首页 > 最新文献

2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)最新文献

英文 中文
PAPR reduction of GFDM system using Parallel concatenation of LDPC codes 利用LDPC码并联降低GFDM系统的PAPR
N. Telagam, S. Lakshmi, K. Nehru
In this paper, we propose a peak to average power ratio (PAPR) reduction scheme for generalised frequency-division multiplexing (GFDM) systems based on parallel concatenation of low-density parity-check codes (PC-LDPC) codes. The proposed scheme maps the PC-LDPC codewords onto subcarriers to construct a symbol of channel coded GFDM. Then, these sub symbols are combined with subcarriers to form symbols, and these symbols are applied to the PAPR expression of the GFDM system for calculation. The BER value is higher at 10dB for the RRC filter-based GFDM system than the RC filter. The RC filter configuration has less BER at 10dB in 0.2 roll-off factor value with 100 iterations and 200 iterations in soft decision algorithm. When the value of Complementary Cumulative Distribution Function (CCDF) =0.001, the PC-LDPC GFDM system reduces the PAPR by 4 to 4.5 dB compared to the uncoded GFDM signal. The coding gain of 0.5dB is observed in Raised cosine pulse shaping filter with PC-LDPC codes.
本文提出了一种基于低密度奇偶校验码(PC-LDPC)码并行级联的广义频分复用(GFDM)系统的峰值平均功率比(PAPR)降低方案。该方案将PC-LDPC码字映射到子载波上,构造信道编码的GFDM符号。然后,将这些子符号与子载波组合成符号,并将这些符号应用到GFDM系统的PAPR表达式中进行计算。基于RRC滤波器的GFDM系统的误码率值在10dB时高于RC滤波器。RC滤波器配置在0.2滚降因子值下具有较低的10dB误码率,在软判决算法中具有100次迭代和200次迭代。当互补累积分布函数(CCDF)值=0.001时,PC-LDPC GFDM系统比未编码GFDM信号降低了4 ~ 4.5 dB的PAPR。在PC-LDPC码的凸余弦脉冲整形滤波器中观察到0.5dB的编码增益。
{"title":"PAPR reduction of GFDM system using Parallel concatenation of LDPC codes","authors":"N. Telagam, S. Lakshmi, K. Nehru","doi":"10.1109/ICAECC54045.2022.9716598","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716598","url":null,"abstract":"In this paper, we propose a peak to average power ratio (PAPR) reduction scheme for generalised frequency-division multiplexing (GFDM) systems based on parallel concatenation of low-density parity-check codes (PC-LDPC) codes. The proposed scheme maps the PC-LDPC codewords onto subcarriers to construct a symbol of channel coded GFDM. Then, these sub symbols are combined with subcarriers to form symbols, and these symbols are applied to the PAPR expression of the GFDM system for calculation. The BER value is higher at 10dB for the RRC filter-based GFDM system than the RC filter. The RC filter configuration has less BER at 10dB in 0.2 roll-off factor value with 100 iterations and 200 iterations in soft decision algorithm. When the value of Complementary Cumulative Distribution Function (CCDF) =0.001, the PC-LDPC GFDM system reduces the PAPR by 4 to 4.5 dB compared to the uncoded GFDM signal. The coding gain of 0.5dB is observed in Raised cosine pulse shaping filter with PC-LDPC codes.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129964869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Importance of Kaizen and Its Implementation in Design and Manufacturing System 设计与制造系统改善的重要性及其实施
K. Krupa, Sukumar Patil, Bhoopendra Singh
The objective of Design and Manufacturing companies is to increase customer satisfaction, productivity with good quality of products. At present many of the design and manufacturing companies are facing quality rejection, lead time issue and inability to meet the customer expectations. By implementing the lean manufacturing system, many problems can be solved by involving employees on the shop floor in Kaizen activities. One of the basic rules of Kaizen is “The continuous incremental improvement of an activity to create more value with less waste giving quantifiable and sustainable benefit”. The main objective of this paper is to provide background of Kaizen implementation in design and manufacturing areas.
设计和制造公司的目标是提高客户满意度,生产力与良好的产品质量。目前,许多设计和制造公司都面临着质量拒收、交货期问题和无法满足客户期望的问题。通过实施精益生产系统,许多问题可以通过让车间的员工参与到改善活动中来解决。改善的基本规则之一是“一项活动的持续增量改进,以更少的浪费创造更多的价值,并提供可量化和可持续的效益”。本文的主要目的是提供在设计和制造领域实施改善的背景。
{"title":"Importance of Kaizen and Its Implementation in Design and Manufacturing System","authors":"K. Krupa, Sukumar Patil, Bhoopendra Singh","doi":"10.1109/ICAECC54045.2022.9716625","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716625","url":null,"abstract":"The objective of Design and Manufacturing companies is to increase customer satisfaction, productivity with good quality of products. At present many of the design and manufacturing companies are facing quality rejection, lead time issue and inability to meet the customer expectations. By implementing the lean manufacturing system, many problems can be solved by involving employees on the shop floor in Kaizen activities. One of the basic rules of Kaizen is “The continuous incremental improvement of an activity to create more value with less waste giving quantifiable and sustainable benefit”. The main objective of this paper is to provide background of Kaizen implementation in design and manufacturing areas.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124129335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing different high speed adder architecture for Neural Networks 神经网络中不同高速加法器结构分析
Deekshith Krishnegowda
The first neural network model which was developed for image recognition application consisted of simple perceptrons. It had input, processing unit, and a single output. Neural networks which are used in today’s world consist of many complex MAC (Multiply and Accumulate) units. Be it the simple pattern recognition neural network model or complex models used for autonomous driving applications; adders are used for computing the activation point of neurons. Some adders offer better performance at the cost of area and power while some offer better power at the cost of performance. So, choosing the right type of adder architecture based upon the application becomes a very important criterion when we are trying to develop an inference engine for the neural network in hardware. To determine weight or activation point of a neuron, typically, float32 or float64 number representation is used. Float64 offers better accuracy than float32 but the drawback of using float64 is that it requires huge computation power. So, in this manuscript we compare different high-speed adder topologies, then discuss the implementation of an optimized 64-bit conditional sum and carry select adder that can be used to implement Deep Neural Network with float64 number representation. Analysis between different adder architecture is performed using Synopsys Design Compiler with 45nm Toshiba library for three different metrics: Timing, Area, and Power.
第一个用于图像识别应用的神经网络模型是由简单的感知器组成的。它有输入、处理单元和一个输出。当今世界上使用的神经网络由许多复杂的MAC(乘法和累加)单元组成。无论是简单的模式识别神经网络模型还是用于自动驾驶应用的复杂模型;加法器用于计算神经元的激活点。有些加法器以面积和功率为代价提供更好的性能,而有些则以性能为代价提供更好的功率。因此,在硬件上为神经网络开发推理引擎时,根据应用选择合适的加法器结构就成为一个非常重要的标准。为了确定神经元的权重或激活点,通常使用float32或float64数字表示。Float64提供比float32更好的精度,但使用Float64的缺点是它需要巨大的计算能力。因此,在本文中,我们比较了不同的高速加法器拓扑,然后讨论了一个优化的64位条件和进位选择加法器的实现,该加法器可用于实现具有float64数字表示的深度神经网络。不同加法器架构之间的分析使用Synopsys设计编译器与45纳米东芝库进行三个不同的指标:时序,面积和功耗。
{"title":"Analyzing different high speed adder architecture for Neural Networks","authors":"Deekshith Krishnegowda","doi":"10.1109/ICAECC54045.2022.9716643","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716643","url":null,"abstract":"The first neural network model which was developed for image recognition application consisted of simple perceptrons. It had input, processing unit, and a single output. Neural networks which are used in today’s world consist of many complex MAC (Multiply and Accumulate) units. Be it the simple pattern recognition neural network model or complex models used for autonomous driving applications; adders are used for computing the activation point of neurons. Some adders offer better performance at the cost of area and power while some offer better power at the cost of performance. So, choosing the right type of adder architecture based upon the application becomes a very important criterion when we are trying to develop an inference engine for the neural network in hardware. To determine weight or activation point of a neuron, typically, float32 or float64 number representation is used. Float64 offers better accuracy than float32 but the drawback of using float64 is that it requires huge computation power. So, in this manuscript we compare different high-speed adder topologies, then discuss the implementation of an optimized 64-bit conditional sum and carry select adder that can be used to implement Deep Neural Network with float64 number representation. Analysis between different adder architecture is performed using Synopsys Design Compiler with 45nm Toshiba library for three different metrics: Timing, Area, and Power.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127425203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Proposed Algorithm to Perform Few Shot Learning with different sampling sizes 一种不同采样大小的少镜头学习算法
Kashvi Dedhia, Mallika Konkar, Dhruvil Shah, Prachi Tawde
Often times there is scarcity when it comes to model training of a quality dataset. Sometimes the data that is available is unlabelled, sometimes very few samples are available for some classes. In these cases, few shot learning comes in handy. There are two approaches to few shot learning Data Level approach and Parameter Level approach. The paper consists of analysis of the number of training samples using parameter level approach. Two classes have been used to perform few shot learning. Meta transfer learning is being used, by initialising the parameters of convolutional neutral networks (CNN) learner model from a model trained on ImageNet. It has been performed incrementally on datasets of various sizes. The results and performance of all the models are compared to the results when the entire dataset is used. As well as the advantages of using few shot learning. It has found its applications in a wide range of fields mainly computer vision, natural language processing etc.
当涉及到高质量数据集的模型训练时,通常存在稀缺性。有时可用的数据是未标记的,有时对于某些类可用的样本很少。在这些情况下,很少有射击学习能派上用场。少球学习有两种方法:数据级方法和参数级方法。本文采用参数水平法对训练样本数量进行了分析。两个类已经被用来执行一些射击学习。使用元迁移学习,从ImageNet上训练的模型初始化卷积神经网络(CNN)学习器模型的参数。它已经在不同大小的数据集上逐步执行。将所有模型的结果和性能与使用整个数据集时的结果进行比较。以及使用少枪学习的优点。它在计算机视觉、自然语言处理等领域有着广泛的应用。
{"title":"A Proposed Algorithm to Perform Few Shot Learning with different sampling sizes","authors":"Kashvi Dedhia, Mallika Konkar, Dhruvil Shah, Prachi Tawde","doi":"10.1109/ICAECC54045.2022.9716609","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716609","url":null,"abstract":"Often times there is scarcity when it comes to model training of a quality dataset. Sometimes the data that is available is unlabelled, sometimes very few samples are available for some classes. In these cases, few shot learning comes in handy. There are two approaches to few shot learning Data Level approach and Parameter Level approach. The paper consists of analysis of the number of training samples using parameter level approach. Two classes have been used to perform few shot learning. Meta transfer learning is being used, by initialising the parameters of convolutional neutral networks (CNN) learner model from a model trained on ImageNet. It has been performed incrementally on datasets of various sizes. The results and performance of all the models are compared to the results when the entire dataset is used. As well as the advantages of using few shot learning. It has found its applications in a wide range of fields mainly computer vision, natural language processing etc.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115045243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cryptography based Face Authentication System for Secured Communication 一种基于密码学的安全通信人脸认证系统
Ba Ajeethra, Sv Gautham Prasath, R. Arun Balaji, K. A. Kumar
Digital communication and networking had become an integral part of our everyday life. Technological advancements in Digital networking must also include security and confidentiality paradigms. Several previous works on communication systems comprised the problem of storage, sharing, and complexity of keys. On considering the mentioned problems of existing works, this paper proposes secure communication using cryptography and face recognition techniques with cloud computing. The proposed system pertains to a protected communication process, where messages are entitled only after the verification of the authorized sender and receiver using Linear Binary Pattern Histogram (LBPH) face recognition, and Rivest, Shamir, Adleman (RSA) cryptographic technique with the cloud management system. The system generates RSA key pair, which is exported as a Privacy- Enhanced Mail (PEM) file and stored in a remote server through a Secure Shell (SSH) tunnel.The proposed system has found that using 50 samples for face authentication is most efficient and accurate with limited time. Existing works have focused to increase security by adding layers of encryption which in turn increased the complexity to handle keys and decryption processes. This proposed methodology on following a biometric authentication system, stretches itself with an extra efficient layer of security without increasing the complexity of the system.
数字通信和网络已经成为我们日常生活中不可或缺的一部分。数字网络的技术进步也必须包括安全和保密范例。以前关于通信系统的几项工作包含了密钥的存储、共享和复杂性问题。在考虑到现有工作中存在的问题的基础上,本文提出了基于云计算的加密技术和人脸识别技术的安全通信。所提出的系统适用于受保护的通信过程,其中消息只有在使用线性二进制模式直方图(LBPH)人脸识别和Rivest, Shamir, Adleman (RSA)加密技术与云管理系统验证授权发送方和接收方后才有权。系统生成RSA密钥对,导出为PEM (Privacy- Enhanced Mail)文件,通过SSH (Secure Shell)隧道保存在远程服务器上。该系统发现,在有限的时间内,使用50个样本进行人脸认证是最有效和准确的。现有的工作主要是通过增加加密层来提高安全性,这反过来又增加了处理密钥和解密过程的复杂性。该方法在遵循生物识别认证系统的基础上,在不增加系统复杂性的情况下,提供了一个更有效的安全层。
{"title":"A Cryptography based Face Authentication System for Secured Communication","authors":"Ba Ajeethra, Sv Gautham Prasath, R. Arun Balaji, K. A. Kumar","doi":"10.1109/ICAECC54045.2022.9716676","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716676","url":null,"abstract":"Digital communication and networking had become an integral part of our everyday life. Technological advancements in Digital networking must also include security and confidentiality paradigms. Several previous works on communication systems comprised the problem of storage, sharing, and complexity of keys. On considering the mentioned problems of existing works, this paper proposes secure communication using cryptography and face recognition techniques with cloud computing. The proposed system pertains to a protected communication process, where messages are entitled only after the verification of the authorized sender and receiver using Linear Binary Pattern Histogram (LBPH) face recognition, and Rivest, Shamir, Adleman (RSA) cryptographic technique with the cloud management system. The system generates RSA key pair, which is exported as a Privacy- Enhanced Mail (PEM) file and stored in a remote server through a Secure Shell (SSH) tunnel.The proposed system has found that using 50 samples for face authentication is most efficient and accurate with limited time. Existing works have focused to increase security by adding layers of encryption which in turn increased the complexity to handle keys and decryption processes. This proposed methodology on following a biometric authentication system, stretches itself with an extra efficient layer of security without increasing the complexity of the system.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129182098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Leakage Current Mechanism in Supercapacitor with Experimental Approach 用实验方法分析超级电容器泄漏电流机理
B. Bairwa, K. Pareek, Mrinal Sarvagya, U. Yaragatti
In this paper, we evaluated the leakage current of super capacitor during self-discharge. A three branch electrical equivalent circuit model (ECM) is constructed to estimate voltage response and leakage current of commercially available 2.7 V 350F (BCAP350) double-layer capacitor (DLC). Experimental work carried out with two constant current charging segments 0.25 ampere, and 0.5 amperes. Simulated data shows good agreement with experimental results obtained at electro-chemical workstation CH760e with RMSE and MAE error up to 0.0633, 0.05715, and 0.0759, 0.04173 for 0.25 ampere and 0.5 amperes charging current, respectively. The results confirm that the ECM model is capable to simulate the complex terminal behavior of the super capacitor and provides the means to study its application as an energy storage device.
本文对超级电容器自放电时的漏电流进行了计算。建立了三支路等效电路模型(ECM),对市售2.7 V 350F (BCAP350)双层电容器(DLC)的电压响应和漏电流进行了估计。实验工作采用0.25安培和0.5安培两个恒流充电段进行。仿真数据与电化学工作站CH760e的实验结果吻合较好,在0.25安培和0.5安培充电电流下,RMSE和MAE误差分别为0.0633、0.05715和0.0759、0.04173。结果证实了ECM模型能够模拟超级电容器的复杂终端行为,为研究其作为储能器件的应用提供了手段。
{"title":"Analysis of Leakage Current Mechanism in Supercapacitor with Experimental Approach","authors":"B. Bairwa, K. Pareek, Mrinal Sarvagya, U. Yaragatti","doi":"10.1109/ICAECC54045.2022.9716664","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716664","url":null,"abstract":"In this paper, we evaluated the leakage current of super capacitor during self-discharge. A three branch electrical equivalent circuit model (ECM) is constructed to estimate voltage response and leakage current of commercially available 2.7 V 350F (BCAP350) double-layer capacitor (DLC). Experimental work carried out with two constant current charging segments 0.25 ampere, and 0.5 amperes. Simulated data shows good agreement with experimental results obtained at electro-chemical workstation CH760e with RMSE and MAE error up to 0.0633, 0.05715, and 0.0759, 0.04173 for 0.25 ampere and 0.5 amperes charging current, respectively. The results confirm that the ECM model is capable to simulate the complex terminal behavior of the super capacitor and provides the means to study its application as an energy storage device.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125015042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Design and development of Interdigital Band pass filter for L-Band Wireless Communication Applications l波段无线通信中数字间带通滤波器的设计与开发
G. R. K. Dora, R. Biradar, M. Prakruthi
New age wireless applications demand sharp rejection of unwanted signals at MHz frequencies. This necessitates the design of low loss, high attenuation bandpass filters. This paper proposes a design of compact 0.5 dB Chebyshev interdigital bandpass filter (IDBPF) which operates at a frequency of F0=875MHz used for space applications. The IDBPF is designed for an order n=9. Advanced Design System (ADS) software is used to design the filter. The designed filter is fabricated on a RO4350B substrate which has a relative dielectric constant $varepsilon_{r}$ of 3.66. Filter has pass bandwidth of $F0 pm 125MHz$, and insertion loss of $5 pm 3dB$ at 875MHz with steep rejection of 40dB min at 1050MHz and 25dB min at 650MHz. In this design, rejection is considered at prime importance than the insertion loss.
新时代的无线应用要求在兆赫频率上强烈抑制不需要的信号。这就需要设计低损耗、高衰减的带通滤波器。本文提出了一种紧凑的0.5 dB切比雪夫数字间带通滤波器(IDBPF)的设计,该滤波器工作频率为F0=875MHz,用于空间应用。IDBPF的设计阶数为n=9。采用ADS (Advanced Design System)软件对滤波器进行设计。所设计的滤波器是在相对介电常数$varepsilon_{r}$为3.66的ro450b衬底上制作的。滤波器的通带宽为$F0 pm 125MHz$,在875MHz时插入损耗为$5 pm 3dB$,在1050MHz和650MHz时抑制值分别为40dB min和25dB min。在这种设计中,抑制比插入损耗更重要。
{"title":"Design and development of Interdigital Band pass filter for L-Band Wireless Communication Applications","authors":"G. R. K. Dora, R. Biradar, M. Prakruthi","doi":"10.1109/ICAECC54045.2022.9716611","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716611","url":null,"abstract":"New age wireless applications demand sharp rejection of unwanted signals at MHz frequencies. This necessitates the design of low loss, high attenuation bandpass filters. This paper proposes a design of compact 0.5 dB Chebyshev interdigital bandpass filter (IDBPF) which operates at a frequency of F0=875MHz used for space applications. The IDBPF is designed for an order n=9. Advanced Design System (ADS) software is used to design the filter. The designed filter is fabricated on a RO4350B substrate which has a relative dielectric constant $varepsilon_{r}$ of 3.66. Filter has pass bandwidth of $F0 pm 125MHz$, and insertion loss of $5 pm 3dB$ at 875MHz with steep rejection of 40dB min at 1050MHz and 25dB min at 650MHz. In this design, rejection is considered at prime importance than the insertion loss.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123476170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LSTM based Deep Learning Technique to Forecast Internet of Things Attacks in MQTT Protocol 基于LSTM的深度学习技术预测MQTT协议中的物联网攻击
S. Thavamani, U. Sinthuja
Internet of Things networks are becoming more popular for monitoring critical environments of various types, resulting in a large increase in the amount of data transmitted. Because of the large number of linked IoT devices, network and security protocols is a major concern. In the sphere of security, detection systems play a critical role: they are based on cutting-edge algorithms. They can recognize or forecast security attacks using techniques such as machine learning, allowing them to secure the underpinning system. We have depicted some of the Deep Learning based techniques and figured out the best technique called Long Short Term Memory (LSTM) with 87% of accuracy to build the Artificial Intelligence based Interpolation Technique for IoT Environment.
物联网网络越来越多地用于监控各种类型的关键环境,导致数据传输量大幅增加。由于大量连接的物联网设备,网络和安全协议是一个主要问题。在安全领域,检测系统起着至关重要的作用:它们基于尖端的算法。他们可以使用机器学习等技术识别或预测安全攻击,从而使他们能够保护基础系统。我们描述了一些基于深度学习的技术,并找出了长短期记忆(LSTM)的最佳技术,其准确度为87%,用于构建物联网环境中基于人工智能的插值技术。
{"title":"LSTM based Deep Learning Technique to Forecast Internet of Things Attacks in MQTT Protocol","authors":"S. Thavamani, U. Sinthuja","doi":"10.1109/ICAECC54045.2022.9716585","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716585","url":null,"abstract":"Internet of Things networks are becoming more popular for monitoring critical environments of various types, resulting in a large increase in the amount of data transmitted. Because of the large number of linked IoT devices, network and security protocols is a major concern. In the sphere of security, detection systems play a critical role: they are based on cutting-edge algorithms. They can recognize or forecast security attacks using techniques such as machine learning, allowing them to secure the underpinning system. We have depicted some of the Deep Learning based techniques and figured out the best technique called Long Short Term Memory (LSTM) with 87% of accuracy to build the Artificial Intelligence based Interpolation Technique for IoT Environment.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128411995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dense Optical Flow using RAFT 利用RAFT实现密集光流
M. K. Khaishagi, Praful Kumar, D. Naik
RAFT is a deep network architecture for the detection of optical flow in the images. The RAFT model relates the per pixel motion between images even for minor changes in the position of the objects. It also updates the flow of field through recurrent units that perform lookups on the performance of the model. RAFT also works well with different datatypes and also it has better efficiency, training speed and count of parameters. Experiments were performed by using different parameters and also by changing certain values in the model itself. One cycle learning was also used to find the best parameters for the model. We also found that the RAFT model performs better than most of the other existing models for optical flow calculation in to images.
RAFT是一种用于检测图像中光流的深度网络结构。RAFT模型将图像之间的每像素运动联系起来,即使是物体位置的微小变化。它还通过执行查找模型性能的循环单元更新字段流。RAFT也可以很好地处理不同的数据类型,并且具有更好的效率、训练速度和参数计数。通过使用不同的参数和改变模型本身的某些值来进行实验。一个周期学习也被用来寻找模型的最佳参数。我们还发现RAFT模型比大多数现有的模型在图像光流计算中表现得更好。
{"title":"Dense Optical Flow using RAFT","authors":"M. K. Khaishagi, Praful Kumar, D. Naik","doi":"10.1109/ICAECC54045.2022.9716703","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716703","url":null,"abstract":"RAFT is a deep network architecture for the detection of optical flow in the images. The RAFT model relates the per pixel motion between images even for minor changes in the position of the objects. It also updates the flow of field through recurrent units that perform lookups on the performance of the model. RAFT also works well with different datatypes and also it has better efficiency, training speed and count of parameters. Experiments were performed by using different parameters and also by changing certain values in the model itself. One cycle learning was also used to find the best parameters for the model. We also found that the RAFT model performs better than most of the other existing models for optical flow calculation in to images.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128701388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
JARVIS: An Intelligent Network Intrusion Detection and Prevention System JARVIS:一个智能网络入侵检测和防御系统
A. Patil, Harivind Premkumar, Kiran M H M, Pranav Hegde
With the current advances in networking and the usage of computer networks in different sectors of technology, network security plays a prime role in enabling the proper functioning of networks by detecting and preventing attacks. In this paper, we propose an architecture using the Snort IDS/IPS and machine learning to build an Intelligent Network Intrusion Detection and Prevention System with dynamic rule updation creating robust and secure system with reduced resource consumption which can be used in Domestic Networks. The objective of JARVIS, the proposed system, is to detect malicious patterns in real-time traffic data and take action by dynamically updating Snort rules. By deploying a machine learning model (Random Forest) in parallel and dynamically enabling rules, resource consumption of Snort can be reduced and optimized. The model detects any attacks and suggests rules that can be deployed on Snort to prevent the attack. The false-positive rate of the model was reduced by looking at DNS queries to analyze the intent behind the traffic data. JARVIS also provides a web interface where the User can view Network Traffic Data, Detected Attacks as well as take the necessary actions. The machine learning model successfully detected incoming attacks with considerable accuracy and suggested rules in the web interface which allowed the user to deploy them and prevent the attack from causing further damage.
随着网络的发展和计算机网络在不同技术领域的应用,网络安全通过检测和防止攻击,在确保网络正常运行方面发挥着重要作用。本文提出了一种利用Snort IDS/IPS和机器学习构建具有动态规则更新的智能网络入侵检测和防御系统的体系结构,该系统具有鲁棒性和安全性,并且减少了资源消耗,可用于家庭网络。所提出的系统JARVIS的目标是检测实时流量数据中的恶意模式,并通过动态更新Snort规则来采取行动。通过在并行和动态启用规则中部署机器学习模型(Random Forest),可以减少和优化Snort的资源消耗。该模型检测任何攻击,并建议可以在Snort上部署的规则来防止攻击。通过查看DNS查询来分析流量数据背后的意图,降低了模型的误报率。JARVIS还提供了一个web界面,用户可以在其中查看网络流量数据,检测到的攻击以及采取必要的行动。机器学习模型成功地以相当的准确性检测到传入的攻击,并在web界面中建议规则,允许用户部署它们并防止攻击造成进一步的损害。
{"title":"JARVIS: An Intelligent Network Intrusion Detection and Prevention System","authors":"A. Patil, Harivind Premkumar, Kiran M H M, Pranav Hegde","doi":"10.1109/ICAECC54045.2022.9716622","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716622","url":null,"abstract":"With the current advances in networking and the usage of computer networks in different sectors of technology, network security plays a prime role in enabling the proper functioning of networks by detecting and preventing attacks. In this paper, we propose an architecture using the Snort IDS/IPS and machine learning to build an Intelligent Network Intrusion Detection and Prevention System with dynamic rule updation creating robust and secure system with reduced resource consumption which can be used in Domestic Networks. The objective of JARVIS, the proposed system, is to detect malicious patterns in real-time traffic data and take action by dynamically updating Snort rules. By deploying a machine learning model (Random Forest) in parallel and dynamically enabling rules, resource consumption of Snort can be reduced and optimized. The model detects any attacks and suggests rules that can be deployed on Snort to prevent the attack. The false-positive rate of the model was reduced by looking at DNS queries to analyze the intent behind the traffic data. JARVIS also provides a web interface where the User can view Network Traffic Data, Detected Attacks as well as take the necessary actions. The machine learning model successfully detected incoming attacks with considerable accuracy and suggested rules in the web interface which allowed the user to deploy them and prevent the attack from causing further damage.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125428323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1