首页 > 最新文献

2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)最新文献

英文 中文
Selection of Machine Learning Algorithm for Pattern Recognition Based Bionic Devices: *Note: Sub-titles are not captured in Xplore and should not be used 基于模式识别的仿生设备的机器学习算法选择:*注:在Xplore中不捕获字幕,不应使用
S. Khan, Areena Nisar, Asma Arshad, Abid Ali Khan, Omar Farooq
The myoelectric prosthetic devices advancement has been essential to redevelop the grasping capabilities of amputees. Despite these advancements, myoelectric prosthetic devices need improvements to replicate the grasping performed by the human hand. The grasping performed by the human hand needs to be firm and avoid slippage of the objects. To avoid slippage, the information related to grasping force is important. In this study, the EMG signals are acquired while grasping a cylindrical object at different weight levels with two precision prismatic gestures. Using these EMG signals, force-based classification is performed based on the different weight levels for each gesture. The result shows that the highest mean classification accuracy was obtained using Support Vector Machines (SVM), followed by the k-Nearest Neighbors (k-NN) for each gesture. The mean classification accuracy obtained using SVM were 94.05% and 96.8% for 1st and 2nd gesture respectively. It is concluded that better outcomes are obtained using more complex classifiers as compared to simple classifiers such as Naïve Bayes and Linear Discriminant Analysis. In the future, a more descriptive and detailed analysis is expected to be performed using the outcomes obtained.
肌电义肢装置的进步对截肢者的抓握能力的重新发展至关重要。尽管有了这些进步,肌电假肢装置还需要改进才能复制人手的抓取动作。人手的抓握需要牢固,避免物体滑落。为了避免滑移,与抓握力有关的信息很重要。在本研究中,采用两种精确的棱柱形手势在不同重量水平下抓取圆柱形物体时获取肌电信号。使用这些肌电图信号,根据每个手势的不同权重级别执行基于力的分类。结果表明,使用支持向量机(SVM)对每个手势的平均分类精度最高,其次是k-最近邻(k-NN)。SVM对第一和第二手势的平均分类准确率分别为94.05%和96.8%。结论是,与Naïve贝叶斯和线性判别分析等简单分类器相比,使用更复杂的分类器可以获得更好的结果。在未来,预计将使用获得的结果进行更具描述性和详细的分析。
{"title":"Selection of Machine Learning Algorithm for Pattern Recognition Based Bionic Devices: *Note: Sub-titles are not captured in Xplore and should not be used","authors":"S. Khan, Areena Nisar, Asma Arshad, Abid Ali Khan, Omar Farooq","doi":"10.1109/UPCON56432.2022.9986358","DOIUrl":"https://doi.org/10.1109/UPCON56432.2022.9986358","url":null,"abstract":"The myoelectric prosthetic devices advancement has been essential to redevelop the grasping capabilities of amputees. Despite these advancements, myoelectric prosthetic devices need improvements to replicate the grasping performed by the human hand. The grasping performed by the human hand needs to be firm and avoid slippage of the objects. To avoid slippage, the information related to grasping force is important. In this study, the EMG signals are acquired while grasping a cylindrical object at different weight levels with two precision prismatic gestures. Using these EMG signals, force-based classification is performed based on the different weight levels for each gesture. The result shows that the highest mean classification accuracy was obtained using Support Vector Machines (SVM), followed by the k-Nearest Neighbors (k-NN) for each gesture. The mean classification accuracy obtained using SVM were 94.05% and 96.8% for 1st and 2nd gesture respectively. It is concluded that better outcomes are obtained using more complex classifiers as compared to simple classifiers such as Naïve Bayes and Linear Discriminant Analysis. In the future, a more descriptive and detailed analysis is expected to be performed using the outcomes obtained.","PeriodicalId":185782,"journal":{"name":"2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125736876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Speaker Verification Spoof Detection and Countermeasures Using Gaussian Mixture Model 基于高斯混合模型的自动说话人验证欺骗检测与对抗
Ramesh Kumar Bhukya, Aditya Raj
Automatic Speaker Verification (ASV) is an emerging biometric authentication technique with the process of accepting/rejecting the users' claimed identity based on his/her speech samples. Robust countermeasures for spoofing attack detections are required to secure biometric systems from intruders. Anti-spoofing is also called replay detection in which voice is recorded, stored and replayed to deceive ASV systems. The ASVspoof series of challenge provides a shared anti-spoofing attack, ASVspoof 2019 focused on both synthetic and replay speech that are referred to as physical and logical access attacks, respectively. To build the robust system, we considered separate data for bonafide and spoofed voice data and implemented separate models for both classes. We addressed our system based on Gaussian Mixture Model, which is performed on ASVspoof 2019 Database. Finally, the experiments focused on both MFCC features and machine learned features have a comparable results with an equal error rate (EER) of 5.64% and 7.56 %.
自动说话人验证(ASV)是一种新兴的生物识别认证技术,它基于用户的语音样本来接受/拒绝用户的身份声明。为了保护生物识别系统免受入侵者的攻击,需要针对欺骗攻击检测的强大对策。反欺骗也被称为重放检测,其中语音被记录,存储和重放以欺骗ASV系统。ASVspoof系列挑战提供了一种共享的反欺骗攻击,ASVspoof 2019专注于合成语音和重播语音,分别被称为物理和逻辑访问攻击。为了构建健壮的系统,我们考虑了真实和欺骗语音数据的独立数据,并为这两类实现了单独的模型。我们基于高斯混合模型对系统进行了求解,并在ASVspoof 2019数据库上进行了测试。最后,针对MFCC特征和机器学习特征进行的实验结果相当,错误率(EER)分别为5.64%和7.56%。
{"title":"Automatic Speaker Verification Spoof Detection and Countermeasures Using Gaussian Mixture Model","authors":"Ramesh Kumar Bhukya, Aditya Raj","doi":"10.1109/UPCON56432.2022.9986418","DOIUrl":"https://doi.org/10.1109/UPCON56432.2022.9986418","url":null,"abstract":"Automatic Speaker Verification (ASV) is an emerging biometric authentication technique with the process of accepting/rejecting the users' claimed identity based on his/her speech samples. Robust countermeasures for spoofing attack detections are required to secure biometric systems from intruders. Anti-spoofing is also called replay detection in which voice is recorded, stored and replayed to deceive ASV systems. The ASVspoof series of challenge provides a shared anti-spoofing attack, ASVspoof 2019 focused on both synthetic and replay speech that are referred to as physical and logical access attacks, respectively. To build the robust system, we considered separate data for bonafide and spoofed voice data and implemented separate models for both classes. We addressed our system based on Gaussian Mixture Model, which is performed on ASVspoof 2019 Database. Finally, the experiments focused on both MFCC features and machine learned features have a comparable results with an equal error rate (EER) of 5.64% and 7.56 %.","PeriodicalId":185782,"journal":{"name":"2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126164725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance of Cuk Converter Based on EHO Model for Improving the Conversion Efficiency Levels 基于EHO模型的Cuk变换器性能研究,提高转换效率水平
C. Mutta, A. Prajapati
The performance of Cuk converter is heavily dependent on circuit parameter ratings, which assist in optimizing capacitor values, inductor values, duty cycles, etc. for optimum conversion efficiency. To perform this task, various researchers have proposed multiple models that allow for dynamic selection of these ratings under real-time use-cases. But most of these models have higher complexity, and their values cannot be used for general-purpose circuit deployments. To overcome this limitation, a novel Elephant Herding Optimization (EHO) based model for the selection of Cuk converter parameters for improving conversion efficiency levels is proposed and discussed in this paper. The proposed model uses an EHO method for estimating circuit ratings under ON and OFF states. These values are validated for different converter configurations and are incrementally tuned by the EHO model for general-purpose applicability. These values include ratings of the parallel diode, switching duty cycle, and ratings for series inductors and capacitors under different conditions. Due to the optimum selection of these ratings, the underlying model is capable of low power, and high-efficiency operations. The proposed model is evaluated under different real-time applications including solar power conversion, battery power conversion, wind power conversion, etc., and its power efficiency and total harmonic distortion (THD) levels are compared with various state-of-the-art models. Based on this comparison it is observed that the proposed model showcased 8.5% lower THD, with 4.9% better power efficiency when compared with these models, which makes the proposed model highly useful for large-scale conversion applications.
Cuk变换器的性能在很大程度上取决于电路参数额定值,这有助于优化电容器值,电感值,占空比等,以获得最佳的转换效率。为了完成这项任务,不同的研究人员提出了多个模型,允许在实时用例下动态选择这些评级。但这些模型大多具有较高的复杂性,其值不能用于通用电路的部署。为了克服这一局限性,本文提出并讨论了一种基于象群优化(EHO)的新型Cuk转换器参数选择模型,以提高转换效率水平。该模型使用EHO方法来估计电路在ON和OFF状态下的额定值。这些值针对不同的转换器配置进行验证,并由EHO模型进行增量调优,以实现通用适用性。这些值包括并联二极管的额定值、开关占空比以及不同条件下串联电感和电容器的额定值。由于这些额定值的最佳选择,底层模型能够实现低功耗和高效率的操作。在太阳能转换、电池转换、风能转换等不同实时应用下对该模型进行了评估,并将其功率效率和总谐波失真(THD)水平与各种最新模型进行了比较。在此基础上,我们观察到,与这些模型相比,所提出的模型的THD降低了8.5%,功率效率提高了4.9%,这使得所提出的模型对大规模转换应用非常有用。
{"title":"Performance of Cuk Converter Based on EHO Model for Improving the Conversion Efficiency Levels","authors":"C. Mutta, A. Prajapati","doi":"10.1109/UPCON56432.2022.9986390","DOIUrl":"https://doi.org/10.1109/UPCON56432.2022.9986390","url":null,"abstract":"The performance of Cuk converter is heavily dependent on circuit parameter ratings, which assist in optimizing capacitor values, inductor values, duty cycles, etc. for optimum conversion efficiency. To perform this task, various researchers have proposed multiple models that allow for dynamic selection of these ratings under real-time use-cases. But most of these models have higher complexity, and their values cannot be used for general-purpose circuit deployments. To overcome this limitation, a novel Elephant Herding Optimization (EHO) based model for the selection of Cuk converter parameters for improving conversion efficiency levels is proposed and discussed in this paper. The proposed model uses an EHO method for estimating circuit ratings under ON and OFF states. These values are validated for different converter configurations and are incrementally tuned by the EHO model for general-purpose applicability. These values include ratings of the parallel diode, switching duty cycle, and ratings for series inductors and capacitors under different conditions. Due to the optimum selection of these ratings, the underlying model is capable of low power, and high-efficiency operations. The proposed model is evaluated under different real-time applications including solar power conversion, battery power conversion, wind power conversion, etc., and its power efficiency and total harmonic distortion (THD) levels are compared with various state-of-the-art models. Based on this comparison it is observed that the proposed model showcased 8.5% lower THD, with 4.9% better power efficiency when compared with these models, which makes the proposed model highly useful for large-scale conversion applications.","PeriodicalId":185782,"journal":{"name":"2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130429852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis and Comparison of Image-Based UAV Detection and Identification 基于图像的无人机检测与识别的分析与比较
Nidhish Dubey, Nanduri Mahathi Sai Nithin, S. Tripathi
This paper presents Unmanned Aerial Vehicles (UAVs) detection and classification with the help of different image-based machine learning modalities. The field of UAVs attracted researchers in recent years in response to the exponential rise in the number of UAVs available in the market with applications ranging from entertainment to defense operations and the risk associated risk by the same. Presently, visual, radar, radio frequency, and acoustic sensing systems are the prevailing technologies in the field of detection and identification of UAVs. The general results of this study show that UAV machine learning-based classifications are propitious and that there are many successful individual contributions. In this research, UAVs were detected and classified using classification methods like Support Vector Machines (SVM), k-nearest neighbor (KNN), and Convolutional Neural Networks (CNN). The results demonstrated that CNN, SVM, and KNN had an accuracy of 91%, 87%, and 78%, respectively. The classifier CNN outperformed other classifiers under the same empirical circumstances.
本文介绍了利用不同的基于图像的机器学习模式对无人机进行检测和分类。近年来,无人机领域吸引了研究人员,以应对市场上可用的无人机数量呈指数级增长,其应用范围从娱乐到国防作战以及相关风险。目前,视觉、雷达、射频和声学传感系统是无人机探测和识别领域的主流技术。本研究的总体结果表明,基于无人机机器学习的分类是有利的,并且有许多成功的个人贡献。在本研究中,使用支持向量机(SVM)、k近邻(KNN)和卷积神经网络(CNN)等分类方法对无人机进行检测和分类。结果表明,CNN、SVM和KNN的准确率分别为91%、87%和78%。在相同的经验环境下,分类器CNN优于其他分类器。
{"title":"Analysis and Comparison of Image-Based UAV Detection and Identification","authors":"Nidhish Dubey, Nanduri Mahathi Sai Nithin, S. Tripathi","doi":"10.1109/UPCON56432.2022.9986447","DOIUrl":"https://doi.org/10.1109/UPCON56432.2022.9986447","url":null,"abstract":"This paper presents Unmanned Aerial Vehicles (UAVs) detection and classification with the help of different image-based machine learning modalities. The field of UAVs attracted researchers in recent years in response to the exponential rise in the number of UAVs available in the market with applications ranging from entertainment to defense operations and the risk associated risk by the same. Presently, visual, radar, radio frequency, and acoustic sensing systems are the prevailing technologies in the field of detection and identification of UAVs. The general results of this study show that UAV machine learning-based classifications are propitious and that there are many successful individual contributions. In this research, UAVs were detected and classified using classification methods like Support Vector Machines (SVM), k-nearest neighbor (KNN), and Convolutional Neural Networks (CNN). The results demonstrated that CNN, SVM, and KNN had an accuracy of 91%, 87%, and 78%, respectively. The classifier CNN outperformed other classifiers under the same empirical circumstances.","PeriodicalId":185782,"journal":{"name":"2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128946786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Number Plate Detection Using Drone Surveillance 使用无人机监视车牌检测
Swati Jain, Shaili Patel, Avi Mehta, J. P. Verma
Drones, or unmanned aerial vehicles, have a wide range of uses in a variety of sectors. Surveillance, photography, surveying physically difficult locations, and traffic patrols are some of the applications. License plate detection and identification by utilizing UAV s based video streaming is one such scenario on which we have engaged. Recognizing license plates in drone photographs is a difficult task since the images may be distorted, blurred, or contain background noise such as other cars, banners, or people. The automatic license plate detecting system is a well-established system in which the majority of research has been conducted. These approaches, on the other hand, concentrate on photographs taken from the front. The suggested study is limited to a subset of drone photos. We examined multiple state-of-the-art methods like Wpodnet and yolov5 for detecting license plates in subsets of drone images in this paper.
无人驾驶飞机或无人驾驶飞行器在各个领域都有广泛的用途。监视、摄影、测量物理上困难的地点和交通巡逻是一些应用。利用基于视频流的无人机进行车牌检测和识别就是我们参与的其中一个场景。识别无人机照片中的车牌是一项艰巨的任务,因为图像可能会失真、模糊或包含其他车辆、横幅或人等背景噪声。车牌自动检测系统是一种完善的系统,在这一系统中进行了大量的研究。另一方面,这些方法侧重于从正面拍摄的照片。建议的研究仅限于无人机照片的一个子集。在本文中,我们研究了多种最先进的方法,如Wpodnet和yolov5,用于检测无人机图像子集中的车牌。
{"title":"Number Plate Detection Using Drone Surveillance","authors":"Swati Jain, Shaili Patel, Avi Mehta, J. P. Verma","doi":"10.1109/UPCON56432.2022.9986360","DOIUrl":"https://doi.org/10.1109/UPCON56432.2022.9986360","url":null,"abstract":"Drones, or unmanned aerial vehicles, have a wide range of uses in a variety of sectors. Surveillance, photography, surveying physically difficult locations, and traffic patrols are some of the applications. License plate detection and identification by utilizing UAV s based video streaming is one such scenario on which we have engaged. Recognizing license plates in drone photographs is a difficult task since the images may be distorted, blurred, or contain background noise such as other cars, banners, or people. The automatic license plate detecting system is a well-established system in which the majority of research has been conducted. These approaches, on the other hand, concentrate on photographs taken from the front. The suggested study is limited to a subset of drone photos. We examined multiple state-of-the-art methods like Wpodnet and yolov5 for detecting license plates in subsets of drone images in this paper.","PeriodicalId":185782,"journal":{"name":"2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115414777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comprehensive Study of Solar Energy Harvesting System in Wireless Sensor Networks 无线传感器网络太阳能收集系统的综合研究
D. K. Sah, Nabajyoti Mazumdar, Pankaj Pal, Tarachand Amgoth
Wireless Sensor Networks (WSNs) incorporate sensor nodes with minimal power consumption. Sensor devices are in high demand in many areas, including smart cities, environmental monitoring, the Internet of Things (IoT), health monitoring, and the like. As nodes are frequently located in remote places, and an ordinary node battery life is too short, energy depletion is a significant problem for the sensor network. But it's not practical to change or regularly maintain the sensor node's battery. This could cause the network to disconnect. Consequently, a recharging sensor node battery has been identified using energy harvesting (EH). It has several environmental forms, including solar, wind, mechanical, etc. The solar system provides unlimited energy resources to nodes. This paper examines a comprehensive case study of solar harvesting systems and their most recent applications. In solar harvesting nodes, the following primary components are utilised: solar panels, energy storage classes, a $DC-DC$ converter, maximum power point tracking (MPPT), an energy predictor, and a sensing module. Furthermore, we have discussed some recent applications and future work of sensor networks, for example, green street lights, agriculture 4.0, outdoor environment-based monitoring, IIoT, hybrid storage class and new communication technologies.
无线传感器网络(WSNs)以最小的功耗集成传感器节点。传感器设备在许多领域都有很高的需求,包括智能城市、环境监测、物联网(IoT)、健康监测等。由于节点经常位于偏远的地方,普通节点的电池寿命太短,能量消耗是传感器网络的一个重要问题。但是,更换或定期维护传感器节点的电池是不现实的。这可能导致网络断开连接。因此,利用能量收集(EH)技术确定了一种可充电的传感器节点电池。它有几种环保形式,包括太阳能、风能、机械能等。太阳系为节点提供了无限的能量资源。本文考察了太阳能收集系统及其最新应用的综合案例研究。在太阳能收集节点中,使用以下主要组件:太阳能电池板,能量存储类,DC-DC转换器,最大功率点跟踪(MPPT),能量预测器和传感模块。此外,我们还讨论了传感器网络的一些最新应用和未来工作,例如绿色路灯,农业4.0,户外环境监测,工业物联网,混合存储类和新通信技术。
{"title":"A Comprehensive Study of Solar Energy Harvesting System in Wireless Sensor Networks","authors":"D. K. Sah, Nabajyoti Mazumdar, Pankaj Pal, Tarachand Amgoth","doi":"10.1109/UPCON56432.2022.9986433","DOIUrl":"https://doi.org/10.1109/UPCON56432.2022.9986433","url":null,"abstract":"Wireless Sensor Networks (WSNs) incorporate sensor nodes with minimal power consumption. Sensor devices are in high demand in many areas, including smart cities, environmental monitoring, the Internet of Things (IoT), health monitoring, and the like. As nodes are frequently located in remote places, and an ordinary node battery life is too short, energy depletion is a significant problem for the sensor network. But it's not practical to change or regularly maintain the sensor node's battery. This could cause the network to disconnect. Consequently, a recharging sensor node battery has been identified using energy harvesting (EH). It has several environmental forms, including solar, wind, mechanical, etc. The solar system provides unlimited energy resources to nodes. This paper examines a comprehensive case study of solar harvesting systems and their most recent applications. In solar harvesting nodes, the following primary components are utilised: solar panels, energy storage classes, a $DC-DC$ converter, maximum power point tracking (MPPT), an energy predictor, and a sensing module. Furthermore, we have discussed some recent applications and future work of sensor networks, for example, green street lights, agriculture 4.0, outdoor environment-based monitoring, IIoT, hybrid storage class and new communication technologies.","PeriodicalId":185782,"journal":{"name":"2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115998725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting SQL Injection Attack using Natural Language Processing 利用自然语言处理检测SQL注入攻击
Sagar Lakhani, Ashok Yadav, Vrijendra Singh
In today's digital era, online attacks are increasing in number and are becoming severe day by day, especially those related to web applications. The data accessible over the web persuades the attackers to dispatch new kinds of attacks. Serious exploration on web security has shown that the most hazardous attack that affects web security is the Structured Query Language Injection(SQLI). This attack addresses a genuine threat to web application security and a few examination works have been directed to defend against this attack by detecting it when it happens. Traditional methods like input validation and filtering, use of parameterized queries, etc. are not sufficient to counter these attacks as they rely solely on the implementation of the code hence factoring in the developer's skill-set which in turn gave rise to Machine Learning based solutions. In this study, we have proposed a novel approach that takes the help of Natural Language Processing(NLP) and uses BERT for feature extraction that is capable to adapt to SQLI variants and provides an accuracy of 97% with a false positive rate of 0.8% and a false negative rate of 5.8%.
在当今的数字时代,网络攻击的数量日益增加,并且日益严重,特别是与web应用程序相关的攻击。通过网络访问的数据说服攻击者进行新的攻击。对web安全的认真研究表明,影响web安全的最危险的攻击是结构化查询语言注入(SQLI)。这种攻击解决了对web应用程序安全的真正威胁,并且一些检查工作已经针对这种攻击进行了防御,当它发生时进行检测。传统的方法,如输入验证和过滤,使用参数化查询等,不足以对抗这些攻击,因为它们仅仅依赖于代码的实现,因此考虑到开发人员的技能,这反过来又产生了基于机器学习的解决方案。在这项研究中,我们提出了一种新的方法,利用自然语言处理(NLP)的帮助,使用BERT进行特征提取,能够适应SQLI变体,并提供97%的准确率,假阳性率为0.8%,假阴性率为5.8%。
{"title":"Detecting SQL Injection Attack using Natural Language Processing","authors":"Sagar Lakhani, Ashok Yadav, Vrijendra Singh","doi":"10.1109/UPCON56432.2022.9986458","DOIUrl":"https://doi.org/10.1109/UPCON56432.2022.9986458","url":null,"abstract":"In today's digital era, online attacks are increasing in number and are becoming severe day by day, especially those related to web applications. The data accessible over the web persuades the attackers to dispatch new kinds of attacks. Serious exploration on web security has shown that the most hazardous attack that affects web security is the Structured Query Language Injection(SQLI). This attack addresses a genuine threat to web application security and a few examination works have been directed to defend against this attack by detecting it when it happens. Traditional methods like input validation and filtering, use of parameterized queries, etc. are not sufficient to counter these attacks as they rely solely on the implementation of the code hence factoring in the developer's skill-set which in turn gave rise to Machine Learning based solutions. In this study, we have proposed a novel approach that takes the help of Natural Language Processing(NLP) and uses BERT for feature extraction that is capable to adapt to SQLI variants and provides an accuracy of 97% with a false positive rate of 0.8% and a false negative rate of 5.8%.","PeriodicalId":185782,"journal":{"name":"2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131082645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BER Performance Comparison of Gamma-Gamma FSO link for Different Modulations and Diversity Techniques 不同调制和分集技术下γ - γ FSO链路的误码率性能比较
Damini Rathi, Aashvi Gajjar, Hardik Joshi
Nowadays, FSO is the best choice for last-mile communication due to its high data rate and low complexity. There are many challenges in FSO, like atmospheric turbulence, scintillation, background noise, beam divergence loss, etc. However, to overcome these, we have several mitigation techniques like modulation and coding, diversity, adaptive optics, aperture averaging, and hybrid RF/FSO. The FSO link needs to be compared for different modulation and diversity schemes to check its effectiveness against atmospheric turbulence. This article compares the BER performance of different modulation schemes like BPSK, DBPSK, QPSK, 8-QAM, 8-PSK, binary and quaternary Optical Space Shift Keying (OSSK) in different strengths of atmospheric turbulence considering the Gamma-Gamma channel model. We have also compared diversity and combining schemes like Maximum Ratio Combining (MRC) and Equal Gain Combining (EGC) to overcome the effect of atmospheric turbulence in weak, strong, and moderate turbulence.
目前,无线光通信以其高数据速率和低复杂度成为最后一公里通信的最佳选择。FSO技术面临着大气湍流、闪烁、背景噪声、波束散度损失等诸多挑战。然而,为了克服这些问题,我们有几种缓解技术,如调制和编码、分集、自适应光学、孔径平均和混合RF/FSO。需要对FSO链路进行不同调制和分集方案的比较,以检验其对大气湍流的有效性。本文考虑伽玛信道模型,比较了BPSK、DBPSK、QPSK、8-QAM、8-PSK、二进制和四元光学空间移位键控(OSSK)等不同调制方案在不同强度大气湍流条件下的误码率性能。我们还比较了最大比组合(MRC)和等增益组合(EGC)等组合方案,以克服弱、强、中湍流对大气湍流的影响。
{"title":"BER Performance Comparison of Gamma-Gamma FSO link for Different Modulations and Diversity Techniques","authors":"Damini Rathi, Aashvi Gajjar, Hardik Joshi","doi":"10.1109/UPCON56432.2022.9986410","DOIUrl":"https://doi.org/10.1109/UPCON56432.2022.9986410","url":null,"abstract":"Nowadays, FSO is the best choice for last-mile communication due to its high data rate and low complexity. There are many challenges in FSO, like atmospheric turbulence, scintillation, background noise, beam divergence loss, etc. However, to overcome these, we have several mitigation techniques like modulation and coding, diversity, adaptive optics, aperture averaging, and hybrid RF/FSO. The FSO link needs to be compared for different modulation and diversity schemes to check its effectiveness against atmospheric turbulence. This article compares the BER performance of different modulation schemes like BPSK, DBPSK, QPSK, 8-QAM, 8-PSK, binary and quaternary Optical Space Shift Keying (OSSK) in different strengths of atmospheric turbulence considering the Gamma-Gamma channel model. We have also compared diversity and combining schemes like Maximum Ratio Combining (MRC) and Equal Gain Combining (EGC) to overcome the effect of atmospheric turbulence in weak, strong, and moderate turbulence.","PeriodicalId":185782,"journal":{"name":"2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126793933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Preserving Confidentiality against Factorization Attacks using Fake Modulus ($zeta$) Approach in RSA and its Security Analysis RSA中假模($zeta$)方法的保密性及其安全性分析
Puneeth B R, R. K. R., B. K., Surendra Shetty, K. N. S., Radhakrishna Dodmane, Ramya, Sarda M N Islam
In today's world, the most vital feature is the security of shared information. To achieve this, various algorithms are offered in cryptosystems, with RSA being one among them. RSA is a robust encryption method, however it can be cracked using a factorization attack. As a result, this work presents an improved RSA algorithm that emphasises RSA's security feature of giving immunity to factorization attacks. The algorithm provides a third variable, which is used as the public key in the network, replacing the common modulus n. The experimental end results, such as differential analysis, performance analysis, and statistical analysis, clearly demonstrated the efficacy of the proposed methodology for secure communication. In addition, the article examines various assaults that could be made against the proposed system and reflects on its effectiveness.
在当今世界,最重要的特征是共享信息的安全性。为了实现这一点,密码系统中提供了各种算法,RSA就是其中之一。RSA是一种健壮的加密方法,但是它可以被分解攻击破解。因此,本文提出了一种改进的RSA算法,该算法强调了RSA对因数分解攻击免疫的安全特性。该算法提供了第三个变量,作为网络中的公钥,取代了常用的模数n。差分分析、性能分析和统计分析等实验最终结果清楚地证明了所提出方法在安全通信方面的有效性。此外,本文还审查了可能对拟议系统进行的各种攻击,并对其有效性进行了反思。
{"title":"Preserving Confidentiality against Factorization Attacks using Fake Modulus ($zeta$) Approach in RSA and its Security Analysis","authors":"Puneeth B R, R. K. R., B. K., Surendra Shetty, K. N. S., Radhakrishna Dodmane, Ramya, Sarda M N Islam","doi":"10.1109/UPCON56432.2022.9986419","DOIUrl":"https://doi.org/10.1109/UPCON56432.2022.9986419","url":null,"abstract":"In today's world, the most vital feature is the security of shared information. To achieve this, various algorithms are offered in cryptosystems, with RSA being one among them. RSA is a robust encryption method, however it can be cracked using a factorization attack. As a result, this work presents an improved RSA algorithm that emphasises RSA's security feature of giving immunity to factorization attacks. The algorithm provides a third variable, which is used as the public key in the network, replacing the common modulus n. The experimental end results, such as differential analysis, performance analysis, and statistical analysis, clearly demonstrated the efficacy of the proposed methodology for secure communication. In addition, the article examines various assaults that could be made against the proposed system and reflects on its effectiveness.","PeriodicalId":185782,"journal":{"name":"2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124508120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pose Recognition in Cricket using Keypoints 姿势识别在板球使用关键点
Rahul Mili, Nayana Das, Arjun Tandon, Saquelain Mokhtar, Imon Mukherjee, Goutam Paul
In the present-day time, there has been a gain in interest in video summarization and highlights generation in football, cricket, basketball, and baseball. Some pose recognition methods for recognizing the pose of an umpire in cricket have been proposed, but none of them leverage the potential of pose estimation and neural networks, which are two of the most powerful tools in Deep learning. In this paper, we work on the dataset termed SNOW, for the detection of umpire pose in the game of cricket. This dataset has been assessed as an introductory aid for pose recognition of the umpire in cricket. The umpire in cricket has the power to give decisions, and these decisions are conveyed using hand signals. On the basis of identifying the umpire's pose from the frames of a cricket video, we try to identify five such signals: NO BALL, SIX, WIDE, OUT, and NO ACTION. This paper discusses a technique for recognition of the gestures and poses of the umpire using keypoints generated using pose estimation. The experimental results show that the accuracy of our proposed technique is 87%, and the evaluation metrics of our technique are quite promising compared to existing state-of-the-art works.
在当今时代,人们对足球、板球、篮球和棒球的视频总结和集锦产生了兴趣。已经提出了一些识别板球裁判姿势的姿势识别方法,但它们都没有利用姿势估计和神经网络的潜力,这是深度学习中最强大的两个工具。在本文中,我们使用名为SNOW的数据集来检测板球比赛中的裁判姿势。该数据集已被评估为板球裁判姿势识别的介绍性辅助。板球的裁判有权做出决定,而这些决定是用手势传达的。在从板球视频帧中识别裁判姿势的基础上,我们试图识别五种这样的信号:无球,六,宽,出,无动作。本文讨论了一种利用姿态估计生成的关键点来识别裁判手势和姿态的技术。实验结果表明,该技术的准确率为87%,与现有的先进技术相比,该技术的评价指标具有很大的前景。
{"title":"Pose Recognition in Cricket using Keypoints","authors":"Rahul Mili, Nayana Das, Arjun Tandon, Saquelain Mokhtar, Imon Mukherjee, Goutam Paul","doi":"10.1109/UPCON56432.2022.9986481","DOIUrl":"https://doi.org/10.1109/UPCON56432.2022.9986481","url":null,"abstract":"In the present-day time, there has been a gain in interest in video summarization and highlights generation in football, cricket, basketball, and baseball. Some pose recognition methods for recognizing the pose of an umpire in cricket have been proposed, but none of them leverage the potential of pose estimation and neural networks, which are two of the most powerful tools in Deep learning. In this paper, we work on the dataset termed SNOW, for the detection of umpire pose in the game of cricket. This dataset has been assessed as an introductory aid for pose recognition of the umpire in cricket. The umpire in cricket has the power to give decisions, and these decisions are conveyed using hand signals. On the basis of identifying the umpire's pose from the frames of a cricket video, we try to identify five such signals: NO BALL, SIX, WIDE, OUT, and NO ACTION. This paper discusses a technique for recognition of the gestures and poses of the umpire using keypoints generated using pose estimation. The experimental results show that the accuracy of our proposed technique is 87%, and the evaluation metrics of our technique are quite promising compared to existing state-of-the-art works.","PeriodicalId":185782,"journal":{"name":"2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116590768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1