机器学习的方法来识别这些欺诈性连接。这些方法基于从url或网页中获取的特性。此外,还使用了DNS详细信息、网页声誉和视觉相似性数据等功能。然而,这些功能很少,并没有充分利用网址或网站内容。这项工作的重点是合并URL词法特征和基于内容的特征来检测恶意网页,以充分利用数据集的潜力。使用哈希、计数和术语频率-逆文档频率(TF-IDF)矢量器等自然语言处理方法从Web页面的内容中提取特征。通过使用最著名的机器学习方法来评估所建议方法的效率。结果表明,随机森林的计数矢量器在500个特征的情况下,准确率达到了91.17%。
{"title":"Malicious Webpage Detection Based on Feature Fusion Using Natural Language Processing and Machine Learning","authors":"P. G, Devi R","doi":"10.1109/ICECAA58104.2023.10212120","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212120","url":null,"abstract":"Malicious websites are purposefully designed to deceive internet users to steal sensitive personal information, infect the victim's system with malware, cause financial losses, and damage the victim's reputation. Finding these pages or links is hard for internet users. Such websites are discovered using detection tools. The majority of detection techniques use blacklisting or whitelisting strategies to find and prevent malicious websites. However, compiling such a sizable list of website links is a time-consuming job that is challenging to update regularly. Therefore, the researchers employ machine learning-based methods to identify these fraudulent connections. These methods are based on the features taken from URLs or web pages. Additionally, features such as DNS details, webpage reputation, and visual similarity data are used. However, these features are few and do not fully utilize the URLs or website contents. This work focuses on merging URL lexical features and content-based features for malicious webpage detection in order to fully exploit the dataset's potential. Natural language processing methods like Hashing, Count, and Term Frequency - Inverse Document Frequency (TF-IDF) vectorizers are employed to extract features from the content of Web pages. The suggested approach's efficiency is evaluated by using the most well-known machine learning methods. The outcome shows that the Count vectorizer with Random Forest achieves a higher accuracy of 91.17% with 500 features.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122948963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Standalone Edge IoT Device for Traffic Volume Counting in Smart Cities 智能独立边缘物联网设备,用于智能城市的交通量统计
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212184
A. Philip, Amal Jacob, Tejus K, A. S, Aakash Ashok, Divya Kb
Traffic volume counting survey helps to get an analysis of number and class of vehicles passing through a particular road segment over a period. The work proposes design and development of a standalone edge device to obtain count of vehicles on road based on category like car, bus, truck, two wheeler and auto rickshaws. The YOLO v8 model along with Deep Sort algorithm is deployed over Jetson nano proposed as an edge device. An interactive dashboard is designed to obtain the count and class of each vehicle by specifying a time. The deep learning models are trained using custom real-world datasets and further optimized to be deployed on Jetson nano. Thus, Jetson nano serves as an edge IoT device for vehicle counting. The analysis of the proposed model indicates promising results.
交通量统计调查有助于分析在一段时间内通过特定路段的车辆数量和类别。这项工作建议设计和开发一个独立的边缘设备,以获得道路上的车辆数量,基于汽车、公共汽车、卡车、两轮车和机动三轮车等类别。YOLO v8模型和深度排序算法部署在Jetson nano作为边缘设备。设计了一个交互式仪表板,通过指定时间来获取每辆车的数量和类别。深度学习模型使用定制的真实世界数据集进行训练,并进一步优化以部署在Jetson nano上。因此,Jetson nano可以作为车辆计数的边缘物联网设备。对所提模型的分析显示出令人满意的结果。
{"title":"Smart Standalone Edge IoT Device for Traffic Volume Counting in Smart Cities","authors":"A. Philip, Amal Jacob, Tejus K, A. S, Aakash Ashok, Divya Kb","doi":"10.1109/ICECAA58104.2023.10212184","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212184","url":null,"abstract":"Traffic volume counting survey helps to get an analysis of number and class of vehicles passing through a particular road segment over a period. The work proposes design and development of a standalone edge device to obtain count of vehicles on road based on category like car, bus, truck, two wheeler and auto rickshaws. The YOLO v8 model along with Deep Sort algorithm is deployed over Jetson nano proposed as an edge device. An interactive dashboard is designed to obtain the count and class of each vehicle by specifying a time. The deep learning models are trained using custom real-world datasets and further optimized to be deployed on Jetson nano. Thus, Jetson nano serves as an edge IoT device for vehicle counting. The analysis of the proposed model indicates promising results.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124192172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Text Feedback Classification using Machine Learning Techniques 使用机器学习技术的文本反馈分类
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212398
Dr. E.Elakiya, Dr. S. Deepa Nivethika, Dr. R. Kanagaraj, Dr.R.Sujithra, Tejus Paturu, Student
The popularity of online shopping has grown worldwide, making it an integral part of many people's lives. As customers are free to express their emotions online, online sales have become a significant source of revenue. This enables obtaining honest feedback for various products, helping to understand not only what is popular but also the overall consensus. To make sense of the large amounts of product feedback and gauge the public's response, it is important to understand the widely held sentiments. Machine learning models provide a solution to extract feedback from text. Random Forest classifier produces the highest accuracy of 88 percentage.
网上购物在全球范围内越来越受欢迎,使其成为许多人生活中不可或缺的一部分。由于顾客可以在网上自由表达自己的情感,网上销售已经成为一个重要的收入来源。这样可以获得各种产品的真实反馈,不仅有助于了解流行产品,还有助于了解总体共识。为了理解大量的产品反馈并衡量公众的反应,理解广泛持有的情绪是很重要的。机器学习模型提供了从文本中提取反馈的解决方案。随机森林分类器的准确率最高,达到88%。
{"title":"Text Feedback Classification using Machine Learning Techniques","authors":"Dr. E.Elakiya, Dr. S. Deepa Nivethika, Dr. R. Kanagaraj, Dr.R.Sujithra, Tejus Paturu, Student","doi":"10.1109/ICECAA58104.2023.10212398","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212398","url":null,"abstract":"The popularity of online shopping has grown worldwide, making it an integral part of many people's lives. As customers are free to express their emotions online, online sales have become a significant source of revenue. This enables obtaining honest feedback for various products, helping to understand not only what is popular but also the overall consensus. To make sense of the large amounts of product feedback and gauge the public's response, it is important to understand the widely held sentiments. Machine learning models provide a solution to extract feedback from text. Random Forest classifier produces the highest accuracy of 88 percentage.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"93 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127982828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review on Deep Learning Based Biomedical Waste Detection and Classification 基于深度学习的生物医学废物检测与分类研究综述
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212343
Srushti Bobe, Priyanka Adhav, Omkar Bhalerao, Sandeep Chaware
Public health and the environment are in danger from the poor handling of biomedical waste produced by medical institutions and biomedical research institutes. The necessity for a system to detect and categorize biomedical waste products is brought on by the fact that the current human sorting procedure is not only ineffective but also risky for waste handlers and garbage collectors. In the existing system, the identified problem highlights the inefficiency and risks associated with manual sorting. In order to improve safety, effectiveness, and environmental sustainability in biomedical waste management practises, this study suggests a deep learning-based system that makes use of convolutional neural networks (CNNs) to reliably recognize and categorize items that are part of biomedical waste. The proposed approach might eventually achieve a 90% accuracy rate, which could result in cost savings and a decrease in the dangers related with manual sorting.
医疗机构和生物医学研究所产生的生物医学废物处理不当,危及公共卫生和环境。由于目前的人工分类程序不仅效率低下,而且对废物处理者和垃圾收集者来说也存在风险,因此有必要建立一个检测和分类生物医学废物的系统。在现有系统中,发现的问题突出了人工分拣的低效率和风险。为了提高生物医学废物管理实践的安全性、有效性和环境可持续性,本研究提出了一种基于深度学习的系统,该系统利用卷积神经网络(cnn)可靠地识别和分类生物医学废物的一部分。所提出的方法最终可能达到90%的准确率,这可能会节省成本,并减少与人工分拣相关的危险。
{"title":"Review on Deep Learning Based Biomedical Waste Detection and Classification","authors":"Srushti Bobe, Priyanka Adhav, Omkar Bhalerao, Sandeep Chaware","doi":"10.1109/ICECAA58104.2023.10212343","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212343","url":null,"abstract":"Public health and the environment are in danger from the poor handling of biomedical waste produced by medical institutions and biomedical research institutes. The necessity for a system to detect and categorize biomedical waste products is brought on by the fact that the current human sorting procedure is not only ineffective but also risky for waste handlers and garbage collectors. In the existing system, the identified problem highlights the inefficiency and risks associated with manual sorting. In order to improve safety, effectiveness, and environmental sustainability in biomedical waste management practises, this study suggests a deep learning-based system that makes use of convolutional neural networks (CNNs) to reliably recognize and categorize items that are part of biomedical waste. The proposed approach might eventually achieve a 90% accuracy rate, which could result in cost savings and a decrease in the dangers related with manual sorting.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129326102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Electric Vehicle (EVs) Charging Network Management Using Bidirectional GRU - AM Approaches 基于双向GRU - AM方法的智能电动汽车充电网络管理
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212236
M. A. Gandhi, K. Priya, Piyush Charan, Ritu Sharma, G. Rao, D. Suganthi
Electric Vehicles (EVs) are now essential since electrifying transportation has shown to be a game-changer in raising the sustainable and eco-friendly platform in global industry. Integrating Electric Vehicle Charging System (EVCS) as a new entity into the power distribution system is one of the most important and challenging concerns. The development of an EVCS network infrastructure is a key step toward the broad adoption of EVs. In order to make informed judgments about transmission, distribution, energy allocation, and charging station placement, the control center or central aggregator must have an accurate forecast of occupancy, consumption, and energy or charging demand. Data analytics and other methods have made it possible to regularly get information from the EVCS for the purposes of archiving and processing all of the data collected. This proposed approach to presents a solution to the aforementioned problems with energy demand forecasting for EVCS networks. Three steps make up the proposed method: preprocessing, feature selection, and model performance evaluation. Preprocessing data via normalization, feature selection by K-Means, and ultimately model evaluation via K-means. The proposed model has superior results to the LSTM, GRU, and BIGRU - AM models.
电动汽车(ev)现在是必不可少的,因为电气化交通已被证明是在全球工业中提高可持续和环保平台的游戏规则改变者。将电动汽车充电系统(EVCS)作为一种新型实体整合到配电系统中是目前最重要和最具挑战性的问题之一。EVCS网络基础设施的发展是实现电动汽车广泛采用的关键一步。为了对输电、配电、能源分配和充电站布局做出明智的判断,控制中心或中央聚合器必须对占用、消耗和能源或充电需求进行准确的预测。数据分析和其他方法可以定期从EVCS获取信息,以便存档和处理收集到的所有数据。该方法为EVCS网络的能源需求预测问题提供了一种解决方案。该方法由预处理、特征选择和模型性能评估三个步骤组成。通过归一化预处理数据,通过K-Means进行特征选择,最终通过K-Means进行模型评估。该模型与LSTM、GRU和BIGRU - AM模型相比,具有较好的效果。
{"title":"Smart Electric Vehicle (EVs) Charging Network Management Using Bidirectional GRU - AM Approaches","authors":"M. A. Gandhi, K. Priya, Piyush Charan, Ritu Sharma, G. Rao, D. Suganthi","doi":"10.1109/ICECAA58104.2023.10212236","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212236","url":null,"abstract":"Electric Vehicles (EVs) are now essential since electrifying transportation has shown to be a game-changer in raising the sustainable and eco-friendly platform in global industry. Integrating Electric Vehicle Charging System (EVCS) as a new entity into the power distribution system is one of the most important and challenging concerns. The development of an EVCS network infrastructure is a key step toward the broad adoption of EVs. In order to make informed judgments about transmission, distribution, energy allocation, and charging station placement, the control center or central aggregator must have an accurate forecast of occupancy, consumption, and energy or charging demand. Data analytics and other methods have made it possible to regularly get information from the EVCS for the purposes of archiving and processing all of the data collected. This proposed approach to presents a solution to the aforementioned problems with energy demand forecasting for EVCS networks. Three steps make up the proposed method: preprocessing, feature selection, and model performance evaluation. Preprocessing data via normalization, feature selection by K-Means, and ultimately model evaluation via K-means. The proposed model has superior results to the LSTM, GRU, and BIGRU - AM models.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128730095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Deep Learning-Based Malware Detection Scheme Considering Packers and Encryption 一种考虑封装和加密的基于深度学习的恶意软件检测方案
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212205
Wei Cai
With the continuous improvement of the current level of information technology, the malicious software produced by attackers is also becoming more complex. It's difficult for computer users to protect themselves against malicious software attacks. Malicious software can steal the user's privacy, damage the user's computer system, and often cause serious consequences and huge economic losses to the user or the organization. Hence, this research study presents a novel deep learning-based malware detection scheme considering packers and encryption. The proposed model has 2 aspects of innovations: (1) Generation steps of the packer malware is analyzed. Packing involves adding code to the program to be protected, and original program is compressed and encrypted during the packing process. By understanding this step, the analysis of the software will be efficient. (2) The deep learning based detection model is designed. Through the experiment compared with the latest methods, the performance is proven to be efficient.
随着当前信息技术水平的不断提高,攻击者制作的恶意软件也越来越复杂。计算机用户很难保护自己免受恶意软件的攻击。恶意软件可以窃取用户的隐私,破坏用户的计算机系统,往往会给用户或组织造成严重的后果和巨大的经济损失。因此,本研究提出了一种新的基于深度学习的恶意软件检测方案,该方案考虑了封装器和加密。该模型有两个方面的创新:(1)分析了恶意软件的生成步骤。打包是在要保护的程序中加入代码,在打包过程中对原始程序进行压缩和加密。通过理解这一步,软件的分析将是高效的。(2)设计了基于深度学习的检测模型。通过实验与最新方法进行比较,证明了该方法的有效性。
{"title":"A Novel Deep Learning-Based Malware Detection Scheme Considering Packers and Encryption","authors":"Wei Cai","doi":"10.1109/ICECAA58104.2023.10212205","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212205","url":null,"abstract":"With the continuous improvement of the current level of information technology, the malicious software produced by attackers is also becoming more complex. It's difficult for computer users to protect themselves against malicious software attacks. Malicious software can steal the user's privacy, damage the user's computer system, and often cause serious consequences and huge economic losses to the user or the organization. Hence, this research study presents a novel deep learning-based malware detection scheme considering packers and encryption. The proposed model has 2 aspects of innovations: (1) Generation steps of the packer malware is analyzed. Packing involves adding code to the program to be protected, and original program is compressed and encrypted during the packing process. By understanding this step, the analysis of the software will be efficient. (2) The deep learning based detection model is designed. Through the experiment compared with the latest methods, the performance is proven to be efficient.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115986711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generating New Human Faces and Improving the Quality of Images Using Generative Adversarial Networks(GAN) 基于生成对抗网络(GAN)的人脸生成与图像质量改进
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212099
Vamsi sai Krishna Katta, HarshaVardhan Kapalavai, Sourav Mondal
In recent years, deep learning models have gained popularity for producing realistic Images. Recent advancements in computer vision, particularly in deep generative models like GANs, have shown promise in synthesizing realistic images automatically. GANs use a competitive process involving two networks: a generative network and a discriminative network. The discriminative network determines whether an image is real or fake whereas the generative network generates artificial images. The generative network gains the ability to create more convincing images as training goes on in order to deceive the discriminative network. This research study intends to develop novel, high-resolution images of human faces by combining DCGAN (Deep Convolutional Generative Adversarial Network) with ESRGAN (Enhanced Super-Resolution Generative Adversarial Networks). DCGAN is a type of GAN that uses convolutional neural networks in both the generator and discriminator. The generator network learns to produce images from random noise, while the discriminator network learns to differentiate between real and fake images. Further, this study has used the CelebFaces Attributes Dataset (CelebA) to train the proposed DCGAN model, and the Structural Similarity Index (SSIM) to quantitatively evaluate the quality of the generated images. Additionally, ESRGAN is employed to improve the quality of the generated images. The obtained results reveal that combining DCGAN with ESRGAN produces high-quality human faces with clear details and improved resolution.
近年来,深度学习模型在生成逼真图像方面越来越受欢迎。计算机视觉的最新进展,特别是像gan这样的深度生成模型,已经显示出自动合成逼真图像的希望。gan使用一个竞争过程,涉及两个网络:一个生成网络和一个判别网络。判别网络判断图像的真假,而生成网络生成人工图像。随着训练的进行,生成网络获得了创造更多令人信服的图像的能力,以欺骗判别网络。本研究旨在通过将DCGAN(深度卷积生成对抗网络)与ESRGAN(增强型超分辨率生成对抗网络)相结合,开发新的高分辨率人脸图像。DCGAN是一种使用卷积神经网络作为生成器和鉴别器的GAN。生成器网络学习从随机噪声中生成图像,而鉴别器网络学习区分真实和虚假图像。此外,本研究使用名人面孔属性数据集(CelebA)来训练提出的DCGAN模型,并使用结构相似指数(SSIM)来定量评估生成的图像的质量。此外,ESRGAN用于提高生成图像的质量。结果表明,将DCGAN与ESRGAN相结合可以生成细节清晰、分辨率提高的高质量人脸。
{"title":"Generating New Human Faces and Improving the Quality of Images Using Generative Adversarial Networks(GAN)","authors":"Vamsi sai Krishna Katta, HarshaVardhan Kapalavai, Sourav Mondal","doi":"10.1109/ICECAA58104.2023.10212099","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212099","url":null,"abstract":"In recent years, deep learning models have gained popularity for producing realistic Images. Recent advancements in computer vision, particularly in deep generative models like GANs, have shown promise in synthesizing realistic images automatically. GANs use a competitive process involving two networks: a generative network and a discriminative network. The discriminative network determines whether an image is real or fake whereas the generative network generates artificial images. The generative network gains the ability to create more convincing images as training goes on in order to deceive the discriminative network. This research study intends to develop novel, high-resolution images of human faces by combining DCGAN (Deep Convolutional Generative Adversarial Network) with ESRGAN (Enhanced Super-Resolution Generative Adversarial Networks). DCGAN is a type of GAN that uses convolutional neural networks in both the generator and discriminator. The generator network learns to produce images from random noise, while the discriminator network learns to differentiate between real and fake images. Further, this study has used the CelebFaces Attributes Dataset (CelebA) to train the proposed DCGAN model, and the Structural Similarity Index (SSIM) to quantitatively evaluate the quality of the generated images. Additionally, ESRGAN is employed to improve the quality of the generated images. The obtained results reveal that combining DCGAN with ESRGAN produces high-quality human faces with clear details and improved resolution.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116423770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable Computing in Resource Allocation 资源分配中的可扩展计算
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212395
S. Kalarani, V. Sharmila, Suma. S, Jayakumari Ag, K. Sudha
Computational humanity is enormously voluminous and complex. One of the computing industry's fastest-growing approaches is cloud computing. It is a cutting-edge method for providing IT service over the World Wide Web. Through the Internet, this concept offers computing resources to users in a pool. Resource scheduling and allocation for various aggregate web services is a crucial and challenging problem in cloud computing. This research looks at resource allocation using scalable computing. Infrastructure as a Service (IaaS), or the service of renting out computer resources through the Internet, is offered to users by cloud computing. The client can select from a variety of computing resources depending on their needs. This approach uses the IaaS model to allocate resources for real-time tasks. Real-Time jobs must be finished ahead of schedules. Elasticity or scalable computing refers to the ability to scale up the resource in this situation in accordance with the demands. The resources are scalable and open to a vast user base. In order to finish real-time work ahead of schedules, the user can choose any number of Virtual Machines (VMs) based on speed and rate. The client leases the virtual machines. Hence the fee is set just for the duration of the rental. Additionally, a method is devised to assign VMs to programs with real-time tasks. The allocation is presented as a problem of restricted optimization.
计算人类是庞大而复杂的。云计算是计算机行业发展最快的方法之一。它是通过万维网提供信息技术服务的一种前沿方法。这个概念通过Internet向用户提供池中的计算资源。各种聚合web服务的资源调度和分配是云计算中的一个关键和具有挑战性的问题。本研究着眼于使用可伸缩计算的资源分配。基础设施即服务(IaaS),或通过互联网出租计算机资源的服务,是通过云计算提供给用户的。客户机可以根据自己的需要从各种计算资源中进行选择。这种方法使用IaaS模型为实时任务分配资源。实时作业必须提前完成。弹性或可扩展计算是指在这种情况下根据需求扩展资源的能力。这些资源是可扩展的,并向广大用户开放。为了提前完成实时工作,用户可以根据速度和速率选择任意数量的虚拟机(vm)。客户端租用虚拟机。因此,费用只是在租赁期间设定的。此外,还设计了一种将虚拟机分配给具有实时任务的程序的方法。分配是一个受限优化问题。
{"title":"Scalable Computing in Resource Allocation","authors":"S. Kalarani, V. Sharmila, Suma. S, Jayakumari Ag, K. Sudha","doi":"10.1109/ICECAA58104.2023.10212395","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212395","url":null,"abstract":"Computational humanity is enormously voluminous and complex. One of the computing industry's fastest-growing approaches is cloud computing. It is a cutting-edge method for providing IT service over the World Wide Web. Through the Internet, this concept offers computing resources to users in a pool. Resource scheduling and allocation for various aggregate web services is a crucial and challenging problem in cloud computing. This research looks at resource allocation using scalable computing. Infrastructure as a Service (IaaS), or the service of renting out computer resources through the Internet, is offered to users by cloud computing. The client can select from a variety of computing resources depending on their needs. This approach uses the IaaS model to allocate resources for real-time tasks. Real-Time jobs must be finished ahead of schedules. Elasticity or scalable computing refers to the ability to scale up the resource in this situation in accordance with the demands. The resources are scalable and open to a vast user base. In order to finish real-time work ahead of schedules, the user can choose any number of Virtual Machines (VMs) based on speed and rate. The client leases the virtual machines. Hence the fee is set just for the duration of the rental. Additionally, a method is devised to assign VMs to programs with real-time tasks. The allocation is presented as a problem of restricted optimization.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117258303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 2nd International Conference on Edge Computing and Applications (ICECAA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1