首页 > 最新文献

2023 International Conference on Advances in Intelligent Computing and Applications (AICAPS)最新文献

英文 中文
Reducing the Effects of DDos Attacks in Software Defined Networks Using Cloud Computing 利用云计算降低软件定义网络中DDos攻击的影响
Pub Date : 2023-02-01 DOI: 10.1109/AICAPS57044.2023.10074273
K. Radha, R. Parameswari
Software-defined networking (SDN) is a networking architecture that enables simple programming of network devices. SDN allows the isolation of network resources using clearly defined APIs to accomplish multiple tenant networks with appropriate QoS (Quality of Service) and SLAs. The most critical issues among Cloud providers and organizational network infrastructures are Denial of Service (DDoS) attacks. SDN is more susceptible to controller resource exhaustion due to the rising frequency of distributed denial-of-service (DDoS) attacks. DDoS attacks make it difficult for the SDN controller to handle all received packets effectively, which may cause a network crash or deny authorized users access to network resources. The proposed traffic rate-based threshold (TRT) to overcome these DDoS attacks in SDN. The proposed work calculates the threshold based on the traffic and provides an alternate path enabling SDN with highly efficient and flexible solutions. To examine the efficiency of the proposed work, a comparison work is carried out with Renyi Joint Entropy-Based Dynamic Threshold Approach (RJE) and reactive & proactive (RP). The performance metrics considered are throughput, recovery time, and traffic. On all the metrics, the performance obtained by the proposed TRT is far better than the others.
软件定义网络(SDN)是一种能够对网络设备进行简单编程的网络体系结构。SDN允许使用明确定义的api隔离网络资源,以实现具有适当QoS(服务质量)和sla的多租户网络。云提供商和组织网络基础设施中最关键的问题是拒绝服务(DDoS)攻击。由于分布式拒绝服务(DDoS)攻击的日益频繁,SDN更容易出现控制器资源耗尽的情况。DDoS攻击会使SDN控制器无法有效处理接收到的所有报文,可能导致网络崩溃或拒绝授权用户访问网络资源。提出了基于流量速率的阈值(TRT)来克服SDN中的这些DDoS攻击。建议的工作基于流量计算阈值,并提供一个替代路径,使SDN具有高效和灵活的解决方案。为了检验该方法的有效性,本文将基于Renyi联合熵的动态阈值法(RJE)与主动反应法(RP)进行了比较。考虑的性能指标包括吞吐量、恢复时间和流量。在所有指标上,所提出的TRT的性能都远远优于其他TRT。
{"title":"Reducing the Effects of DDos Attacks in Software Defined Networks Using Cloud Computing","authors":"K. Radha, R. Parameswari","doi":"10.1109/AICAPS57044.2023.10074273","DOIUrl":"https://doi.org/10.1109/AICAPS57044.2023.10074273","url":null,"abstract":"Software-defined networking (SDN) is a networking architecture that enables simple programming of network devices. SDN allows the isolation of network resources using clearly defined APIs to accomplish multiple tenant networks with appropriate QoS (Quality of Service) and SLAs. The most critical issues among Cloud providers and organizational network infrastructures are Denial of Service (DDoS) attacks. SDN is more susceptible to controller resource exhaustion due to the rising frequency of distributed denial-of-service (DDoS) attacks. DDoS attacks make it difficult for the SDN controller to handle all received packets effectively, which may cause a network crash or deny authorized users access to network resources. The proposed traffic rate-based threshold (TRT) to overcome these DDoS attacks in SDN. The proposed work calculates the threshold based on the traffic and provides an alternate path enabling SDN with highly efficient and flexible solutions. To examine the efficiency of the proposed work, a comparison work is carried out with Renyi Joint Entropy-Based Dynamic Threshold Approach (RJE) and reactive & proactive (RP). The performance metrics considered are throughput, recovery time, and traffic. On all the metrics, the performance obtained by the proposed TRT is far better than the others.","PeriodicalId":146698,"journal":{"name":"2023 International Conference on Advances in Intelligent Computing and Applications (AICAPS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122642670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sarcasm Detection followed by Sentiment Analysis for Bengali Language: Neural Network & Supervised Approach 孟加拉语的讽刺检测与情感分析:神经网络与监督方法
Pub Date : 2023-02-01 DOI: 10.1109/AICAPS57044.2023.10074510
Moumita Pal, R. V. Prasad
As www data grows, so do opinions, views, visitors, news, and comments. Using opinions, perspectives, and remarks, Natural Language Processing (NLP) professionals may classify emotions. Classifying and evaluating Bengali text emotions is becoming significant in e-commerce, journalism, movies, OTT, and security applications. The lack of Bengali corpus makes developing a Sentiment Analysis system difficult. Sarcasm is another popular social media trend. Positive words are often used to indicate hatred. Thus, it’s hard to tell what these sentences mean. This study presents a method for identifying and analysing sarcasm. GloVe is used to represent words while LSTM is trained and tested on the represented characteristics. Experiments show 91.94% accuracy. Predicted sarcastic sentences are labelled as negative and added to Sentiment Analysis corpora (SA). Logistic Regression (LR), K-Nearest Neighbor (K-NN), Linear Support Vector Machine (SVM), and Random Forest (RF) are used to feature matrices for sentiment analysis. For Unigram, Bi-gram, and Tri-gram models, Linear SVM has the highest precision (92.5%), whereas LR model approaches greater accuracy (72.04%) and F1-score (68.15%).
随着www数据的增长,观点、观点、访问者、新闻和评论也在增长。自然语言处理(NLP)专业人员可以使用意见、观点和评论对情绪进行分类。分类和评估孟加拉语文本情感在电子商务、新闻、电影、OTT和安全应用中变得越来越重要。孟加拉语语料库的缺乏使得情感分析系统的开发变得困难。讽刺是社交媒体的另一个流行趋势。褒义词汇常被用来表示仇恨。因此,很难分辨这些句子的意思。本研究提出了一种识别和分析讽刺的方法。GloVe用于表示单词,LSTM对表示的特征进行训练和测试。实验结果表明,准确率为91.94%。预测的讽刺句子被标记为否定句,并添加到情感分析语料库中。逻辑回归(LR)、k近邻(K-NN)、线性支持向量机(SVM)和随机森林(RF)被用于特征矩阵的情感分析。对于Unigram、Bi-gram和Tri-gram模型,Linear SVM具有最高的精度(92.5%),而LR模型具有更高的精度(72.04%)和f1得分(68.15%)。
{"title":"Sarcasm Detection followed by Sentiment Analysis for Bengali Language: Neural Network & Supervised Approach","authors":"Moumita Pal, R. V. Prasad","doi":"10.1109/AICAPS57044.2023.10074510","DOIUrl":"https://doi.org/10.1109/AICAPS57044.2023.10074510","url":null,"abstract":"As www data grows, so do opinions, views, visitors, news, and comments. Using opinions, perspectives, and remarks, Natural Language Processing (NLP) professionals may classify emotions. Classifying and evaluating Bengali text emotions is becoming significant in e-commerce, journalism, movies, OTT, and security applications. The lack of Bengali corpus makes developing a Sentiment Analysis system difficult. Sarcasm is another popular social media trend. Positive words are often used to indicate hatred. Thus, it’s hard to tell what these sentences mean. This study presents a method for identifying and analysing sarcasm. GloVe is used to represent words while LSTM is trained and tested on the represented characteristics. Experiments show 91.94% accuracy. Predicted sarcastic sentences are labelled as negative and added to Sentiment Analysis corpora (SA). Logistic Regression (LR), K-Nearest Neighbor (K-NN), Linear Support Vector Machine (SVM), and Random Forest (RF) are used to feature matrices for sentiment analysis. For Unigram, Bi-gram, and Tri-gram models, Linear SVM has the highest precision (92.5%), whereas LR model approaches greater accuracy (72.04%) and F1-score (68.15%).","PeriodicalId":146698,"journal":{"name":"2023 International Conference on Advances in Intelligent Computing and Applications (AICAPS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115647702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
VR for automobile customization and its feedback analysis 面向汽车定制的VR技术及其反馈分析
Pub Date : 2023-02-01 DOI: 10.1109/AICAPS57044.2023.10074233
P. Ghadekar, Khushi Jhanwar, Ameya Karpe, Tanishka Shetty, Akash Sivanandan, Prannay Khushalani
One of the main agendas behind any business is understanding their customer's views about their products. In the proposed model text analysis is performed on the feedback which is given on the VR model of a car customization application. This application is built in Unity with help of its XR toolkit. The text analysis is done using NLTK and Scikit learn. This text analysis will be based on multiple options provided by the VR model. This analysis will help automobile companies to know better about their customer's opinions. Customers will also be able to customize their cars with the help of the features provided in the application. Text analysis covers the summarization of the feedback form that is provided to the customers.
任何企业背后的主要议程之一都是了解客户对其产品的看法。在该模型中,对某汽车定制应用的虚拟现实模型的反馈信息进行了文本分析。这个应用程序是在Unity的XR工具包的帮助下构建的。文本分析使用NLTK和Scikit learn完成。本文将基于VR模型提供的多个选项进行分析。这种分析将有助于汽车公司更好地了解他们的客户的意见。客户还可以借助该应用程序提供的功能定制自己的汽车。文本分析涵盖了提供给客户的反馈表的摘要。
{"title":"VR for automobile customization and its feedback analysis","authors":"P. Ghadekar, Khushi Jhanwar, Ameya Karpe, Tanishka Shetty, Akash Sivanandan, Prannay Khushalani","doi":"10.1109/AICAPS57044.2023.10074233","DOIUrl":"https://doi.org/10.1109/AICAPS57044.2023.10074233","url":null,"abstract":"One of the main agendas behind any business is understanding their customer's views about their products. In the proposed model text analysis is performed on the feedback which is given on the VR model of a car customization application. This application is built in Unity with help of its XR toolkit. The text analysis is done using NLTK and Scikit learn. This text analysis will be based on multiple options provided by the VR model. This analysis will help automobile companies to know better about their customer's opinions. Customers will also be able to customize their cars with the help of the features provided in the application. Text analysis covers the summarization of the feedback form that is provided to the customers.","PeriodicalId":146698,"journal":{"name":"2023 International Conference on Advances in Intelligent Computing and Applications (AICAPS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123268404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wind profiler Doppler power spectrum segmentation using U-Net 基于U-Net的风廓线多普勒功率谱分割
Pub Date : 2023-02-01 DOI: 10.1109/AICAPS57044.2023.10074415
Baazil P. Thampy, J. V., A. Kottayil
Wind profiler radars can continually and effectively probe the atmosphere to obtain the Doppler power spectrum of ambient air motion. In addition to ambient air motion, the Doppler power spectrum used to get wind estimates may contain atmospheric and non-atmospheric disturbances. The wind estimations might be biased as a result of these disruptions. Accurate detection of ambient air motion, even in the presence of disturbances, is essential to reduce the impact of these biases. The Doppler power spectrum can be segmented using cutting-edge deep learning models to retrieve ambient air motion. In this work, we used one of the finest deep learning models, U-net, to segment the Doppler power spectrum. The proposed method’s performance evaluation shows promising results in segmenting and retrieving ambient air motion.
风廓线雷达可以连续有效地探测大气,获取环境空气运动的多普勒功率谱。除了环境空气运动外,用于估算风的多普勒功率谱可能包含大气和非大气扰动。由于这些干扰,对风力的估计可能会有偏差。即使在存在干扰的情况下,对环境空气运动的准确检测对于减少这些偏差的影响至关重要。多普勒功率谱可以使用尖端的深度学习模型进行分割,以检索环境空气运动。在这项工作中,我们使用了最好的深度学习模型之一U-net来分割多普勒功率谱。该方法在环境空气运动的分割和检索方面取得了良好的效果。
{"title":"Wind profiler Doppler power spectrum segmentation using U-Net","authors":"Baazil P. Thampy, J. V., A. Kottayil","doi":"10.1109/AICAPS57044.2023.10074415","DOIUrl":"https://doi.org/10.1109/AICAPS57044.2023.10074415","url":null,"abstract":"Wind profiler radars can continually and effectively probe the atmosphere to obtain the Doppler power spectrum of ambient air motion. In addition to ambient air motion, the Doppler power spectrum used to get wind estimates may contain atmospheric and non-atmospheric disturbances. The wind estimations might be biased as a result of these disruptions. Accurate detection of ambient air motion, even in the presence of disturbances, is essential to reduce the impact of these biases. The Doppler power spectrum can be segmented using cutting-edge deep learning models to retrieve ambient air motion. In this work, we used one of the finest deep learning models, U-net, to segment the Doppler power spectrum. The proposed method’s performance evaluation shows promising results in segmenting and retrieving ambient air motion.","PeriodicalId":146698,"journal":{"name":"2023 International Conference on Advances in Intelligent Computing and Applications (AICAPS)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122539574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gradient Enhanced Regressive Multivariate Artificial Fish Swarm Optimized Data Collection for IoT-Enabled WSN in Smart Environments 基于梯度增强回归多元人工鱼群的智能环境下物联网无线传感器网络数据采集
Pub Date : 2023-02-01 DOI: 10.1109/AICAPS57044.2023.10074386
S. S, Reham R. Mostafa, M. Bannany, A. Khedr
The emerging Internet of Things (IoT)-based Wireless Sensor Networks (WSN) consist of small size of sensor nodes for monitoring and collecting data from environmental conditions and it transmits to other sensors through the internet. The major issues in WSN are energy constraints that degrade the efficient functioning and lifetime of WSN. Therefore, a novel technique called Gradient Enhanced Broken-stick Regressive Multivariate Artificial Fish Swarm Optimized Data Collection (GEBRMAFSODC) is introduced. The main objective of the GEBRMAFSODC technique for performing energy-efficient data collection with lesser delay , data loss. Smart cities improve effectiveness of different applications including public transport services. By applying this method, the resource efficient optimal path and the population of artificial fishes (i.e. sensor nodes) is randomly initialized in the search space. For each node, fitness is measured depend on multivariate function namely energy, bandwidth, and distance. The Gradient Enhanced Broken-stick Regression is applied to fitness estimation for analyzing the resources and finding the optimal results. Efficient neighboring nodes are selected to transmit the collected data to sink node via best path. Sink node perform as a data collector with better resource sensor nodes through lesser delay. Simulation is conducted in NS2 simulator using Warrigal Dataset and the performance is analyzed by various parameters namely energy consumption, data collection delay, throughput, and data loss rate based on number of data. The observed result shows the superior performance of the proposed GEBRMAFSODC technique with a higher delivery ratio, throughput by 10%, 48% and lesser loss, delay, and energy consumption by 53%, 37%, and 27% as compared to other related methods respectively.
新兴的基于物联网(IoT)的无线传感器网络(WSN)由小型传感器节点组成,用于监测和收集环境条件数据,并通过互联网传输给其他传感器。无线传感器网络的主要问题是能量约束,它降低了无线传感器网络的有效功能和寿命。为此,提出了一种梯度增强折棒回归多元人工鱼群优化数据采集技术(GEBRMAFSODC)。GEBRMAFSODC技术的主要目标是以较小的延迟和数据丢失来执行节能的数据收集。智慧城市提高了包括公共交通服务在内的不同应用的效率。该方法在搜索空间中随机初始化资源效率最优路径和人工鱼种群(即传感器节点)。对于每个节点,适应度的测量依赖于多变量函数,即能量、带宽和距离。将梯度增强断棒回归应用于适应度估计,对资源进行分析,寻找最优结果。选择高效的相邻节点,通过最优路径将采集到的数据传输到汇聚节点。汇聚节点作为数据收集器,具有较好的资源传感器节点,延迟较小。利用Warrigal Dataset在NS2模拟器上进行仿真,通过能耗、数据采集延迟、吞吐量、基于数据量的数据损失率等参数对性能进行分析。实验结果表明,所提出的GEBRMAFSODC技术性能优越,与其他相关方法相比,其传输率、吞吐量分别提高了10%、48%,损耗、延迟和能耗分别降低了53%、37%和27%。
{"title":"Gradient Enhanced Regressive Multivariate Artificial Fish Swarm Optimized Data Collection for IoT-Enabled WSN in Smart Environments","authors":"S. S, Reham R. Mostafa, M. Bannany, A. Khedr","doi":"10.1109/AICAPS57044.2023.10074386","DOIUrl":"https://doi.org/10.1109/AICAPS57044.2023.10074386","url":null,"abstract":"The emerging Internet of Things (IoT)-based Wireless Sensor Networks (WSN) consist of small size of sensor nodes for monitoring and collecting data from environmental conditions and it transmits to other sensors through the internet. The major issues in WSN are energy constraints that degrade the efficient functioning and lifetime of WSN. Therefore, a novel technique called Gradient Enhanced Broken-stick Regressive Multivariate Artificial Fish Swarm Optimized Data Collection (GEBRMAFSODC) is introduced. The main objective of the GEBRMAFSODC technique for performing energy-efficient data collection with lesser delay , data loss. Smart cities improve effectiveness of different applications including public transport services. By applying this method, the resource efficient optimal path and the population of artificial fishes (i.e. sensor nodes) is randomly initialized in the search space. For each node, fitness is measured depend on multivariate function namely energy, bandwidth, and distance. The Gradient Enhanced Broken-stick Regression is applied to fitness estimation for analyzing the resources and finding the optimal results. Efficient neighboring nodes are selected to transmit the collected data to sink node via best path. Sink node perform as a data collector with better resource sensor nodes through lesser delay. Simulation is conducted in NS2 simulator using Warrigal Dataset and the performance is analyzed by various parameters namely energy consumption, data collection delay, throughput, and data loss rate based on number of data. The observed result shows the superior performance of the proposed GEBRMAFSODC technique with a higher delivery ratio, throughput by 10%, 48% and lesser loss, delay, and energy consumption by 53%, 37%, and 27% as compared to other related methods respectively.","PeriodicalId":146698,"journal":{"name":"2023 International Conference on Advances in Intelligent Computing and Applications (AICAPS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130157692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Malware Detection using Dynamic Analysis 恶意软件检测使用动态分析
Pub Date : 2023-02-01 DOI: 10.1109/AICAPS57044.2023.10074588
Anandhi V, V. P, Varun G. Menon, Abhijith Krishna E R, Akshay Shilesh, Akshay Viswam, Amin Shafiq
Malware detection is an indispensable factor in the security of internet-oriented machines. The number of threats have been increased day by day. Malware analysis is a process of performing analysis and a study of the components and behavior of malware. The use of dynamic analysis will help the system to classify malware more accurately and to detect any malware samples. Dynamic analysis is a method in which the malware runs in a Sandbox environment, and artifacts are collected. The system uses Cuckoo Sandbox for executing the malware samples in a controlled environment. The system compares bidirectional long short-term memory and convolutional neural network models for machine learning algorithms to detect and classify the malware samples. Unlike a typical signature-based detection, where patterns are checked in the source file, a type of static detection, here, dynamic analysis is used to extract necessary reports, which are then preprocessed to get features like dynamic link library (dlls), kernel module names, services used, etc. to try creating a list of text, which can explain the behaviour of the executable file. These are tokenized and embedded to obtain numerical data, which is passed to the models. The accuracy of trained models is compared, which describes the performance of the models on the dataset. Thus providing grounds for testing future models and later building a better detection system based on it.
恶意软件检测是面向互联网的机器安全中不可或缺的因素。威胁的数量日益增加。恶意软件分析是对恶意软件的组成和行为进行分析和研究的过程。动态分析的使用将有助于系统更准确地对恶意软件进行分类,并检测任何恶意软件样本。动态分析是一种在沙盒环境中运行恶意软件并收集工件的方法。该系统使用布谷鸟沙箱在受控环境中执行恶意软件样本。该系统比较了双向长短期记忆和卷积神经网络模型的机器学习算法,以检测和分类恶意软件样本。与典型的基于签名的检测(在源文件中检查模式,这是一种静态检测)不同,动态分析用于提取必要的报告,然后对其进行预处理以获得动态链接库(dll),内核模块名称,使用的服务等特征,以尝试创建文本列表,这可以解释可执行文件的行为。这些被标记和嵌入以获得数值数据,这些数据被传递给模型。比较了训练模型的精度,描述了模型在数据集上的性能。从而为测试未来的模型以及在此基础上构建更好的检测系统提供了依据。
{"title":"Malware Detection using Dynamic Analysis","authors":"Anandhi V, V. P, Varun G. Menon, Abhijith Krishna E R, Akshay Shilesh, Akshay Viswam, Amin Shafiq","doi":"10.1109/AICAPS57044.2023.10074588","DOIUrl":"https://doi.org/10.1109/AICAPS57044.2023.10074588","url":null,"abstract":"Malware detection is an indispensable factor in the security of internet-oriented machines. The number of threats have been increased day by day. Malware analysis is a process of performing analysis and a study of the components and behavior of malware. The use of dynamic analysis will help the system to classify malware more accurately and to detect any malware samples. Dynamic analysis is a method in which the malware runs in a Sandbox environment, and artifacts are collected. The system uses Cuckoo Sandbox for executing the malware samples in a controlled environment. The system compares bidirectional long short-term memory and convolutional neural network models for machine learning algorithms to detect and classify the malware samples. Unlike a typical signature-based detection, where patterns are checked in the source file, a type of static detection, here, dynamic analysis is used to extract necessary reports, which are then preprocessed to get features like dynamic link library (dlls), kernel module names, services used, etc. to try creating a list of text, which can explain the behaviour of the executable file. These are tokenized and embedded to obtain numerical data, which is passed to the models. The accuracy of trained models is compared, which describes the performance of the models on the dataset. Thus providing grounds for testing future models and later building a better detection system based on it.","PeriodicalId":146698,"journal":{"name":"2023 International Conference on Advances in Intelligent Computing and Applications (AICAPS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121550205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Perception Analysis of World Leaders in Reddit using Sentiment Analysis 使用情感分析的Reddit世界领导人的混合感知分析
Pub Date : 2023-02-01 DOI: 10.1109/AICAPS57044.2023.10074005
Varun Rishwandh Sekar, Thuhin Khanna Rajesh Kannan, Suraj N, P. Vijay
Natural Language Processing (NLP) is the branch of Artificial Intelligence that deals with the interpretation of human speech. NLP is a vast area of study that is continually being developed each day, with active research happening worldwide. The development of NLP algorithms is of utmost importance to the advancements in the field of Artificial Intelligence. With the increasing popularity of social media and the number of hours spent on social media multiplying, people share their opinion on a wide range of topics and issues. This sudden burst of data generated by social media platforms contains a massive potential when combined with state-of-the-art NLP models, it can be leveraged to our advantage. This work builds a dataset of user comments on the top posts about political leaders on Reddit, using Reddit’s API. On Reddit, extensive discussions on various topics occur daily. The end goal of this work is to rank the chosen world leaders based on their likability. To find the general likability of a public personality, we try to classify the comments collected from Reddit using Sentiment Analysis. This paper employs state-of-the-art NLP algorithms such as Flair, DistilBERT, and Text Blob Analysis, and combines the results to get a better final rank of the world leaders.
自然语言处理(NLP)是人工智能的一个分支,它处理人类语言的解释。NLP是一个广阔的研究领域,每天都在不断发展,全世界都在进行积极的研究。自然语言处理算法的发展对人工智能领域的进步至关重要。随着社交媒体的日益普及和花在社交媒体上的时间成倍增加,人们就广泛的话题和问题分享他们的观点。社交媒体平台产生的突然爆发的数据包含了巨大的潜力,当与最先进的自然语言处理模型相结合时,它可以被利用为我们的优势。这项工作使用Reddit的API,建立了Reddit上关于政治领导人的热门帖子的用户评论数据集。在Reddit上,每天都有关于各种话题的广泛讨论。这项工作的最终目标是根据他们的受欢迎程度对选定的世界领导人进行排名。为了找出公众人物的总体可爱度,我们尝试使用情感分析对从Reddit收集的评论进行分类。本文采用了最先进的自然语言处理算法,如Flair、DistilBERT和Text Blob Analysis,并将结果结合起来,以获得更好的世界领导者的最终排名。
{"title":"Hybrid Perception Analysis of World Leaders in Reddit using Sentiment Analysis","authors":"Varun Rishwandh Sekar, Thuhin Khanna Rajesh Kannan, Suraj N, P. Vijay","doi":"10.1109/AICAPS57044.2023.10074005","DOIUrl":"https://doi.org/10.1109/AICAPS57044.2023.10074005","url":null,"abstract":"Natural Language Processing (NLP) is the branch of Artificial Intelligence that deals with the interpretation of human speech. NLP is a vast area of study that is continually being developed each day, with active research happening worldwide. The development of NLP algorithms is of utmost importance to the advancements in the field of Artificial Intelligence. With the increasing popularity of social media and the number of hours spent on social media multiplying, people share their opinion on a wide range of topics and issues. This sudden burst of data generated by social media platforms contains a massive potential when combined with state-of-the-art NLP models, it can be leveraged to our advantage. This work builds a dataset of user comments on the top posts about political leaders on Reddit, using Reddit’s API. On Reddit, extensive discussions on various topics occur daily. The end goal of this work is to rank the chosen world leaders based on their likability. To find the general likability of a public personality, we try to classify the comments collected from Reddit using Sentiment Analysis. This paper employs state-of-the-art NLP algorithms such as Flair, DistilBERT, and Text Blob Analysis, and combines the results to get a better final rank of the world leaders.","PeriodicalId":146698,"journal":{"name":"2023 International Conference on Advances in Intelligent Computing and Applications (AICAPS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132664323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeepHyperv: A deep neural network based virtual memory analysis for malware detection at hypervisor-layer DeepHyperv:基于深度神经网络的虚拟内存分析,用于管理程序层的恶意软件检测
Pub Date : 2023-02-01 DOI: 10.1109/AICAPS57044.2023.10074347
Avantika Gaur, Arjun Singh, Aditya Nautiyal, Gaurav Kothari, P. Mishra, Aman Jha
Security holds great significance in this new era of on-demand virtual computing. As software and hardware update daily, malware is also modifying its behavior rapidly. Some researchers are still working in this area to handle the recent cyber-attacks in critical virtualization ecosystems. The existing research works may not be suitable with the existing updated virtualization environment as they have been validated with older datasets. In this paper, a deep neural network (DNN) based malware detection approach has been proposed, called DeepHyperv, to detect the malware threats in a virtualization environment by doing the deep virtual memory analysis. Direct access to the analysis components is prohibited in the proposed architecture by deploying them inside the privileged domain of the hypervisor. The process execution logs are collected at the hypervisor using the memory introspection technique with the support of recent hardware and software configurations of analysis setup and virtualization environment. The logs are pre-processed and converted into a discrete feature vector matrix. The approach uses DNN to learn & test the extracted features at the hypervisor. The approach is validated in the test bed setup of our lab, and results seem to promising.
在这个按需虚拟计算的新时代,安全性具有重要意义。由于软件和硬件每天都在更新,恶意软件也在迅速修改自己的行为。一些研究人员仍在这一领域工作,以处理最近在关键虚拟化生态系统中的网络攻击。现有的研究工作可能不适合现有的更新的虚拟化环境,因为它们已经用旧的数据集进行了验证。本文提出了一种基于深度神经网络(deep neural network, DNN)的恶意软件检测方法DeepHyperv,通过深度虚拟内存分析来检测虚拟化环境中的恶意软件威胁。在建议的体系结构中,通过将分析组件部署在管理程序的特权域中,禁止直接访问分析组件。进程执行日志是在管理程序上收集的,使用内存自省技术,并支持分析设置和虚拟化环境的最新硬件和软件配置。对日志进行预处理并转换成离散特征向量矩阵。该方法使用DNN在管理程序中学习和测试提取的特征。该方法在本实验室的试验台上进行了验证,结果令人满意。
{"title":"DeepHyperv: A deep neural network based virtual memory analysis for malware detection at hypervisor-layer","authors":"Avantika Gaur, Arjun Singh, Aditya Nautiyal, Gaurav Kothari, P. Mishra, Aman Jha","doi":"10.1109/AICAPS57044.2023.10074347","DOIUrl":"https://doi.org/10.1109/AICAPS57044.2023.10074347","url":null,"abstract":"Security holds great significance in this new era of on-demand virtual computing. As software and hardware update daily, malware is also modifying its behavior rapidly. Some researchers are still working in this area to handle the recent cyber-attacks in critical virtualization ecosystems. The existing research works may not be suitable with the existing updated virtualization environment as they have been validated with older datasets. In this paper, a deep neural network (DNN) based malware detection approach has been proposed, called DeepHyperv, to detect the malware threats in a virtualization environment by doing the deep virtual memory analysis. Direct access to the analysis components is prohibited in the proposed architecture by deploying them inside the privileged domain of the hypervisor. The process execution logs are collected at the hypervisor using the memory introspection technique with the support of recent hardware and software configurations of analysis setup and virtualization environment. The logs are pre-processed and converted into a discrete feature vector matrix. The approach uses DNN to learn & test the extracted features at the hypervisor. The approach is validated in the test bed setup of our lab, and results seem to promising.","PeriodicalId":146698,"journal":{"name":"2023 International Conference on Advances in Intelligent Computing and Applications (AICAPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129010967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Clustering Approach based on Trust and Rat Swarm Algorithm for WSN Applications 基于信任和大鼠群算法的WSN聚类方法
Pub Date : 2023-02-01 DOI: 10.1109/AICAPS57044.2023.10074379
Walid Osamy, A. Salim, Amel Al Ali, A. Khedr
In this paper, a clustering approach called CATRSO is proposed. The selection of cluster heads (CH) is performed by considering the trust value of the nodes in order to select the most trustworthy nodes as CH and Rat Swarm Optimizer is employed for CH selection process. The trust value of the nodes and remaining energy are taken into account while designing the fitness function. In addition, a chain routing approach is employed between CHs for energy savings. The results demonstrate that the CATRSO technique is successful in selecting the most trustworthy nodes as CH and outperforms earlier efforts in the literature in terms of energy efficiency, average network lifetime, and trustworthiness of selected CHs.
本文提出了一种称为CATRSO的聚类方法。通过考虑节点的信任值来选择簇头(CH),以选择最值得信赖的节点,并使用鼠群优化器进行簇头选择。在设计适应度函数时考虑了节点的信任值和剩余能量。此外,为了节约能源,中心之间采用了链式路由方法。结果表明,CATRSO技术成功地选择了最值得信赖的节点作为CH,并且在能源效率、平均网络寿命和所选CHs的可信度方面优于文献中早期的努力。
{"title":"A New Clustering Approach based on Trust and Rat Swarm Algorithm for WSN Applications","authors":"Walid Osamy, A. Salim, Amel Al Ali, A. Khedr","doi":"10.1109/AICAPS57044.2023.10074379","DOIUrl":"https://doi.org/10.1109/AICAPS57044.2023.10074379","url":null,"abstract":"In this paper, a clustering approach called CATRSO is proposed. The selection of cluster heads (CH) is performed by considering the trust value of the nodes in order to select the most trustworthy nodes as CH and Rat Swarm Optimizer is employed for CH selection process. The trust value of the nodes and remaining energy are taken into account while designing the fitness function. In addition, a chain routing approach is employed between CHs for energy savings. The results demonstrate that the CATRSO technique is successful in selecting the most trustworthy nodes as CH and outperforms earlier efforts in the literature in terms of energy efficiency, average network lifetime, and trustworthiness of selected CHs.","PeriodicalId":146698,"journal":{"name":"2023 International Conference on Advances in Intelligent Computing and Applications (AICAPS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124865308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart River Water Quality and Level Monitoring: a Hybrid Neural Network Approach 智能河流水质和水位监测:一种混合神经网络方法
Pub Date : 2023-02-01 DOI: 10.1109/AICAPS57044.2023.10074495
Chellaswamy C, G. S, Ramasubramanian B, Dhelipan Raj A, Dhilipkumar S, Koushikkaran K
River water plays an important role in every metropolitan society; it contributes significantly to the production of agricultural products and hence to the economy of a country besides offering many other benefits. Therefore, river water monitoring is necessary though difficult. The goal of this research is to create a quantitative technique for assessing the water quality state of the Indian rivers in the southern part of India. Water test samples were obtained at three distinct places along the Kaveri River for this study. The water level information was retrieved from the photos using a hybrid method (a combination of convolutional neural network and long short-term memory network) called CNN-LSMN. The level points were measured using the field camera placed in the test locations. The following six typical metrics were used to assess the water quality: turbidity, temperature, pH, TDS, conductivity, and total hardness. In this study, the water quality index (WQI) of the modified National Sanitation Foundation (NSF) was used to determine the quality of water. Furthermore, the flower pollination optimization method was used to optimise the critical water quality indicators. Standard performance metrics were used to compare the performance of the proposed approach with that of the existing techniques. Upon comparing the performance of the suggested CNN-LSMN in terms of performance measures, it was found that the detection accuracy had improved and it was 4.62%. The proposed technique in this study was found to be beneficial for precisely estimating the water level and quality of the rivers.
河水在每个大都市社会中都扮演着重要的角色;除了提供许多其他好处外,它还对农产品的生产做出了重大贡献,从而对一个国家的经济做出了重大贡献。因此,河流水质监测是必要的,虽然困难。本研究的目的是创建一种定量技术来评估印度南部河流的水质状况。为了这项研究,在卡韦里河沿岸的三个不同的地方获得了水测试样本。水位信息通过一种叫做CNN-LSMN的混合方法(卷积神经网络和长短期记忆网络的结合)从照片中检索。使用放置在测试位置的现场摄像机测量水平点。以下六个典型指标用于评估水质:浊度、温度、pH、TDS、电导率和总硬度。本研究采用修改后的美国国家卫生基金会(NSF)水质指数(WQI)来确定水质。采用传粉优化方法对关键水质指标进行优化。使用标准性能指标将所提出方法的性能与现有技术的性能进行比较。从性能指标上比较建议的CNN-LSMN的性能,发现检测准确率有提高,达到4.62%。研究结果表明,该方法有助于准确估计河流的水位和水质。
{"title":"Smart River Water Quality and Level Monitoring: a Hybrid Neural Network Approach","authors":"Chellaswamy C, G. S, Ramasubramanian B, Dhelipan Raj A, Dhilipkumar S, Koushikkaran K","doi":"10.1109/AICAPS57044.2023.10074495","DOIUrl":"https://doi.org/10.1109/AICAPS57044.2023.10074495","url":null,"abstract":"River water plays an important role in every metropolitan society; it contributes significantly to the production of agricultural products and hence to the economy of a country besides offering many other benefits. Therefore, river water monitoring is necessary though difficult. The goal of this research is to create a quantitative technique for assessing the water quality state of the Indian rivers in the southern part of India. Water test samples were obtained at three distinct places along the Kaveri River for this study. The water level information was retrieved from the photos using a hybrid method (a combination of convolutional neural network and long short-term memory network) called CNN-LSMN. The level points were measured using the field camera placed in the test locations. The following six typical metrics were used to assess the water quality: turbidity, temperature, pH, TDS, conductivity, and total hardness. In this study, the water quality index (WQI) of the modified National Sanitation Foundation (NSF) was used to determine the quality of water. Furthermore, the flower pollination optimization method was used to optimise the critical water quality indicators. Standard performance metrics were used to compare the performance of the proposed approach with that of the existing techniques. Upon comparing the performance of the suggested CNN-LSMN in terms of performance measures, it was found that the detection accuracy had improved and it was 4.62%. The proposed technique in this study was found to be beneficial for precisely estimating the water level and quality of the rivers.","PeriodicalId":146698,"journal":{"name":"2023 International Conference on Advances in Intelligent Computing and Applications (AICAPS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122953041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 International Conference on Advances in Intelligent Computing and Applications (AICAPS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1