首页 > 最新文献

2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)最新文献

英文 中文
Optimal hardware implementation for end-to-end CNN-based classification 端到端基于cnn分类的最优硬件实现
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068601
S. Aydin, H. Ş. Bilge
Convolutional neural networks (CNN) show promising results in many fields, especially in computer vision tasks. However, implementing these networks requires computationally intensive operations. Increasing computational workloads makes it difficult to use CNN models in real-time applications. To overcome these challenges, CNN must be implemented on a dedicated hardware platform such as a field-programmable gate array (FPGA). The parallel processing and reconfigurable features of FPGA hardware make it suitable for real-time applications. Nevertheless, due to limited resources and memory units, various optimizations must be applied prior to implementing processing-intensive structures. Both the resources and the memory units used in hardware applications are affected by the data types and byte lengths used to display data. This study proposes arbitrary, precision fixed-point data types for optimal end-to-end CNN hardware implementation. The network was trained on the Central Processing Unit (CPU) to address the classification problem. The CNN architecture was implemented on a Zynq-7 ZC702 evaluation board with a target device xc7z020clg484-1 platform utilizing high level synthesis (HLS) for the inference stage, based on the calculated weight parameters, and predetermined hyperparameters. The proposed implementation produced the results in 0.00329 s based on hardware implementation. In terms of latency metrics, the hardware-based CNN application produced a response approximately 18.9 times faster than the CPU-based CNN application in the inference phase while retaining the same accuracy. In terms of memory utilization and calculation units, the proposed design uses 52% fewer memory units and 68% fewer calculation units than the baseline design. While the proposed method used fewer resources, the classification success remained at 98.9%.
卷积神经网络(CNN)在许多领域,特别是在计算机视觉任务中显示出有希望的结果。然而,实现这些网络需要计算密集型的操作。不断增加的计算工作量使得在实时应用中使用CNN模型变得困难。为了克服这些挑战,CNN必须在专用的硬件平台上实现,例如现场可编程门阵列(FPGA)。FPGA硬件的并行处理和可重构特性使其适合于实时应用。然而,由于有限的资源和内存单元,在实现处理密集型结构之前必须应用各种优化。硬件应用程序中使用的资源和内存单元都受到用于显示数据的数据类型和字节长度的影响。本研究提出了任意、精确的定点数据类型,以实现最佳的端到端CNN硬件实现。该网络在中央处理器(CPU)上进行训练,以解决分类问题。CNN架构在Zynq-7 ZC702评估板上实现,目标器件xc7z020clg484-1平台利用高水平综合(HLS)作为推理阶段,基于计算的权重参数和预定的超参数。基于硬件实现,建议的实现在0.00329秒内产生结果。在延迟指标方面,在保持相同精度的情况下,基于硬件的CNN应用程序在推理阶段产生的响应速度比基于cpu的CNN应用程序快18.9倍。在内存利用率和计算单元方面,与基线设计相比,建议设计使用的内存单元减少了52%,计算单元减少了68%。虽然所提出的方法使用的资源较少,但分类成功率仍保持在98.9%。
{"title":"Optimal hardware implementation for end-to-end CNN-based classification","authors":"S. Aydin, H. Ş. Bilge","doi":"10.1109/ICITIIT57246.2023.10068601","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068601","url":null,"abstract":"Convolutional neural networks (CNN) show promising results in many fields, especially in computer vision tasks. However, implementing these networks requires computationally intensive operations. Increasing computational workloads makes it difficult to use CNN models in real-time applications. To overcome these challenges, CNN must be implemented on a dedicated hardware platform such as a field-programmable gate array (FPGA). The parallel processing and reconfigurable features of FPGA hardware make it suitable for real-time applications. Nevertheless, due to limited resources and memory units, various optimizations must be applied prior to implementing processing-intensive structures. Both the resources and the memory units used in hardware applications are affected by the data types and byte lengths used to display data. This study proposes arbitrary, precision fixed-point data types for optimal end-to-end CNN hardware implementation. The network was trained on the Central Processing Unit (CPU) to address the classification problem. The CNN architecture was implemented on a Zynq-7 ZC702 evaluation board with a target device xc7z020clg484-1 platform utilizing high level synthesis (HLS) for the inference stage, based on the calculated weight parameters, and predetermined hyperparameters. The proposed implementation produced the results in 0.00329 s based on hardware implementation. In terms of latency metrics, the hardware-based CNN application produced a response approximately 18.9 times faster than the CPU-based CNN application in the inference phase while retaining the same accuracy. In terms of memory utilization and calculation units, the proposed design uses 52% fewer memory units and 68% fewer calculation units than the baseline design. While the proposed method used fewer resources, the classification success remained at 98.9%.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124062726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Rear-view Aid System For Vehicles Based on Panoramic Vision 基于全景视觉的汽车后视镜辅助系统
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068600
Monilal S, Bhama Devi N
This paper proposes a simple rear view aid system based on panoramic vision that can be used to provide the rear-view aid to the driver of a vehicle. The image alignment technique proposed in this paper is very simple, computationally feasible, and is easily extendable for multiple input video streams.
本文提出了一种简单的基于全景视觉的后视镜辅助系统,可用于为车辆驾驶员提供后视镜辅助。本文提出的图像对齐技术非常简单,计算可行,并且易于扩展到多输入视频流。
{"title":"A Rear-view Aid System For Vehicles Based on Panoramic Vision","authors":"Monilal S, Bhama Devi N","doi":"10.1109/ICITIIT57246.2023.10068600","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068600","url":null,"abstract":"This paper proposes a simple rear view aid system based on panoramic vision that can be used to provide the rear-view aid to the driver of a vehicle. The image alignment technique proposed in this paper is very simple, computationally feasible, and is easily extendable for multiple input video streams.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126398307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sales Application Solution for Small Medium Enterprise 中小型企业销售应用解决方案
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068688
Ferdianto, Lius Steven Sanjaya, Titan, Erwin Ardianto Halim, Dyah Wahyu Sukmaningsih, A. Effendi, Yulius Lie
Information technology has become the basis for various companies to support operations and management, so companies in various fields have begun to develop information technology within their companies to compete. Based on that phenomenon, there is an opportunity for SMEs also to do the same. Developing information technology within SMEs can solve many problems, such as increasing producvity and managing sales data, inventory, and reports, especially when SMEs have more than one store. This research aims to design applications for Small and Medium Enterprises to support Sales Processes. System Development Life Cycle Methodology was used to develop the application. The requirement-gathering techniques used in this research were interviews, observations with many SMEs, and study literature. The benefit of this research is to help SME owners view and monitor sales data and help the owner make decisions based on data they own.
信息技术已经成为各个公司支持经营和管理的基础,所以各个领域的公司都开始在公司内部发展信息技术来竞争。基于这种现象,中小企业也有机会这样做。在中小企业中开发信息技术可以解决许多问题,例如提高生产率和管理销售数据、库存和报告,特别是当中小企业拥有多个商店时。本研究旨在为中小型企业设计支持销售流程的应用程序。应用程序的开发采用了系统开发生命周期方法。本研究中使用的需求收集技术是访谈、对许多中小企业的观察和研究文献。这项研究的好处是帮助中小企业主查看和监控销售数据,并帮助企业主根据自己拥有的数据做出决策。
{"title":"Sales Application Solution for Small Medium Enterprise","authors":"Ferdianto, Lius Steven Sanjaya, Titan, Erwin Ardianto Halim, Dyah Wahyu Sukmaningsih, A. Effendi, Yulius Lie","doi":"10.1109/ICITIIT57246.2023.10068688","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068688","url":null,"abstract":"Information technology has become the basis for various companies to support operations and management, so companies in various fields have begun to develop information technology within their companies to compete. Based on that phenomenon, there is an opportunity for SMEs also to do the same. Developing information technology within SMEs can solve many problems, such as increasing producvity and managing sales data, inventory, and reports, especially when SMEs have more than one store. This research aims to design applications for Small and Medium Enterprises to support Sales Processes. System Development Life Cycle Methodology was used to develop the application. The requirement-gathering techniques used in this research were interviews, observations with many SMEs, and study literature. The benefit of this research is to help SME owners view and monitor sales data and help the owner make decisions based on data they own.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125885427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual Based Malware Clustering Using Convolution Neural Network 基于卷积神经网络的可视化恶意软件聚类
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068670
Sandeep B. Kadam, V. Abhijith, Premlal Ajikumar Sreelekha
As the popularity of Internet of Things (IoT) devices expands in industries and residences, their low processing power and inadequate security make them ideal targets for attackers. Traditional signature-based methods for detecting malware are inefficient against new malware since a small modification in the malware's source code can modify its signature, making it impossible to detect. Understanding the basics of malware behaviour and combatting hackers requires the classification of malware samples. In this study, we examine an image-based classification of malware in which nine malware families were categorised using a convolution neural network (CNN). Using kfold stratified cross-validation, our model attained a promising 89.5% accuracy in training and 82% accuracy in validation.
随着物联网(IoT)设备在工业和家庭中的普及,其低处理能力和不充分的安全性使其成为攻击者的理想目标。传统的基于签名的检测恶意软件的方法对于新的恶意软件是低效的,因为对恶意软件源代码的微小修改可以修改其签名,使其无法检测到。了解恶意软件的基本行为和打击黑客需要对恶意软件样本进行分类。在本研究中,我们研究了基于图像的恶意软件分类,其中使用卷积神经网络(CNN)对九个恶意软件家族进行了分类。使用kfold分层交叉验证,我们的模型在训练中达到了89.5%的准确率,在验证中达到了82%的准确率。
{"title":"Visual Based Malware Clustering Using Convolution Neural Network","authors":"Sandeep B. Kadam, V. Abhijith, Premlal Ajikumar Sreelekha","doi":"10.1109/ICITIIT57246.2023.10068670","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068670","url":null,"abstract":"As the popularity of Internet of Things (IoT) devices expands in industries and residences, their low processing power and inadequate security make them ideal targets for attackers. Traditional signature-based methods for detecting malware are inefficient against new malware since a small modification in the malware's source code can modify its signature, making it impossible to detect. Understanding the basics of malware behaviour and combatting hackers requires the classification of malware samples. In this study, we examine an image-based classification of malware in which nine malware families were categorised using a convolution neural network (CNN). Using kfold stratified cross-validation, our model attained a promising 89.5% accuracy in training and 82% accuracy in validation.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125096122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rechain: A Secured Blockchain-Based Digital Medical Health Record Management System Rechain:基于区块链的安全数字医疗健康记录管理系统
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068707
N. Nautiyal, Piyush Agarwal, Sachin Sharma
The typical method of keeping track of medical records uses paper and centralised systems, which introduces a great deal of uncertainty and can lead to inaccurate information, identity theft, a lack of accessibility, and other problems. With the use of blockchain technology, which offers us security, availability, and integrity, this study seeks to address these problems. Using this, the records can be safeguarded and accessible from anywhere, at any time. This blockchain-based solution can protect a patient's life in an emergency since all of the records can be viewed in one location without the inconvenience of running various tests. Re-chain a secure blockchain-based digital medical health record management system was developed to solve the problems with the centralized and traditional system. It is based on the Ethereum network and uses web3.storage which is an Interplanetary File System (IPFS) system to store files in a decentralized manner.
记录医疗记录的典型方法是使用纸张和集中系统,这带来了很大的不确定性,并可能导致信息不准确、身份被盗、缺乏可访问性和其他问题。通过使用区块链技术,该技术为我们提供了安全性、可用性和完整性,本研究试图解决这些问题。使用它,记录可以得到保护,并且可以随时从任何地方访问。这种基于区块链的解决方案可以在紧急情况下保护患者的生命,因为所有记录都可以在一个地方查看,而不会带来运行各种测试的不便。为解决集中式和传统系统存在的问题,开发了一种基于区块链的安全数字医疗病历管理系统。它基于以太坊网络并使用web3。它是一种星际文件系统(IPFS)系统,以分散的方式存储文件。
{"title":"Rechain: A Secured Blockchain-Based Digital Medical Health Record Management System","authors":"N. Nautiyal, Piyush Agarwal, Sachin Sharma","doi":"10.1109/ICITIIT57246.2023.10068707","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068707","url":null,"abstract":"The typical method of keeping track of medical records uses paper and centralised systems, which introduces a great deal of uncertainty and can lead to inaccurate information, identity theft, a lack of accessibility, and other problems. With the use of blockchain technology, which offers us security, availability, and integrity, this study seeks to address these problems. Using this, the records can be safeguarded and accessible from anywhere, at any time. This blockchain-based solution can protect a patient's life in an emergency since all of the records can be viewed in one location without the inconvenience of running various tests. Re-chain a secure blockchain-based digital medical health record management system was developed to solve the problems with the centralized and traditional system. It is based on the Ethereum network and uses web3.storage which is an Interplanetary File System (IPFS) system to store files in a decentralized manner.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128939424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Mutable Blockchain for Identity Management 身份管理的可变区块链
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068675
Shruti Jadon, D. Bhat, Shashank R, Yashaswi Tb, Prasad Hb
Identity management solutions are generally designed to facilitate the management of digital identities and operations such as authentication, and have been widely used in real-world applications. In recent years, there have been attempts to introduce blockchain-based identity management solutions, which allow the user to take over control of his/her own identity (i.e. self-sovereign identity). In this paper, we provide a short review of existing blockchain-based identity management methods. Based on the existing methods, we identify potential gaps and opportunities, and proposed an idea to overcome them using mutable blockchain concept[7] [10]. We have used two algorithms-creation of new identity and updation of existing identities on the blockchain. The main contribution of the proposed algorithm is to store the personal data securely in local database and the address of the corresponding data is stored in the blockchain in hashed format. The results for the proposed approach demonstrate that the mining difficulty and mining time varies with the number of transaction in per block.
身份管理解决方案通常旨在促进数字身份和身份验证等操作的管理,并已广泛应用于实际应用中。近年来,有人试图引入基于区块链的身份管理解决方案,允许用户接管他/她自己的身份(即自我主权身份)。在本文中,我们简要回顾了现有的基于区块链的身份管理方法。在现有方法的基础上,我们发现了潜在的差距和机会,并提出了使用可变区块链概念来克服它们的想法[7][10]。我们使用了两种算法——在区块链上创建新身份和更新现有身份。该算法的主要贡献是将个人数据安全地存储在本地数据库中,并将相应数据的地址以散列格式存储在区块链中。结果表明,该方法的挖掘难度和挖掘时间随每个区块的交易数量而变化。
{"title":"Mutable Blockchain for Identity Management","authors":"Shruti Jadon, D. Bhat, Shashank R, Yashaswi Tb, Prasad Hb","doi":"10.1109/ICITIIT57246.2023.10068675","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068675","url":null,"abstract":"Identity management solutions are generally designed to facilitate the management of digital identities and operations such as authentication, and have been widely used in real-world applications. In recent years, there have been attempts to introduce blockchain-based identity management solutions, which allow the user to take over control of his/her own identity (i.e. self-sovereign identity). In this paper, we provide a short review of existing blockchain-based identity management methods. Based on the existing methods, we identify potential gaps and opportunities, and proposed an idea to overcome them using mutable blockchain concept[7] [10]. We have used two algorithms-creation of new identity and updation of existing identities on the blockchain. The main contribution of the proposed algorithm is to store the personal data securely in local database and the address of the corresponding data is stored in the blockchain in hashed format. The results for the proposed approach demonstrate that the mining difficulty and mining time varies with the number of transaction in per block.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115385641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NFT Application for Music Industry using Blockchain Smart contracts 基于区块链智能合约的音乐行业NFT应用
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068684
T. Tharun, A. Vamshi, R. Eswari
The vast possibilities of the internet age bring an attraction for artists. As a matter of fact, reports of artist revenue have lowered the potential of music platforms. Streams that are difficult to comprehend, cultural structures inside lack reliable data, inadequate for the digital era, aspects of the music business and a drop in the majority of artists' wages. In this paper, A Non-Fungible Tokens (NFT) in Music Industry using Blockchain Technology are proposed to protect the music copyrights and get revenue rights from untrusted holders. In this model, the Musicians may effortlessly approve and maintain their music rights on a public ledger with the help of the blockchain with no middlemen or any other intermediate business companies.
互联网时代的巨大可能性吸引着艺术家。事实上,关于艺人收入的报道已经降低了音乐平台的潜力。流媒体难以理解,内部文化结构缺乏可靠的数据,不适合数字时代,音乐业务的各个方面以及大多数艺术家的工资下降。本文提出了一种使用区块链技术的音乐行业不可替代代币(NFT),以保护音乐版权并从不受信任的持有者那里获得收益权。在这种模式下,音乐家可以在区块链的帮助下毫不费力地在公共分类账上批准和维护他们的音乐版权,而不需要中间人或任何其他中间商业公司。
{"title":"NFT Application for Music Industry using Blockchain Smart contracts","authors":"T. Tharun, A. Vamshi, R. Eswari","doi":"10.1109/ICITIIT57246.2023.10068684","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068684","url":null,"abstract":"The vast possibilities of the internet age bring an attraction for artists. As a matter of fact, reports of artist revenue have lowered the potential of music platforms. Streams that are difficult to comprehend, cultural structures inside lack reliable data, inadequate for the digital era, aspects of the music business and a drop in the majority of artists' wages. In this paper, A Non-Fungible Tokens (NFT) in Music Industry using Blockchain Technology are proposed to protect the music copyrights and get revenue rights from untrusted holders. In this model, the Musicians may effortlessly approve and maintain their music rights on a public ledger with the help of the blockchain with no middlemen or any other intermediate business companies.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128441166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Friend Recommendation System Using Map-Reduce and Spark: A Comparison Study 基于Map-Reduce和Spark的好友推荐系统的比较研究
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068723
A.M. Abhishek Sai, Gottimukkala Sahil, Boddu Sasi Sai Nadh, Kalla Likhit Sai Eswar, N. S, K. Prakash, A. Mahesh
Connecting with other people online is common practice and huge amounts of data are generated each day by increasing web activity. This type of data collection can be used to recommend friends on social media. We have utilized Map Reduce and Spark to analyze the vast amount of data. A Friend Recommendation system has been implemented using Map Reduce and Spark. Furthermore, we compared both Distributed Computation techniques in order to determine the optimum solution. We found that spark computation is 16 times faster than Hadoop Map-Reduce computation for Friend Recommendation System. Spark proves to be more efficient than map-reduce in terms of time efficiency.
在网上与其他人联系是一种常见的做法,随着网络活动的增加,每天都会产生大量的数据。这种类型的数据收集可以用来在社交媒体上推荐朋友。我们使用Map Reduce和Spark来分析大量的数据。利用mapreduce和Spark实现了一个好友推荐系统。此外,我们比较了两种分布式计算技术,以确定最佳解决方案。我们发现spark计算比Hadoop Map-Reduce计算在朋友推荐系统中的速度快16倍。在时间效率方面,Spark被证明比map-reduce更有效。
{"title":"Friend Recommendation System Using Map-Reduce and Spark: A Comparison Study","authors":"A.M. Abhishek Sai, Gottimukkala Sahil, Boddu Sasi Sai Nadh, Kalla Likhit Sai Eswar, N. S, K. Prakash, A. Mahesh","doi":"10.1109/ICITIIT57246.2023.10068723","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068723","url":null,"abstract":"Connecting with other people online is common practice and huge amounts of data are generated each day by increasing web activity. This type of data collection can be used to recommend friends on social media. We have utilized Map Reduce and Spark to analyze the vast amount of data. A Friend Recommendation system has been implemented using Map Reduce and Spark. Furthermore, we compared both Distributed Computation techniques in order to determine the optimum solution. We found that spark computation is 16 times faster than Hadoop Map-Reduce computation for Friend Recommendation System. Spark proves to be more efficient than map-reduce in terms of time efficiency.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126539953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced Hybrid Scheme for IP Traceback 一种增强的IP回溯混合方案
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068579
Subash A, A. Cs, V. M
Internet has become a highly influential medium in recent years and this has led to the arrival of threats like DDoS attacks. DDoS attacks are in rising spree, as attackers are very well resourced. IP spoofing makes the situation further worse by concealing the attacker's identity. The IP Traceback mechanism is effective in identifying the origin of the attack. This paper outlines a hybrid traceback technique with packet marking followed by logging. The proposed scheme utilizes a minimized marking field of 16 bits in an IP header compared to existing techniques. The maximum storage requirement will be around 384 KB (based on CAIDA dataset) for logging on all routers. The path reconstruction has zero false positive and false negative rates. Therefore, the proposed scheme eliminates the packet fragmentation problem by reducing the number of digits for marking with a negligible increase in the storage.
近年来,互联网已成为一种极具影响力的媒体,这导致了DDoS攻击等威胁的到来。DDoS攻击呈上升趋势,因为攻击者资源丰富。IP欺骗通过隐藏攻击者的身份使情况进一步恶化。IP回溯机制可以有效地识别攻击的来源。本文概述了一种带有数据包标记和日志记录的混合回溯技术。与现有技术相比,该方案利用IP报头中最小的16位标记域。登录所有路由器的最大存储需求大约是384 KB(基于CAIDA数据集)。路径重构的假阳性和假阴性率均为零。因此,该方案通过减少用于标记的位数来消除数据包碎片问题,而存储的增加可以忽略不计。
{"title":"An Enhanced Hybrid Scheme for IP Traceback","authors":"Subash A, A. Cs, V. M","doi":"10.1109/ICITIIT57246.2023.10068579","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068579","url":null,"abstract":"Internet has become a highly influential medium in recent years and this has led to the arrival of threats like DDoS attacks. DDoS attacks are in rising spree, as attackers are very well resourced. IP spoofing makes the situation further worse by concealing the attacker's identity. The IP Traceback mechanism is effective in identifying the origin of the attack. This paper outlines a hybrid traceback technique with packet marking followed by logging. The proposed scheme utilizes a minimized marking field of 16 bits in an IP header compared to existing techniques. The maximum storage requirement will be around 384 KB (based on CAIDA dataset) for logging on all routers. The path reconstruction has zero false positive and false negative rates. Therefore, the proposed scheme eliminates the packet fragmentation problem by reducing the number of digits for marking with a negligible increase in the storage.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113959967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT-enabled Contactless Doorbell with Facial Recognition 具有面部识别功能的物联网非接触式门铃
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068625
Gimhan Rodrigo, Dimanthinie De Silva
The COVID-19 epidemic has altered lifestyles all across the globe, causing people to take additional safety precautions and make using a face mask a requirement. Face masks are becoming more popular, making it occasionally challenging for people to recognize other people. Children and the elderly in particular would have trouble identifying their masked guests, which poses a serious hazard because thieves or burglars would take advantage of the situation. In this study, a system was created using IoT and deep learning technologies that works as a unit to offer a contactless solution to the ongoing COVID-19 pandemic while also enabling home owners to keep track of their visitors and receive notifications when someone comes over. The contactless doorbell was created with the help of a Raspberry Pi and a modified ResNet-50 model using ArcFace loss as the feature extractor to efficiently extract visible features from a masked face and support very accurate recognition. Due to the lack of a real masked face dataset with sufficient data, this study used a data augmentation method to add masks to face images from a dataset. The model was able to achieve a recognition accuracy of 98.27% when evaluated using a masked LFW dataset. Furthermore, testing the face recognition model in real-time with limited users, each with and without a mask yielded an accuracy of 100% in unmasked facial recognition and 90% on masked facial recognition.
新冠肺炎疫情改变了全球各地的生活方式,导致人们采取额外的安全预防措施,并要求使用口罩。口罩正变得越来越受欢迎,这使得人们偶尔很难认出别人。特别是孩子和老人很难认出他们戴着面具的客人,这构成了严重的危险,因为小偷或窃贼会利用这种情况。在这项研究中,使用物联网和深度学习技术创建了一个系统,该系统作为一个整体,为正在进行的COVID-19大流行提供非接触式解决方案,同时还使房主能够跟踪他们的访客,并在有人来访时收到通知。非接触式门铃是在树莓派和改进的ResNet-50模型的帮助下创建的,使用ArcFace loss作为特征提取器,有效地从蒙面中提取可见特征,并支持非常准确的识别。由于缺乏真实且数据充足的人脸数据集,本研究采用数据增强方法对数据集中的人脸图像进行蒙版添加。当使用蒙面LFW数据集进行评估时,该模型能够达到98.27%的识别准确率。此外,在有限的用户中实时测试人脸识别模型,每个用户都有和没有面具,在无面具面部识别中准确率为100%,在面具面部识别中准确率为90%。
{"title":"IoT-enabled Contactless Doorbell with Facial Recognition","authors":"Gimhan Rodrigo, Dimanthinie De Silva","doi":"10.1109/ICITIIT57246.2023.10068625","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068625","url":null,"abstract":"The COVID-19 epidemic has altered lifestyles all across the globe, causing people to take additional safety precautions and make using a face mask a requirement. Face masks are becoming more popular, making it occasionally challenging for people to recognize other people. Children and the elderly in particular would have trouble identifying their masked guests, which poses a serious hazard because thieves or burglars would take advantage of the situation. In this study, a system was created using IoT and deep learning technologies that works as a unit to offer a contactless solution to the ongoing COVID-19 pandemic while also enabling home owners to keep track of their visitors and receive notifications when someone comes over. The contactless doorbell was created with the help of a Raspberry Pi and a modified ResNet-50 model using ArcFace loss as the feature extractor to efficiently extract visible features from a masked face and support very accurate recognition. Due to the lack of a real masked face dataset with sufficient data, this study used a data augmentation method to add masks to face images from a dataset. The model was able to achieve a recognition accuracy of 98.27% when evaluated using a masked LFW dataset. Furthermore, testing the face recognition model in real-time with limited users, each with and without a mask yielded an accuracy of 100% in unmasked facial recognition and 90% on masked facial recognition.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127579148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1