首页 > 最新文献

2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)最新文献

英文 中文
Software Requirement Classification Using Machine Learning Algorithms 使用机器学习算法的软件需求分类
Vrutik Patel, P. Mehta, Kruti Lavingia
Every software contains numerous processes for building a program, and each step is significant for software requirements. As the globe expands and develops quickly, so does the demand for software. Categorization of requirements can be done manually however doing so requires a lot of human effort, time, money, and risk of inaccurate results. As a result, numerous earlier studies have suggested automating the classification process but consumes lot of time. Here several ways are introduced such that this time taking process can be automated and software requirements can be classified using several machine learning algorithms into various categories. In the process of achieving this there were several algorithms that were taken into consideration which includes KNN, SVM, DT, Naïve Bayes to train dataset and their evaluation metrics were studied.
每个软件都包含许多构建程序的过程,每个步骤对软件需求都很重要。随着全球的迅速扩张和发展,对软件的需求也在不断增长。需求的分类可以手工完成,但是这样做需要大量的人力、时间、金钱和不准确结果的风险。因此,许多早期的研究都建议将分类过程自动化,但需要花费大量时间。这里介绍了几种方法,以便这个耗时的过程可以自动化,并且可以使用几种机器学习算法将软件需求分类为不同的类别。在实现这一目标的过程中,考虑了几种算法,包括KNN、SVM、DT、Naïve贝叶斯来训练数据集,并研究了它们的评价指标。
{"title":"Software Requirement Classification Using Machine Learning Algorithms","authors":"Vrutik Patel, P. Mehta, Kruti Lavingia","doi":"10.1109/ICAIA57370.2023.10169588","DOIUrl":"https://doi.org/10.1109/ICAIA57370.2023.10169588","url":null,"abstract":"Every software contains numerous processes for building a program, and each step is significant for software requirements. As the globe expands and develops quickly, so does the demand for software. Categorization of requirements can be done manually however doing so requires a lot of human effort, time, money, and risk of inaccurate results. As a result, numerous earlier studies have suggested automating the classification process but consumes lot of time. Here several ways are introduced such that this time taking process can be automated and software requirements can be classified using several machine learning algorithms into various categories. In the process of achieving this there were several algorithms that were taken into consideration which includes KNN, SVM, DT, Naïve Bayes to train dataset and their evaluation metrics were studied.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114768816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Development of a System for the Improvement of Network Efficiency in IEEE 802.11E IEEE 802.11E中提高网络效率系统的设计与开发
H. Bedi, Shakti Raj Chopra
The two most critical challenges in developing network protocols for utilizing real-time applications are high throughput and low delay. WLANs enable broadband multimedia communication, thus fulfilling QoS requirements such as these might be problematic. For packet transmission, IEEE 802.11 uses the (DCF) protocol and the BEB algorithm. In WLANs, the packet transmission technique has a major impact on the performance parameters like throughput and delay. So far, various Markov models have been made to check and improve the quality. However, recent models fail with significant packet collisions that decrease throughput and delay, crowded surroundings, and they are still unable to predict the network performance accurately This paper uses, a protocol and algorithm to reduce collisions and prevent the channel capture effect. The performance of the modified protocol, known as the CA-DCF (CAD) protocol, is assessed in terms of throughput and delay.
在开发利用实时应用程序的网络协议时,两个最关键的挑战是高吞吐量和低延迟。无线局域网支持宽带多媒体通信,因此满足诸如此类的QoS要求可能会有问题。对于分组传输,IEEE 802.11使用(DCF)协议和BEB算法。在无线局域网中,分组传输技术对网络的吞吐量和时延等性能参数有很大的影响。到目前为止,已经制作了各种马尔可夫模型来检查和提高质量。然而,最近的模型失败的显著数据包冲突,降低了吞吐量和延迟,拥挤的环境,他们仍然不能准确地预测网络性能。本文使用了一个协议和算法来减少冲突和防止信道捕获效应。修改后的CA-DCF (CAD)协议的性能是根据吞吐量和延迟进行评估的。
{"title":"Design and Development of a System for the Improvement of Network Efficiency in IEEE 802.11E","authors":"H. Bedi, Shakti Raj Chopra","doi":"10.1109/ICAIA57370.2023.10169644","DOIUrl":"https://doi.org/10.1109/ICAIA57370.2023.10169644","url":null,"abstract":"The two most critical challenges in developing network protocols for utilizing real-time applications are high throughput and low delay. WLANs enable broadband multimedia communication, thus fulfilling QoS requirements such as these might be problematic. For packet transmission, IEEE 802.11 uses the (DCF) protocol and the BEB algorithm. In WLANs, the packet transmission technique has a major impact on the performance parameters like throughput and delay. So far, various Markov models have been made to check and improve the quality. However, recent models fail with significant packet collisions that decrease throughput and delay, crowded surroundings, and they are still unable to predict the network performance accurately This paper uses, a protocol and algorithm to reduce collisions and prevent the channel capture effect. The performance of the modified protocol, known as the CA-DCF (CAD) protocol, is assessed in terms of throughput and delay.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"492 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123196378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk-Based Reliability Assessment of Modern Power Systems using Machine Learning and Probability Theory 基于机器学习和概率论的现代电力系统可靠性风险评估
B. Rajanarayan Prusty, S. Mohan Krishna, Kishore Bingi, Neeraj Gupta
Risk-based reliability assessment is prevalent for modern power systems under higher penetration of renewable generations. This paper highlights the importance of machine learning and probabilistic approaches for risk-based reliability assessment during power system operation and planning. A set of metrics for realistic risk-based reliability assessment considering over-limit probabilities and corresponding severities is suggested. Probabilistic load flow using Monte-Carlo simulation is used to estimate the over-limit probabilities of power system variables. A detailed presentation of steps for the generation of random samples of a set of correlated random variables, development of realistic risk metrics, and portrayal of their significances via critical result analyses for different cases is expected to serve as a reference text for novice researchers in the field of risk-based reliability assessment of modern power systems integrated with photovoltaic generations.
基于风险的可靠性评估在可再生能源发电机组普及率较高的现代电力系统中十分普遍。本文强调了机器学习和概率方法在电力系统运行和规划过程中基于风险的可靠性评估中的重要性。提出了一套考虑超限概率和相应严重程度的基于现实风险的可靠性评估指标。利用蒙特卡罗模拟的概率潮流估计了电力系统各变量的超限概率。详细介绍了一组相关随机变量的随机样本的生成步骤、现实风险度量的发展,以及通过对不同情况的关键结果分析来描述它们的重要性,预计将作为基于风险的现代电力系统集成光伏发电可靠性评估领域新手研究人员的参考文本。
{"title":"Risk-Based Reliability Assessment of Modern Power Systems using Machine Learning and Probability Theory","authors":"B. Rajanarayan Prusty, S. Mohan Krishna, Kishore Bingi, Neeraj Gupta","doi":"10.1109/ICAIA57370.2023.10169796","DOIUrl":"https://doi.org/10.1109/ICAIA57370.2023.10169796","url":null,"abstract":"Risk-based reliability assessment is prevalent for modern power systems under higher penetration of renewable generations. This paper highlights the importance of machine learning and probabilistic approaches for risk-based reliability assessment during power system operation and planning. A set of metrics for realistic risk-based reliability assessment considering over-limit probabilities and corresponding severities is suggested. Probabilistic load flow using Monte-Carlo simulation is used to estimate the over-limit probabilities of power system variables. A detailed presentation of steps for the generation of random samples of a set of correlated random variables, development of realistic risk metrics, and portrayal of their significances via critical result analyses for different cases is expected to serve as a reference text for novice researchers in the field of risk-based reliability assessment of modern power systems integrated with photovoltaic generations.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125777393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting Copy Move Image Forgery using a Deep Learning Model: A Review 使用深度学习模型检测复制移动图像伪造:综述
K. Lalli, V. K. Shrivastava, R. Shekhar
The digital images can easily be manipulated using Software tool or mobile application these days. Dispersal of forgery images in social media is one of the prime threats and it has a prodigious impact. Most shared tampered images are based on duplicating some part of the image (copy move image forgery) and merging some portion of two different images (image splicing). Hence, trust in a digital image on social media is becoming extremely hard nowadays. The researchers are highly active in finding a solution for this challenge and there are several papers proposed with different approaches to solve this issue. Most of the suggestions revolve around deep learning models that are efficient and suitable to detect copy move images. This paper focusses on reviewing various Deep Convolution Neural Network (DCNN) approaches and hybrid Deep learning models in copy move image detection by comparative analysis of the experimental outcome of the different models presented for this issue. This research article compares various articles relating to our issue by means of a model, a dataset, and the characteristics of those articles.
这些数字图像可以很容易地使用软件工具或移动应用程序进行操作。在社交媒体上传播伪造图像是主要威胁之一,它具有巨大的影响。大多数共享的篡改图像是基于复制图像的某些部分(复制移动图像伪造)和合并两个不同图像的某些部分(图像拼接)。因此,信任社交媒体上的数字形象变得极其困难。研究人员非常积极地寻找解决这一挑战的方法,并且有几篇论文提出了不同的方法来解决这个问题。大多数建议都围绕着深度学习模型,这些模型高效且适合检测复制移动图像。本文通过对不同模型的实验结果进行对比分析,综述了各种深度卷积神经网络(DCNN)方法和混合深度学习模型在复制运动图像检测中的应用。本研究文章通过模型、数据集和这些文章的特点来比较与我们的问题相关的各种文章。
{"title":"Detecting Copy Move Image Forgery using a Deep Learning Model: A Review","authors":"K. Lalli, V. K. Shrivastava, R. Shekhar","doi":"10.1109/ICAIA57370.2023.10169568","DOIUrl":"https://doi.org/10.1109/ICAIA57370.2023.10169568","url":null,"abstract":"The digital images can easily be manipulated using Software tool or mobile application these days. Dispersal of forgery images in social media is one of the prime threats and it has a prodigious impact. Most shared tampered images are based on duplicating some part of the image (copy move image forgery) and merging some portion of two different images (image splicing). Hence, trust in a digital image on social media is becoming extremely hard nowadays. The researchers are highly active in finding a solution for this challenge and there are several papers proposed with different approaches to solve this issue. Most of the suggestions revolve around deep learning models that are efficient and suitable to detect copy move images. This paper focusses on reviewing various Deep Convolution Neural Network (DCNN) approaches and hybrid Deep learning models in copy move image detection by comparative analysis of the experimental outcome of the different models presented for this issue. This research article compares various articles relating to our issue by means of a model, a dataset, and the characteristics of those articles.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129787995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development of AI Enabled Solution for Efficient Feature Enrichment from Multiple Data Sources: An Application in Precision Agriculture 基于人工智能的多数据源特征高效富集解决方案的开发:在精准农业中的应用
Vatsala Singh, G. Singh
The world is surrounded by enormous amount of data almost generated at an unpredictable velocity, in huge volume, variety and veracity. Our traditional systems, however have not yet reached a state where they can efficiently use every bit of this Big data and incorporate it to derive consistent information. Data Fusion is one such technique which can help us achieve this goal. It can be applied to various fields, however for the scope of this paper we have focused on its implementation in Precision Agriculture. While remote sensing has played a major role in precision agriculture by harnessing satellite data as a non-destructive way of information retrieval. The data collected from these satellite varies widely depending on the technique, spatial resolution, temporal resolution, spectral range, viewing geometry of the sensors, thus providing us different amounts of information for different use cases, some in which makes it quiet challenging for the researchers to harness all the information available to attain higher levels of precision, as high as to be able to classify at a sub pixel level while retaining the efficiency and feasibility of the solution. one of the major pain point in agriculture is monitoring large fields and gauging their crop density per square meter. While crop density of a field depends hugely of the soil quality, moisture, fertilizer percentage knowing crop density can have a great impact on yield prediction, sustainable fertilization and overall better through put of a field. Thus, in this paper we have explored the possibility of fusing data from different sensors using CNN based Data Fusion Algorithm to retrieve crop density and segregate patches of field as sparse or dense respectively. The results are quite encouraging.
世界被大量的数据包围着,这些数据几乎以不可预测的速度产生,数量巨大,种类繁多,准确性高。然而,我们的传统系统还没有达到这样一种状态,即它们可以有效地利用这些大数据的每一点,并将其合并以获得一致的信息。数据融合就是这样一种技术,它可以帮助我们实现这一目标。它可以应用于各个领域,但在本文的范围内,我们主要关注它在精准农业中的实施。遥感通过利用卫星数据作为一种非破坏性的信息检索方式,在精准农业中发挥了重要作用。从这些卫星收集的数据根据技术、空间分辨率、时间分辨率、光谱范围、传感器的观察几何形状而有很大差异,因此为不同的用例提供了不同数量的信息,其中一些使研究人员很难利用所有可用信息来获得更高的精度。高到能够在亚像素级进行分类的同时,又能保持解决方案的效率和可行性。农业的主要难点之一是监测大片农田并测量每平方米的作物密度。虽然一块田地的作物密度在很大程度上取决于土壤质量、湿度、肥料比例,但作物密度对产量预测、可持续施肥和田地的整体产量有很大影响。因此,在本文中,我们探索了使用基于CNN的数据融合算法融合来自不同传感器的数据的可能性,以检索作物密度,并将田间斑块分别划分为稀疏或密集。结果相当令人鼓舞。
{"title":"Development of AI Enabled Solution for Efficient Feature Enrichment from Multiple Data Sources: An Application in Precision Agriculture","authors":"Vatsala Singh, G. Singh","doi":"10.1109/ICAIA57370.2023.10169451","DOIUrl":"https://doi.org/10.1109/ICAIA57370.2023.10169451","url":null,"abstract":"The world is surrounded by enormous amount of data almost generated at an unpredictable velocity, in huge volume, variety and veracity. Our traditional systems, however have not yet reached a state where they can efficiently use every bit of this Big data and incorporate it to derive consistent information. Data Fusion is one such technique which can help us achieve this goal. It can be applied to various fields, however for the scope of this paper we have focused on its implementation in Precision Agriculture. While remote sensing has played a major role in precision agriculture by harnessing satellite data as a non-destructive way of information retrieval. The data collected from these satellite varies widely depending on the technique, spatial resolution, temporal resolution, spectral range, viewing geometry of the sensors, thus providing us different amounts of information for different use cases, some in which makes it quiet challenging for the researchers to harness all the information available to attain higher levels of precision, as high as to be able to classify at a sub pixel level while retaining the efficiency and feasibility of the solution. one of the major pain point in agriculture is monitoring large fields and gauging their crop density per square meter. While crop density of a field depends hugely of the soil quality, moisture, fertilizer percentage knowing crop density can have a great impact on yield prediction, sustainable fertilization and overall better through put of a field. Thus, in this paper we have explored the possibility of fusing data from different sensors using CNN based Data Fusion Algorithm to retrieve crop density and segregate patches of field as sparse or dense respectively. The results are quite encouraging.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125852445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diabetic Retinopathy Detection & Classification using Efficient Net Model 基于高效网络模型的糖尿病视网膜病变检测与分类
Ishika Giroti, J. Das, N. Harshith, Gousia Thahniyath
Diabetic retinopathy is an eye disease that progressively degrades a person’s vision. It affects 40-45% of people with diabetes and it is one of society’s leading causes of blindness. Diabetic retinopathy has 4 different phases and with each stage, the eyesight of a person degrades. If diabetic retinopathy is detected in its early phases its effects and progression can be slowed down and save the person from permanent blindness. We aim to utilize ML to detect the disease and classify diabetic retinopathy into its 4 classes based on severity, helping in early detection. This paper gives a glimpse into diabetic retinopathy and proposes a methodology to develop a machine-learning model along with deploying the developed model on an AWS based web-app.
糖尿病性视网膜病变是一种眼病,它会逐渐降低人的视力。它影响着40-45%的糖尿病患者,是社会上导致失明的主要原因之一。糖尿病视网膜病变有四个不同的阶段,每个阶段,人的视力都会退化。如果糖尿病视网膜病变在早期阶段被发现,它的影响和进展可以减缓,并使患者免于永久失明。我们的目标是利用ML检测疾病,并根据严重程度将糖尿病视网膜病变分为4类,帮助早期发现。本文简要介绍了糖尿病视网膜病变,并提出了一种开发机器学习模型的方法,并将开发的模型部署在基于AWS的web应用程序上。
{"title":"Diabetic Retinopathy Detection & Classification using Efficient Net Model","authors":"Ishika Giroti, J. Das, N. Harshith, Gousia Thahniyath","doi":"10.1109/ICAIA57370.2023.10169756","DOIUrl":"https://doi.org/10.1109/ICAIA57370.2023.10169756","url":null,"abstract":"Diabetic retinopathy is an eye disease that progressively degrades a person’s vision. It affects 40-45% of people with diabetes and it is one of society’s leading causes of blindness. Diabetic retinopathy has 4 different phases and with each stage, the eyesight of a person degrades. If diabetic retinopathy is detected in its early phases its effects and progression can be slowed down and save the person from permanent blindness. We aim to utilize ML to detect the disease and classify diabetic retinopathy into its 4 classes based on severity, helping in early detection. This paper gives a glimpse into diabetic retinopathy and proposes a methodology to develop a machine-learning model along with deploying the developed model on an AWS based web-app.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134179580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flood Risk Assessment Mapping of Nainital District Using GIS Tools 基于GIS工具的首都地区洪水风险评估制图
K. Rai, N. Mishra, Arun Sharma, Sachin Mishra, Prasad Prakashrao Dahale
Natural disasters, over which humans have no control and which cause far more harm than man-made disasters, have posed the greatest challenge to humanity. Floods are a hydrological disaster that has occurred often in our country since its founding. Rivers like the Ganga and the Brahmaputra run through India. All of these rivers, as well as their tributaries, are involved in a variety of agricultural and human activities. Floods have claimed countless lives and wreaked havoc on the banks of our country’s rivers on numerous occasions. The major goal of our research is to evaluate the many aspects that influence flood risk zonation mapping of 2021 and, as a result, damage assessment. The study area will be the Nainital district of the state of Uttrakhand, with Sentinel 2A as the dataset. The flood mitigation indices, climatic factors, and shapefiles will be interpolated using the Analytical Hierarchical Process (AHP), which will aid in the construction of Flood risk zonation mapping. Flood research is essential in order to reduce the loss and destruction caused by this tragedy.
自然灾害是人类无法控制的,造成的危害远远大于人为灾害,是对人类的最大挑战。洪水是我国建国以来经常发生的一种水文灾害。恒河和雅鲁藏布江等河流贯穿印度。所有这些河流及其支流都与各种农业和人类活动有关。洪水夺去了无数人的生命,并多次对我国的河岸造成严重破坏。我们研究的主要目标是评估影响2021年洪水风险分区图的许多方面,从而进行损害评估。研究区域将是北阿坎德邦的Nainital地区,以Sentinel 2A为数据集。利用层次分析法(AHP)对洪涝减灾指数、气候因子和形状曲线进行插值,有助于绘制洪涝风险分区图。为了减少这场灾难造成的损失和破坏,研究洪水是必要的。
{"title":"Flood Risk Assessment Mapping of Nainital District Using GIS Tools","authors":"K. Rai, N. Mishra, Arun Sharma, Sachin Mishra, Prasad Prakashrao Dahale","doi":"10.1109/ICAIA57370.2023.10169591","DOIUrl":"https://doi.org/10.1109/ICAIA57370.2023.10169591","url":null,"abstract":"Natural disasters, over which humans have no control and which cause far more harm than man-made disasters, have posed the greatest challenge to humanity. Floods are a hydrological disaster that has occurred often in our country since its founding. Rivers like the Ganga and the Brahmaputra run through India. All of these rivers, as well as their tributaries, are involved in a variety of agricultural and human activities. Floods have claimed countless lives and wreaked havoc on the banks of our country’s rivers on numerous occasions. The major goal of our research is to evaluate the many aspects that influence flood risk zonation mapping of 2021 and, as a result, damage assessment. The study area will be the Nainital district of the state of Uttrakhand, with Sentinel 2A as the dataset. The flood mitigation indices, climatic factors, and shapefiles will be interpolated using the Analytical Hierarchical Process (AHP), which will aid in the construction of Flood risk zonation mapping. Flood research is essential in order to reduce the loss and destruction caused by this tragedy.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114818961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of 4-bit servo tracking type ADC using Sky-Water SKY130 PDK and eSim 基于skywater SKY130 PDK和eSim的4位伺服跟踪型ADC设计
Ashwini Kumar, Kunal P. Ghosh, Sumanto Kar, Rahul Paknikar
Analog-to-digital converters are extensively used for digital signal processing. In this paper, a 4-bit servo tracking type ADC is designed to convert the analog signal to a digital signal. The amplitude range of the analog input signal is 0 to 1 V. Verilog code is designed and simulated in Makerchip IDE for a 4-bit up-down counter circuit. The 4-bit up-down counter along with SKY130 PDK (Process Design Kit) components like resistors and op-amps are used in the circuit design. The 4-bit binary input is converted to analog output using an R-2R ladder type DAC (Digital to Analog Converter). The circuit is simulated in the eSim EDA tool developed by IIT Bombay.
模数转换器广泛用于数字信号处理。本文设计了一个4位伺服跟踪型ADC,用于将模拟信号转换为数字信号。模拟输入信号的幅度范围为0到1v。在Makerchip IDE中设计并仿真了一个4位上下计数器电路的Verilog代码。电路设计中使用了4位上下计数器以及SKY130 PDK(过程设计套件)组件,如电阻和运算放大器。使用R-2R梯形DAC(数模转换器)将4位二进制输入转换为模拟输出。电路在印度理工学院孟买分校开发的eSim EDA工具中进行了仿真。
{"title":"Design of 4-bit servo tracking type ADC using Sky-Water SKY130 PDK and eSim","authors":"Ashwini Kumar, Kunal P. Ghosh, Sumanto Kar, Rahul Paknikar","doi":"10.1109/ICAIA57370.2023.10169547","DOIUrl":"https://doi.org/10.1109/ICAIA57370.2023.10169547","url":null,"abstract":"Analog-to-digital converters are extensively used for digital signal processing. In this paper, a 4-bit servo tracking type ADC is designed to convert the analog signal to a digital signal. The amplitude range of the analog input signal is 0 to 1 V. Verilog code is designed and simulated in Makerchip IDE for a 4-bit up-down counter circuit. The 4-bit up-down counter along with SKY130 PDK (Process Design Kit) components like resistors and op-amps are used in the circuit design. The 4-bit binary input is converted to analog output using an R-2R ladder type DAC (Digital to Analog Converter). The circuit is simulated in the eSim EDA tool developed by IIT Bombay.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131959503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gameplay Automation 游戏自动化
Shaik Mahammad Aasheesh, K. N. S. R. Reddy, Manideep Yellani, D. N, Soumya Shridhar Hegde
Reinforcement Learning has performed remarkably well in various games and has the potential to surpass human level gameplay. Although it does good in turn-based games, complex game genres like fighting or much more complex 3D shooters are still a challenge. The created ML model can teach itself how to play a specific game so that it can be used to test the games for completeness, bugs, and irregularities. The model is also used to find out if there are any ways to speed run games by exploiting certain in-game mechanisms or to check if any characters or abilities are overpowered. Models were created for a few games to identify how well these AI models can perform and see what kind of differences were required to switch between the games.
强化学习在各种游戏中表现非常出色,有可能超越人类水平的游戏玩法。尽管它在回合制游戏中表现不错,但像战斗或更复杂的3D射击游戏等复杂游戏类型仍然是个挑战。创建的ML模型可以自学如何玩特定的游戏,这样它就可以用来测试游戏的完整性、漏洞和不规则性。该模型还用于发现是否存在通过利用某些游戏内部机制来加速游戏运行的方法,或检查是否有任何角色或能力被过度控制。我们为一些游戏创建了模型,以确定这些AI模型的执行情况,并查看在游戏之间切换需要什么样的差异。
{"title":"Gameplay Automation","authors":"Shaik Mahammad Aasheesh, K. N. S. R. Reddy, Manideep Yellani, D. N, Soumya Shridhar Hegde","doi":"10.1109/ICAIA57370.2023.10169757","DOIUrl":"https://doi.org/10.1109/ICAIA57370.2023.10169757","url":null,"abstract":"Reinforcement Learning has performed remarkably well in various games and has the potential to surpass human level gameplay. Although it does good in turn-based games, complex game genres like fighting or much more complex 3D shooters are still a challenge. The created ML model can teach itself how to play a specific game so that it can be used to test the games for completeness, bugs, and irregularities. The model is also used to find out if there are any ways to speed run games by exploiting certain in-game mechanisms or to check if any characters or abilities are overpowered. Models were created for a few games to identify how well these AI models can perform and see what kind of differences were required to switch between the games.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116442559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Obfuscated Secure Architecture for Baugh Wooley Multiplier Baugh Wooley乘法器的新型模糊安全架构
Jyotirmoy Pathak, S. Tripathi
The internationalisation of the semiconductor supply chain brings with it an increase in the hazards posed to both data security and physical security. Theft of intellectual property through reverse engineering and harmful design alterations are two primary threats. The latter is supported, in part, by the fruitful use of reverse engineering to the design. Two of the strategies that are currently under investigation to prevent reverse engineering by end users or foundries are known as IC stealth and logic blocking. Nonetheless, for a number of years, one of the most difficult challenges has been the creation of low-overload camouflage and blocking schemes that are resilient enough to endure the ever-changing condition of heart attacks. This article describes a unique design for a disguised multiplier as well as an implementation of that architecture. The structure that has been suggested is capable of being reorganised to compute an S-bit Baugh-Wooley multiplier. To conceal obfuscation modes, a fresh control flow method has been developed and implemented. When compared to the original design, it has been demonstrated that the suggested method results in space and power needs that are significantly reduced.
半导体供应链的国际化带来了数据安全和物理安全的风险增加。通过逆向工程和有害的设计变更窃取知识产权是两个主要威胁。后者在一定程度上是由逆向工程对设计的有效使用所支持的。目前正在研究的防止终端用户或代工厂进行逆向工程的两种策略是IC隐身和逻辑阻塞。尽管如此,多年来,最困难的挑战之一是创建低过载伪装和阻塞方案,这些方案具有足够的弹性,可以承受不断变化的心脏病发作情况。本文描述了变相乘法器的独特设计以及该体系结构的实现。所提出的结构能够被重新组织以计算一个s位的包-伍利乘法器。为了隐藏混淆模式,提出并实现了一种新的控制流方法。与原始设计相比,已证明所建议的方法可显着降低空间和功率需求。
{"title":"Novel Obfuscated Secure Architecture for Baugh Wooley Multiplier","authors":"Jyotirmoy Pathak, S. Tripathi","doi":"10.1109/ICAIA57370.2023.10169781","DOIUrl":"https://doi.org/10.1109/ICAIA57370.2023.10169781","url":null,"abstract":"The internationalisation of the semiconductor supply chain brings with it an increase in the hazards posed to both data security and physical security. Theft of intellectual property through reverse engineering and harmful design alterations are two primary threats. The latter is supported, in part, by the fruitful use of reverse engineering to the design. Two of the strategies that are currently under investigation to prevent reverse engineering by end users or foundries are known as IC stealth and logic blocking. Nonetheless, for a number of years, one of the most difficult challenges has been the creation of low-overload camouflage and blocking schemes that are resilient enough to endure the ever-changing condition of heart attacks. This article describes a unique design for a disguised multiplier as well as an implementation of that architecture. The structure that has been suggested is capable of being reorganised to compute an S-bit Baugh-Wooley multiplier. To conceal obfuscation modes, a fresh control flow method has been developed and implemented. When compared to the original design, it has been demonstrated that the suggested method results in space and power needs that are significantly reduced.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133790682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1