首页 > 最新文献

2018 International Conference on Computer Communication and Informatics (ICCCI)最新文献

英文 中文
Critical review of machine learning approaches to apply big data analytics in DDoS forensics 机器学习方法在DDoS取证中应用大数据分析的关键回顾
Pub Date : 2018-08-23 DOI: 10.1109/ICCCI.2018.8441286
Kian Son Hoon, Kheng Cher Yeo, S. Azam, Bharanidharan Shunmugam, F. De Boer
Distributed Denial of Service (DDoS) attacks are becoming more frequent and easier to execute. The sharp increase in network traffic presents challenges to conduct DDoS forensics. Despite different tools being developed, few take into account of the increase in network traffic. This research aims to recommend the best learning model for DDoS forensics. To this extend, the paper reviewed different literature to understand the challenges and opportunities of employing big data in DDoS forensics. Multiple simulations were carried out to compare the performance of different models. Two data mining tools WEKA and H2O were used to implement both supervised and unsupervised learning models. The training and testing of the models made use of intrusion dataset from oN-Line System - Knowledge Discovery & Data mining (NSL-KDD). The models are then evaluated according to their efficiency and accuracy. Overall, result shows that supervised learning algorithms perform better than unsupervised learning algorithms. It was found that Naïve Bayes, Gradient Boosting Machine and Distributed Random Forest are the most suitable model for DDoS detection because of its accuracy and time taken to train. Both Gradient Boosting Machine and Distributed Random Forest were further investigated to determine the parameters that can yield better accuracy. Future research can be extended by installing different DDoS detection models in an actual environment and compare their performances in actual attacks.
分布式拒绝服务(DDoS)攻击变得越来越频繁,也越来越容易执行。网络流量的急剧增加给DDoS取证带来了挑战。尽管开发了不同的工具,但很少考虑到网络流量的增加。本研究旨在推荐DDoS取证的最佳学习模型。为此,本文回顾了不同的文献,以了解在DDoS取证中使用大数据的挑战和机遇。为了比较不同模型的性能,进行了多次仿真。使用两个数据挖掘工具WEKA和H2O来实现有监督和无监督学习模型。模型的训练和测试使用了在线系统-知识发现与数据挖掘(NSL-KDD)的入侵数据集。然后根据模型的效率和准确性对其进行评估。总体而言,结果表明监督学习算法优于无监督学习算法。我们发现Naïve贝叶斯、梯度增强机和分布式随机森林是最适合DDoS检测的模型,因为它们的准确性和训练时间都比较短。对梯度增强机和分布式随机森林进行了进一步的研究,以确定能够产生更好精度的参数。未来的研究可以通过在实际环境中安装不同的DDoS检测模型,比较它们在实际攻击中的性能来扩展。
{"title":"Critical review of machine learning approaches to apply big data analytics in DDoS forensics","authors":"Kian Son Hoon, Kheng Cher Yeo, S. Azam, Bharanidharan Shunmugam, F. De Boer","doi":"10.1109/ICCCI.2018.8441286","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441286","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks are becoming more frequent and easier to execute. The sharp increase in network traffic presents challenges to conduct DDoS forensics. Despite different tools being developed, few take into account of the increase in network traffic. This research aims to recommend the best learning model for DDoS forensics. To this extend, the paper reviewed different literature to understand the challenges and opportunities of employing big data in DDoS forensics. Multiple simulations were carried out to compare the performance of different models. Two data mining tools WEKA and H2O were used to implement both supervised and unsupervised learning models. The training and testing of the models made use of intrusion dataset from oN-Line System - Knowledge Discovery & Data mining (NSL-KDD). The models are then evaluated according to their efficiency and accuracy. Overall, result shows that supervised learning algorithms perform better than unsupervised learning algorithms. It was found that Naïve Bayes, Gradient Boosting Machine and Distributed Random Forest are the most suitable model for DDoS detection because of its accuracy and time taken to train. Both Gradient Boosting Machine and Distributed Random Forest were further investigated to determine the parameters that can yield better accuracy. Future research can be extended by installing different DDoS detection models in an actual environment and compare their performances in actual attacks.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121577135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Detection of the effect of exercise on APG signals 检测运动对APG信号的影响
Pub Date : 2018-08-23 DOI: 10.1109/ICCCI.2018.8441251
J. Joseph, M. Jonkman, S. Azam, F. De Boer, D. Hill, Bharanidaran Shanmugam
Exercise is a key aspect of a healthy lifestyle. The purpose of this research is to investigate the effects of exercise on APG signals in a cool environment. Twenty seven healthy volunteers above the age of 18 years were selected for the experiments. They were asked to walk at a speed of 5 km/hour on a treadmill with an inclination of 1% for 30 minutes, which corresponds to moderate exercise. The PPG signals were collected before and immediately after the exercise. The second derivative is taken to find the APG and APG indices are calculated. After analysing the data it was found that c-d-e component of APG became smoother after exercise. The d-point depression became much less pronounced and disappeared completely in a number of cases. No significant change in the b/a and c/a indices was found for the subjects tested. Results indicate that the d-point depression is inversely related to the heart rate. It may, however, also affected by other variables, such as body temperature or blood flow distribution.
锻炼是健康生活方式的一个关键方面。本研究旨在探讨低温环境下运动对APG信号的影响。选取了27名年龄在18岁以上的健康志愿者进行实验。他们被要求在跑步机上以每小时5公里的速度行走30分钟,这相当于适度的运动。在运动前和运动后立即收集PPG信号。取二阶导数求APG,并计算APG指数。经数据分析发现,运动后APG的c-d-e成分变得更平滑。d点凹陷变得不那么明显,在许多病例中完全消失。测试对象的b/a和c/a指数没有明显变化。结果表明,d点下降与心率呈负相关。然而,它也可能受到其他变量的影响,如体温或血流分布。
{"title":"Detection of the effect of exercise on APG signals","authors":"J. Joseph, M. Jonkman, S. Azam, F. De Boer, D. Hill, Bharanidaran Shanmugam","doi":"10.1109/ICCCI.2018.8441251","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441251","url":null,"abstract":"Exercise is a key aspect of a healthy lifestyle. The purpose of this research is to investigate the effects of exercise on APG signals in a cool environment. Twenty seven healthy volunteers above the age of 18 years were selected for the experiments. They were asked to walk at a speed of 5 km/hour on a treadmill with an inclination of 1% for 30 minutes, which corresponds to moderate exercise. The PPG signals were collected before and immediately after the exercise. The second derivative is taken to find the APG and APG indices are calculated. After analysing the data it was found that c-d-e component of APG became smoother after exercise. The d-point depression became much less pronounced and disappeared completely in a number of cases. No significant change in the b/a and c/a indices was found for the subjects tested. Results indicate that the d-point depression is inversely related to the heart rate. It may, however, also affected by other variables, such as body temperature or blood flow distribution.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128364494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Categorisation of security threats for smart home appliances 智能家电的安全威胁分类
Pub Date : 2018-08-23 DOI: 10.1109/ICCCI.2018.8441213
Ayush Gai, S. Azam, Bharanidharan Shanmugam, M. Jonkman, F. De Boer
IoT (Internet of Things) refers to the daily use of devices connected to the Internet that can be controlled by a remote device such as mobile phones. This research focuses to identify and categorize the threats and create threat vectors for IoT based home appliances. Some previous research has been conducted by OWASP to identify IoT device threats, but these studies have not clearly mentioned what devices were tested and what their vulnerabilities were. Smart televisions, home theatres, refrigerators, CCTV, thermostats, kettles and light/bulbs were selected for testing and examined to identify attacking surface and vulnerabilities. More than 15 attack surfaces and 11 vulnerabilities were found across these devices after conducting the current research. Possible basic security measures have been discussed, which can be implemented by the user and developer to make smart devices safer.
IoT (Internet of Things)是指日常使用的连接到互联网的设备,可以通过手机等远程设备进行控制。本研究的重点是识别和分类威胁,并为基于物联网的家用电器创建威胁向量。OWASP之前已经进行了一些研究来识别物联网设备威胁,但这些研究并没有明确提到测试了哪些设备以及它们的漏洞是什么。智能电视、家庭影院、冰箱、闭路电视、恒温器、水壶和灯泡被选中进行测试和检查,以确定攻击面和漏洞。在进行目前的研究后,在这些设备上发现了超过15个攻击面和11个漏洞。已经讨论了可能的基本安全措施,这些措施可以由用户和开发人员实施,使智能设备更安全。
{"title":"Categorisation of security threats for smart home appliances","authors":"Ayush Gai, S. Azam, Bharanidharan Shanmugam, M. Jonkman, F. De Boer","doi":"10.1109/ICCCI.2018.8441213","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441213","url":null,"abstract":"IoT (Internet of Things) refers to the daily use of devices connected to the Internet that can be controlled by a remote device such as mobile phones. This research focuses to identify and categorize the threats and create threat vectors for IoT based home appliances. Some previous research has been conducted by OWASP to identify IoT device threats, but these studies have not clearly mentioned what devices were tested and what their vulnerabilities were. Smart televisions, home theatres, refrigerators, CCTV, thermostats, kettles and light/bulbs were selected for testing and examined to identify attacking surface and vulnerabilities. More than 15 attack surfaces and 11 vulnerabilities were found across these devices after conducting the current research. Possible basic security measures have been discussed, which can be implemented by the user and developer to make smart devices safer.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128898824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Design and Analysis of Booth Multiplier with Optimised Power Delay Product 优化功率延迟产品的展台乘法器设计与分析
Pub Date : 2018-08-20 DOI: 10.1109/ICCCI.2018.8441236
C. S. Chaitanya, P. Kumar
In most of the VLSI systems, multiplier being the vital part consumes nearly 15-20% of total IC power and is quiet slow in overall operation of the system. Thus it is essential to have an efficient design for the multipliers to improve the overall performance of the system. Booth multiplier reduces the number of partial products, taking into account two bits of the multiplier at a time, resulting in speed advantage over other multiplier architectures. With this advantage, Booth Multiplier is widely used in multiplication process for various digital and DSP circuits. The objective of this paper is to implement an optimized Booth Multiplier (8*8) with improved Power consumption and Delay Product (PDP). The sign extension is implemented using a single inverter and the addition operation is implemented by using custom designed Carry Skip Adders with IOT Full Adder. The design implementation and the simulations are done in Cadence Virtuoso V13.0 under 45nm technology.
在大多数VLSI系统中,乘法器作为关键部件消耗了近15-20%的集成电路总功率,并且在系统的整体运行中非常缓慢。因此,为了提高系统的整体性能,必须对乘法器进行有效的设计。展台乘法器减少了部分产品的数量,一次考虑到两个乘法器,从而比其他乘法器架构具有速度优势。由于这一优点,Booth Multiplier被广泛应用于各种数字和DSP电路的乘法处理中。本文的目标是实现优化的展位乘法器(8*8),并改进功耗和延迟产品(PDP)。符号扩展使用单个逆变器实现,加法操作通过使用定制设计的带IOT全加法器的进位跳加法器实现。在45纳米技术下,在Cadence Virtuoso V13.0中进行了设计实现和仿真。
{"title":"Design and Analysis of Booth Multiplier with Optimised Power Delay Product","authors":"C. S. Chaitanya, P. Kumar","doi":"10.1109/ICCCI.2018.8441236","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441236","url":null,"abstract":"In most of the VLSI systems, multiplier being the vital part consumes nearly 15-20% of total IC power and is quiet slow in overall operation of the system. Thus it is essential to have an efficient design for the multipliers to improve the overall performance of the system. Booth multiplier reduces the number of partial products, taking into account two bits of the multiplier at a time, resulting in speed advantage over other multiplier architectures. With this advantage, Booth Multiplier is widely used in multiplication process for various digital and DSP circuits. The objective of this paper is to implement an optimized Booth Multiplier (8*8) with improved Power consumption and Delay Product (PDP). The sign extension is implemented using a single inverter and the addition operation is implemented by using custom designed Carry Skip Adders with IOT Full Adder. The design implementation and the simulations are done in Cadence Virtuoso V13.0 under 45nm technology.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133513398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rotation-based LTE downlink resource scheduling using queue status monitoring 使用队列状态监控的基于旋转的LTE下行链路资源调度
Pub Date : 2018-08-20 DOI: 10.1109/ICCCI.2018.8441471
N. D. Adesh, A. Renuka
Resource scheduling process in LTE network plays a vital role in enhancing the system performance. Therefore, in this paper, rotation based resource scheduling along with queue monitoring algorithm is proposed for LTE downlink transmission, to reduce overflow of packets from user queue at eNodeB, and to reduce the transmission delay of the packet. On the other hand, proposed algorithm also enhances the system throughput and maintains fairness among the users. The experimental results illustrate that the proposed algorithm enhance the system throughput compared to other existing schedulers. Further, it also improves Packet Delivery Fraction (PDF) and reduces the transmission delay of the packets.
LTE网络中的资源调度过程对提高系统性能起着至关重要的作用。因此,本文提出了基于轮换的资源调度和队列监控算法用于LTE下行传输,以减少eNodeB用户队列的数据包溢出,并降低数据包的传输延迟。另一方面,该算法也提高了系统的吞吐量并保持了用户之间的公平性。实验结果表明,与现有的调度算法相比,该算法提高了系统吞吐量。此外,它还提高了分组交付分数(Packet Delivery Fraction, PDF),减少了分组的传输延迟。
{"title":"Rotation-based LTE downlink resource scheduling using queue status monitoring","authors":"N. D. Adesh, A. Renuka","doi":"10.1109/ICCCI.2018.8441471","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441471","url":null,"abstract":"Resource scheduling process in LTE network plays a vital role in enhancing the system performance. Therefore, in this paper, rotation based resource scheduling along with queue monitoring algorithm is proposed for LTE downlink transmission, to reduce overflow of packets from user queue at eNodeB, and to reduce the transmission delay of the packet. On the other hand, proposed algorithm also enhances the system throughput and maintains fairness among the users. The experimental results illustrate that the proposed algorithm enhance the system throughput compared to other existing schedulers. Further, it also improves Packet Delivery Fraction (PDF) and reduces the transmission delay of the packets.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116698822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Elastica a Large Scale Elastic Array Data Structure Elastica:一个大规模的弹性数组数据结构
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441469
Ripon Patgiri, S. Borgohain, Shyamosree Pal
In this paper, we present an elastic array, called Elastica (Elastic Array). The Elastica is the most space efficient resizable array, that is, Elastica allows increment and decrement of an array size. The Elastica is an array-of-array data structure which promotes increment and decrement of an array size dynamically. Most interestingly, the Elastica allocates memory blocks-wise and provides a functionality of accessing an element with O(1) time complexity. The Elastica allows the available memory blocks to be non-contiguous without violating the properties of the conventional single dimensional array. The Elastica offers the most space-efficient resizable array with O (log2n) extra space complexity. The Elastica is used to implement various data structures similar to conventional array. Besides, the Elastica has got other added advantages in implementing the available data structure.
在本文中,我们提出了一种弹性阵列,称为Elastica(弹性阵列)。Elastica是空间效率最高的可调整大小的数组,也就是说,Elastica允许数组大小的递增和递减。Elastica是一种数组的数组数据结构,它可以动态地增加和减少数组大小。最有趣的是,Elastica分配内存块,并提供以0(1)时间复杂度访问元素的功能。Elastica允许可用的内存块是不连续的,而不会违反传统的单维数组的属性。Elastica提供了最节省空间的可调整大小的数组,具有0 (log2n)的额外空间复杂度。Elastica被用来实现各种类似于传统数组的数据结构。此外,Elastica在实现可用的数据结构方面还有其他的优势。
{"title":"Elastica a Large Scale Elastic Array Data Structure","authors":"Ripon Patgiri, S. Borgohain, Shyamosree Pal","doi":"10.1109/ICCCI.2018.8441469","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441469","url":null,"abstract":"In this paper, we present an elastic array, called Elastica (Elastic Array). The Elastica is the most space efficient resizable array, that is, Elastica allows increment and decrement of an array size. The Elastica is an array-of-array data structure which promotes increment and decrement of an array size dynamically. Most interestingly, the Elastica allocates memory blocks-wise and provides a functionality of accessing an element with O(1) time complexity. The Elastica allows the available memory blocks to be non-contiguous without violating the properties of the conventional single dimensional array. The Elastica offers the most space-efficient resizable array with O (log2n) extra space complexity. The Elastica is used to implement various data structures similar to conventional array. Besides, the Elastica has got other added advantages in implementing the available data structure.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114079199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Diffusion of Lightweight Image Encryption in Embedded Hardware 轻量级图像加密在嵌入式硬件中的扩散研究
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441229
S. Janakiraman, K. Sree, V. Manasa, Sundararaman Rajagopalan, K. Thenmozhi, Rengarajan Amirtharajan
Image has become an indispensible part of data communication through embedded devices. LightWeight Stream Encryption (LWSE) algorithm for images had been already proposed and evaluated with Matlab code on a desktop system. This paper evaluates the real-time lightweight property of an existing LWSE algorithm in terms of its memory footprint and execution time on a resource constrained low power embedded device containing ARM7 core. A modification on LWSE algorithm is also proposed through the insertion of a shuffling process on plain image prior to the encryption. Various analysis and tests have been performed to validate the results of original and modified LWSE algorithm in the aspect of security. The study on lightweight parameters such as code size, and execution time of the embedded hardware while running the original and modified versions of LWSE algorithm shows its aptness for realtime applications.
图像已经成为通过嵌入式设备进行数据通信不可缺少的一部分。提出了一种图像的轻量级流加密算法,并在桌面系统上用Matlab代码进行了验证。本文从内存占用和在包含ARM7内核的资源受限低功耗嵌入式设备上的执行时间两方面评估了现有LWSE算法的实时轻量级特性。本文还提出了一种改进LWSE算法的方法,即在加密前对普通图像插入一个洗牌过程。通过各种分析和测试,验证了原LWSE算法和改进LWSE算法在安全性方面的结果。通过对原始版本和修改版本LWSE算法运行时的轻量级参数(如代码大小、嵌入式硬件执行时间)的研究,表明LWSE算法适合于实时应用。
{"title":"On the Diffusion of Lightweight Image Encryption in Embedded Hardware","authors":"S. Janakiraman, K. Sree, V. Manasa, Sundararaman Rajagopalan, K. Thenmozhi, Rengarajan Amirtharajan","doi":"10.1109/ICCCI.2018.8441229","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441229","url":null,"abstract":"Image has become an indispensible part of data communication through embedded devices. LightWeight Stream Encryption (LWSE) algorithm for images had been already proposed and evaluated with Matlab code on a desktop system. This paper evaluates the real-time lightweight property of an existing LWSE algorithm in terms of its memory footprint and execution time on a resource constrained low power embedded device containing ARM7 core. A modification on LWSE algorithm is also proposed through the insertion of a shuffling process on plain image prior to the encryption. Various analysis and tests have been performed to validate the results of original and modified LWSE algorithm in the aspect of security. The study on lightweight parameters such as code size, and execution time of the embedded hardware while running the original and modified versions of LWSE algorithm shows its aptness for realtime applications.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126304619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sentiment Analysis of Indian Languages using Convolutional Neural Networks 用卷积神经网络分析印度语言的情感
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441371
Vineetha Aravind Ravikumar, Aravinda Reddy, Anand Kumar
Social media has become an important part of human life; not only has it become a platform for people to interact with each other, it has become the news portal, a stage for people to express themselves, and even for heinous tasks such as cyber bullying, stalking etc. India being a country with the world's second largest population, not to mention the lingual diversity, the usage of social media in all its forms, is at its heights. This resulted in the evolution of code-mixed data, which is a combination of more than one language. The Bengali-English code mixed data used in this work is provided by the NLP Tool Contest, SAIL @ ICON 2017. The Convolutional Neural Network has been used to classify the data as positive, negative or neutral. Later to analyze performance of the system in the native script of Indian languages, the same procedure has been applied on Telugu dataset which is created manually from various source of online movie reviews and the results are compared.
社交媒体已经成为人类生活的重要组成部分;它不仅成为人们相互交流的平台,还成为新闻门户、人们表达自我的舞台,甚至成为网络欺凌、跟踪等令人发指的活动的场所。印度是世界上人口第二多的国家,更不用说语言的多样性,各种形式的社交媒体的使用都达到了顶峰。这导致了代码混合数据的发展,这是一种以上语言的组合。本工作中使用的孟加拉语-英语代码混合数据由NLP工具竞赛SAIL @ ICON 2017提供。卷积神经网络已被用于将数据分类为正、负或中性。随后,为了分析系统在印度语言本地脚本中的性能,同样的程序已应用于泰卢固语数据集,该数据集是从各种在线电影评论来源手动创建的,并对结果进行比较。
{"title":"Sentiment Analysis of Indian Languages using Convolutional Neural Networks","authors":"Vineetha Aravind Ravikumar, Aravinda Reddy, Anand Kumar","doi":"10.1109/ICCCI.2018.8441371","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441371","url":null,"abstract":"Social media has become an important part of human life; not only has it become a platform for people to interact with each other, it has become the news portal, a stage for people to express themselves, and even for heinous tasks such as cyber bullying, stalking etc. India being a country with the world's second largest population, not to mention the lingual diversity, the usage of social media in all its forms, is at its heights. This resulted in the evolution of code-mixed data, which is a combination of more than one language. The Bengali-English code mixed data used in this work is provided by the NLP Tool Contest, SAIL @ ICON 2017. The Convolutional Neural Network has been used to classify the data as positive, negative or neutral. Later to analyze performance of the system in the native script of Indian languages, the same procedure has been applied on Telugu dataset which is created manually from various source of online movie reviews and the results are compared.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121801546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Modeling and Analysis on PWM Techniques for AC Voltage Controllers 交流电压控制器PWM技术的建模与分析
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441276
S. R. Viknesh, P. Venkattappan, R. Manikandan, S. Rajendran
AC voltage controllers are often used to change the output AC voltage from fixed input AC voltage for many industrial and commercial applications by using single stage of conversion. AC voltage controllers provide better replacement of auto transformers with low cost. But their output voltage is not much qualified then auto transformers. To obtain variable and improved output voltages, different Pulse Width Modulation (PWM) techniques have been used. In this paper analysis the different PWM techniques of AC voltage controller is simulated and the results are shown with performance comparison. This is done to show that which PWM technique is more applicable for AC voltage controllers. Phase angle control, single PWM, multiple PWM and sinusoidal PWM techniques are considered for analysis. The analysis and modeling of each technique is compared with output waveforms, tabulated readings and THD graphs. Modeling is performed by using MATLAB/SIMULINK environment.
在许多工业和商业应用中,交流电压控制器经常使用单级转换来改变固定输入交流电压的输出交流电压。交流电压控制器以较低的成本更好地替代自耦变压器。但是它们的输出电压比自耦变压器差很多。为了获得可变和改进的输出电压,使用了不同的脉宽调制(PWM)技术。本文分析了交流电压控制器的不同PWM技术,并对其进行了仿真,并对结果进行了性能比较。这样做是为了表明哪种PWM技术更适用于交流电压控制器。分析了相角控制、单PWM、多PWM和正弦PWM技术。每种技术的分析和建模与输出波形、表读数和THD图进行了比较。采用MATLAB/SIMULINK环境进行建模。
{"title":"Modeling and Analysis on PWM Techniques for AC Voltage Controllers","authors":"S. R. Viknesh, P. Venkattappan, R. Manikandan, S. Rajendran","doi":"10.1109/ICCCI.2018.8441276","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441276","url":null,"abstract":"AC voltage controllers are often used to change the output AC voltage from fixed input AC voltage for many industrial and commercial applications by using single stage of conversion. AC voltage controllers provide better replacement of auto transformers with low cost. But their output voltage is not much qualified then auto transformers. To obtain variable and improved output voltages, different Pulse Width Modulation (PWM) techniques have been used. In this paper analysis the different PWM techniques of AC voltage controller is simulated and the results are shown with performance comparison. This is done to show that which PWM technique is more applicable for AC voltage controllers. Phase angle control, single PWM, multiple PWM and sinusoidal PWM techniques are considered for analysis. The analysis and modeling of each technique is compared with output waveforms, tabulated readings and THD graphs. Modeling is performed by using MATLAB/SIMULINK environment.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130976840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive Algorithm for Information Seeking Tool Based on Learning Style 基于学习风格的信息搜索工具自适应算法
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441205
Abdullahi Ya'u Gambo, H. S. Mahmud
This research extends past work that developed an information seeking tool that retrieves reading materials that matched students' learning style such as read/write, visual, aural, kinesthetic. It classifies reading materials as visual, read/write or kinesthetic, ranks and presents them in this order: the topmost being the closest match while the bottom being the least, and then record the student rating of the reading material presented. Two problems that arise from this work are the low rating received despite the recommended matched materials and the high rating for the unmatched materials. The objective of this research is to investigate suitable adaptive techniques to be integrated in the tool to address these problems. Experiments will be conducted to evaluate the performance of the tool with the integration of the adaptive technique.
这项研究扩展了过去的工作,开发了一种信息搜索工具,可以检索与学生的学习风格(如读/写、视觉、听觉、动觉)相匹配的阅读材料。它将阅读材料分为视觉、读写或动觉,并按以下顺序排列和呈现:最上面的是最接近的,最下面的是最少的,然后记录学生对所呈现的阅读材料的评分。从这项工作中产生的两个问题是,尽管推荐了匹配材料,但收到的评分很低,而未匹配材料的评分却很高。本研究的目的是研究合适的自适应技术,以集成在工具中,以解决这些问题。结合自适应技术,将进行实验来评估该工具的性能。
{"title":"Adaptive Algorithm for Information Seeking Tool Based on Learning Style","authors":"Abdullahi Ya'u Gambo, H. S. Mahmud","doi":"10.1109/ICCCI.2018.8441205","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441205","url":null,"abstract":"This research extends past work that developed an information seeking tool that retrieves reading materials that matched students' learning style such as read/write, visual, aural, kinesthetic. It classifies reading materials as visual, read/write or kinesthetic, ranks and presents them in this order: the topmost being the closest match while the bottom being the least, and then record the student rating of the reading material presented. Two problems that arise from this work are the low rating received despite the recommended matched materials and the high rating for the unmatched materials. The objective of this research is to investigate suitable adaptive techniques to be integrated in the tool to address these problems. Experiments will be conducted to evaluate the performance of the tool with the integration of the adaptive technique.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133398596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 International Conference on Computer Communication and Informatics (ICCCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1