首页 > 最新文献

2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)最新文献

英文 中文
Deep Learning Framework and Visualization for Malware Classification 恶意软件分类的深度学习框架和可视化
A. S, S. K, P. Poornachandran, V. Menon, S. P.
In this paper we propose a deep learning framework for classification of malware. There has been an enormous increase in the volume of malware generated lately which represents a genuine security danger to organizations and people. So as to battle the expansion of malwares, new strategies are needed to quickly identify and classify malware. Malimg dataset, a publicly available benchmark data set was used for the experimentation. The architecture used in this work is a hybrid cost-sensitive network of one-dimensional Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) network which obtained an accuracy of 94.4%, an increase in performance compared to work done by [1] which got 84.9%. Hyper parameter tuning is done on deep learning architecture to set the parameters. A learning rate of 0.01 was taken for all experiments. Train-test split of 70-30% was done during experimentation. This facilitates to find how well the models perform on imbalanced data sets. Usual methods like disassembly, decompiling, de-obfuscation or execution of the binary need not be done in this proposed method. The source code and the trained models are made publicly available for further research.
本文提出了一种用于恶意软件分类的深度学习框架。最近产生的恶意软件数量急剧增加,这对组织和个人构成了真正的安全威胁。为了对抗恶意软件的扩张,需要新的策略来快速识别和分类恶意软件。实验使用了一个公开可用的基准数据集Malimg dataset。本文使用的架构是一维卷积神经网络(CNN)和长短期记忆(LSTM)网络的混合代价敏感网络,准确率达到94.4%,比[1]的84.9%提高了性能。超参数调优是在深度学习架构上进行参数设置的。所有实验的学习率均为0.01。实验时采用70-30%的训练-测试分割。这有助于发现模型在不平衡数据集上的表现。通常的方法,如反汇编、反编译、反混淆或执行二进制文件不需要在这个建议的方法中完成。源代码和经过训练的模型都是公开的,供进一步研究使用。
{"title":"Deep Learning Framework and Visualization for Malware Classification","authors":"A. S, S. K, P. Poornachandran, V. Menon, S. P.","doi":"10.1109/ICACCS.2019.8728471","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728471","url":null,"abstract":"In this paper we propose a deep learning framework for classification of malware. There has been an enormous increase in the volume of malware generated lately which represents a genuine security danger to organizations and people. So as to battle the expansion of malwares, new strategies are needed to quickly identify and classify malware. Malimg dataset, a publicly available benchmark data set was used for the experimentation. The architecture used in this work is a hybrid cost-sensitive network of one-dimensional Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) network which obtained an accuracy of 94.4%, an increase in performance compared to work done by [1] which got 84.9%. Hyper parameter tuning is done on deep learning architecture to set the parameters. A learning rate of 0.01 was taken for all experiments. Train-test split of 70-30% was done during experimentation. This facilitates to find how well the models perform on imbalanced data sets. Usual methods like disassembly, decompiling, de-obfuscation or execution of the binary need not be done in this proposed method. The source code and the trained models are made publicly available for further research.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127109817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
An Overview Of Dynamic CMOS Comparators 动态CMOS比较器概述
R. Sangeetha, A. Vidhyashri, M. Reena, R. Sudharshan, Sangeetha Govindan, J. Ajayan
The circuit performance of dynamic CMOS comparators has been reviewed in this work. CMOS dynamic comparators contributes a major role on the implementation of mixed signal successive approximation register (SAR) type analog to digital converters (ADC). High precision, dynamic range, low voltage operation, high speed, low power consumption, reliability and offset voltage are the critical factors to be considered while designing CMOS dynamic comparators. This paper reviewed the performance of some popular dynamic CMOS comparators such as strong arm latch comparator, dynamic latched comparator, resistive diode comparator, double tail comparators, differential pair comparator and Lewis-Grey comparator.
本文综述了动态CMOS比较器的电路性能。CMOS动态比较器在混合信号逐次逼近寄存器(SAR)型模数转换器(ADC)的实现中起着重要作用。高精度、动态范围、低电压工作、高速度、低功耗、可靠性和偏置电压是设计CMOS动态比较器时需要考虑的关键因素。本文综述了目前流行的几种动态CMOS比较器的性能,如强臂锁存比较器、动态锁存比较器、电阻二极管比较器、双尾比较器、差分对比较器和Lewis-Grey比较器。
{"title":"An Overview Of Dynamic CMOS Comparators","authors":"R. Sangeetha, A. Vidhyashri, M. Reena, R. Sudharshan, Sangeetha Govindan, J. Ajayan","doi":"10.1109/ICACCS.2019.8728470","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728470","url":null,"abstract":"The circuit performance of dynamic CMOS comparators has been reviewed in this work. CMOS dynamic comparators contributes a major role on the implementation of mixed signal successive approximation register (SAR) type analog to digital converters (ADC). High precision, dynamic range, low voltage operation, high speed, low power consumption, reliability and offset voltage are the critical factors to be considered while designing CMOS dynamic comparators. This paper reviewed the performance of some popular dynamic CMOS comparators such as strong arm latch comparator, dynamic latched comparator, resistive diode comparator, double tail comparators, differential pair comparator and Lewis-Grey comparator.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127564744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Sign Language Recognition System Using Deep Neural Network 基于深度神经网络的手语识别系统
Surejya Suresh, M. T. P., Supriya M.H
In the current fast-moving world, human-computer- interactions (HCI) is one of the main contributors towards the progress of the country. Since the conventional input devices limit the naturalness and speed of human-computer- interactions, Sign Language recognition system has gained a lot of importance. Different sign languages can be used to express intentions and intonations or for controlling devices such as home robots. The main focus of this work is to create a vision based system, a Convolutional Neural Network (CNN) model, to identify six different sign languages from the images captured. The two CNN models developed have different type of optimizers, the Stochastic Gradient Descent (SGD) and Adam.
在当今快速发展的世界中,人机交互(HCI)是国家进步的主要贡献者之一。由于传统的输入设备限制了人机交互的自然度和速度,手语识别系统显得尤为重要。不同的手语可以用来表达意图和语调,或者用来控制家用机器人等设备。这项工作的主要重点是创建一个基于视觉的系统,一个卷积神经网络(CNN)模型,从捕获的图像中识别六种不同的手语。开发的两种CNN模型具有不同类型的优化器,随机梯度下降(SGD)和Adam。
{"title":"Sign Language Recognition System Using Deep Neural Network","authors":"Surejya Suresh, M. T. P., Supriya M.H","doi":"10.1109/ICACCS.2019.8728411","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728411","url":null,"abstract":"In the current fast-moving world, human-computer- interactions (HCI) is one of the main contributors towards the progress of the country. Since the conventional input devices limit the naturalness and speed of human-computer- interactions, Sign Language recognition system has gained a lot of importance. Different sign languages can be used to express intentions and intonations or for controlling devices such as home robots. The main focus of this work is to create a vision based system, a Convolutional Neural Network (CNN) model, to identify six different sign languages from the images captured. The two CNN models developed have different type of optimizers, the Stochastic Gradient Descent (SGD) and Adam.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"448 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132616755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Road Sign Recognition System for Autonomous Vehicle using Raspberry Pi 基于树莓派的自动驾驶汽车路标识别系统
K. Vinothini, S. Jayanthy
Road sign recognition is one of the important tasks of intelligent transportation systems (ITS). The project aims at implementation of road sign detection and control of an autonomous vehicle using Haar Cascade Classifier algorithm. In this proposed work, the system automatically detects the road signs, controls the vehicle and command certain actions. The system consists of Raspberry Pi 3 processor and web camera which automatically captures the video data and converts them into number of frames which are processed by the proposed algorithm in OpenCV to detect the road sign and control the vehicle. Based on the detected sign, the vehicle is controlled by two DC motors interfaced with Raspberry Pi. The experimental results for Peak Signal to Noise Ratio (PSNR) and Minimum Mean Square Error indicate the proposed system gives more accurate results with higher PSNR value compared to Hough Transformation. The performance metrics of the algorithm implemented in ARM processor is much better compared to the results obtained using MATLAB software.
道路标志识别是智能交通系统(ITS)的重要任务之一。该项目旨在使用Haar级联分类器算法实现自动驾驶车辆的道路标志检测和控制。在本工作中,系统自动检测道路标志,控制车辆并命令某些动作。该系统由树莓派3处理器和网络摄像头组成,自动捕获视频数据并将其转换为帧数,然后在OpenCV中进行算法处理,以实现道路标志检测和车辆控制。根据检测到的信号,车辆由两个与树莓派接口的直流电机控制。峰值信噪比(PSNR)和最小均方误差的实验结果表明,与霍夫变换相比,该系统具有更高的PSNR值,结果更加准确。该算法在ARM处理器上的性能指标比在MATLAB软件上得到的结果要好得多。
{"title":"Road Sign Recognition System for Autonomous Vehicle using Raspberry Pi","authors":"K. Vinothini, S. Jayanthy","doi":"10.1109/ICACCS.2019.8728463","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728463","url":null,"abstract":"Road sign recognition is one of the important tasks of intelligent transportation systems (ITS). The project aims at implementation of road sign detection and control of an autonomous vehicle using Haar Cascade Classifier algorithm. In this proposed work, the system automatically detects the road signs, controls the vehicle and command certain actions. The system consists of Raspberry Pi 3 processor and web camera which automatically captures the video data and converts them into number of frames which are processed by the proposed algorithm in OpenCV to detect the road sign and control the vehicle. Based on the detected sign, the vehicle is controlled by two DC motors interfaced with Raspberry Pi. The experimental results for Peak Signal to Noise Ratio (PSNR) and Minimum Mean Square Error indicate the proposed system gives more accurate results with higher PSNR value compared to Hough Transformation. The performance metrics of the algorithm implemented in ARM processor is much better compared to the results obtained using MATLAB software.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130488344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Voice Operated Intelligent Fire Extinguishing Vehicle 语音操作智能灭火车
R. Karthik, T. Divagar, M. Karthikeyan, D. Kumar
At present all the works of human beings are replaced by the robots. Generally robotics are classified into service robotics and industrial robotics. Nowadays all fields are occupied by robotics including, hospitals, agriculture, defense, hazardous environment and office. The Robots are used where ever human does not do their work efficiently and safely such as handling poisonous and explosive products in industries. The direction of the robotic vehicle and the spraying of water in the fire is controlled by the voice command. The communication between the vehicle and humans are established through the NODE MCU and ARDUINO. The vehicle consists of three major components such as the NODE MCU, ARDUINO, and water level indicator (on vehicle). This Robotic vehicle is involved to rescue the human beings and extinguishing the fire where fire fighters are not able to enter into the fire accidental area.
目前,所有人类的工作都被机器人取代了。一般来说,机器人分为服务机器人和工业机器人。现在所有的领域都被机器人所占据,包括医院、农业、国防、危险环境和办公室。机器人被用于人类不能高效安全地工作的地方,例如在工业中处理有毒和爆炸性产品。机器人车辆的方向和在火灾中喷水是由语音命令控制的。车辆与人之间的通信是通过NODE单片机和ARDUINO建立的。该车辆由NODE MCU、ARDUINO和水位指示器(车载)三个主要部件组成。在消防人员无法进入火灾事故区域的情况下,该机器人车辆用于救援人员和灭火。
{"title":"Voice Operated Intelligent Fire Extinguishing Vehicle","authors":"R. Karthik, T. Divagar, M. Karthikeyan, D. Kumar","doi":"10.1109/ICACCS.2019.8728326","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728326","url":null,"abstract":"At present all the works of human beings are replaced by the robots. Generally robotics are classified into service robotics and industrial robotics. Nowadays all fields are occupied by robotics including, hospitals, agriculture, defense, hazardous environment and office. The Robots are used where ever human does not do their work efficiently and safely such as handling poisonous and explosive products in industries. The direction of the robotic vehicle and the spraying of water in the fire is controlled by the voice command. The communication between the vehicle and humans are established through the NODE MCU and ARDUINO. The vehicle consists of three major components such as the NODE MCU, ARDUINO, and water level indicator (on vehicle). This Robotic vehicle is involved to rescue the human beings and extinguishing the fire where fire fighters are not able to enter into the fire accidental area.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128136064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Approach to Classify Lung Nodules for Detection of Cancer Cells 一种用于检测癌细胞的肺结节分类方法
Jayshree Talukdar, P. Sarma
In this paper we are mainly classifying cancerous or non-cancerous cells of human lung which was further classified into which category it falls benign or malignant. Area feature from region of interest (ROI) and Support Vector Machine is applied for classification and CLAHE as an enhancement technique. This paper concentrated on classification of lung nodules by Support Vector Machine technique.
本文主要对人肺的癌细胞和非癌细胞进行分类,并进一步将其分为良性和恶性。利用感兴趣区域(ROI)和支持向量机的区域特征进行分类,并利用CLAHE作为增强技术。本文主要研究了支持向量机对肺结节的分类。
{"title":"An Approach to Classify Lung Nodules for Detection of Cancer Cells","authors":"Jayshree Talukdar, P. Sarma","doi":"10.1109/ICACCS.2019.8728332","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728332","url":null,"abstract":"In this paper we are mainly classifying cancerous or non-cancerous cells of human lung which was further classified into which category it falls benign or malignant. Area feature from region of interest (ROI) and Support Vector Machine is applied for classification and CLAHE as an enhancement technique. This paper concentrated on classification of lung nodules by Support Vector Machine technique.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128144063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Trend Analysis of Diffusion Energy Effective Clustering Techniques in Wireless Sensor Networks 无线传感器网络中扩散能量有效聚类技术的趋势分析
S. Manikandan, M. Jeyakarthic
Evolutions and recent trends in communication technologies have the development of low charge, low power, tiny sized and multidimensional purpose sensor node for wireless sensor networks (WSNs). But energy constrained nature of WSNs demands that their planning and interactive protocols to be designed in an energy aware manner. This paper proposed to make a trend analysis reports on the major perspectives of fuzzy based distributed energy efficient clustering techniques. The most representative fuzzy based clustering techniques describes, deliberated and qualitatively analyzed. In particular the proceeds of different distributed clustering are analyzed with respect to their implication performance and application circumstances. This analysis aims to deliver suitable guidance for system architects to evaluate and select appropriate fuzzy based distributed clustering techniques for their specific application.
通信技术的发展和新趋势促使无线传感器网络的传感器节点向着低电荷、低功耗、小尺寸和多维用途的方向发展。但无线传感器网络的能量约束特性要求其规划和交互协议以能量感知的方式进行设计。本文提出了基于模糊的分布式节能聚类技术主要研究方向的趋势分析报告。对最具代表性的模糊聚类技术进行了描述、讨论和定性分析。特别分析了不同的分布式聚类方法在隐含性能和应用环境方面的进展。该分析旨在为系统架构师提供适当的指导,以评估和选择适合其特定应用的基于模糊的分布式聚类技术。
{"title":"A Trend Analysis of Diffusion Energy Effective Clustering Techniques in Wireless Sensor Networks","authors":"S. Manikandan, M. Jeyakarthic","doi":"10.1109/ICACCS.2019.8728513","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728513","url":null,"abstract":"Evolutions and recent trends in communication technologies have the development of low charge, low power, tiny sized and multidimensional purpose sensor node for wireless sensor networks (WSNs). But energy constrained nature of WSNs demands that their planning and interactive protocols to be designed in an energy aware manner. This paper proposed to make a trend analysis reports on the major perspectives of fuzzy based distributed energy efficient clustering techniques. The most representative fuzzy based clustering techniques describes, deliberated and qualitatively analyzed. In particular the proceeds of different distributed clustering are analyzed with respect to their implication performance and application circumstances. This analysis aims to deliver suitable guidance for system architects to evaluate and select appropriate fuzzy based distributed clustering techniques for their specific application.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132322195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Segmentation and Classification of Lung Nodules using Split Bregman and SVM Classifier 使用 Split Bregman 和 SVM 分类器对肺结节进行分割和分类
S. Pattar
Lung nodules are a commonly occurring problem in the society. This problem is more prevalent in populations that expose themselves to risk factors such as smoking, pollution, etc. The current techniques used for segmentation of lung nodules from CT images have the following drawbacks: Most segmentation algorithms use Local Fitting Models that need re-initialization for the sign distance function. The inhomogeneity in the CT images make the algorithms to settle at local minima and lead to wrong segmentation. Re-initialization increases the time required and makes the algorithm slow. Region-based active contour models are powerful and flexible methods which can able to segment real and synthetic images. In the proposed method Global Convex Segmentation (GCS) and Split Bregman technique is incorporated into a region based active contour model such as Chan-Vese (CV) with Region-Scalable Fitting (RSF) scheme to segment the Lung nodules region. Local Binary Pattern descriptor (LBP) is used to extract the tumor features. The extracted features are used to classify the nodules as tumor or non-tumor with the help of Support Vector Machine (SVM). The classification accuracy obtained is enhanced compared to other existing methods. Experimental results are demonstrated by using Lung CT images.
肺结节是社会中普遍存在的问题。这一问题在受到吸烟、污染等危险因素影响的人群中更为普遍。目前用于从 CT 图像分割肺结节的技术存在以下缺点:大多数分割算法使用局部拟合模型,需要重新初始化符号距离函数。CT 图像的不均匀性使算法停留在局部最小值,导致错误的分割。重新初始化会增加所需的时间,使算法变得缓慢。基于区域的主动轮廓模型是一种强大而灵活的方法,能够分割真实和合成图像。在所提出的方法中,全凸面分割(GCS)和分割布雷格曼技术被融入到基于区域的主动轮廓模型中,如 Chan-Vese (CV),并采用区域可缩放拟合(RSF)方案来分割肺结节区域。局部二进制模式描述符(LBP)用于提取肿瘤特征。在支持向量机(SVM)的帮助下,提取的特征用于将结节分类为肿瘤或非肿瘤。与其他现有方法相比,该方法提高了分类准确性。实验结果通过肺部 CT 图像进行了演示。
{"title":"Segmentation and Classification of Lung Nodules using Split Bregman and SVM Classifier","authors":"S. Pattar","doi":"10.1109/ICACCS.2019.8728481","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728481","url":null,"abstract":"Lung nodules are a commonly occurring problem in the society. This problem is more prevalent in populations that expose themselves to risk factors such as smoking, pollution, etc. The current techniques used for segmentation of lung nodules from CT images have the following drawbacks: Most segmentation algorithms use Local Fitting Models that need re-initialization for the sign distance function. The inhomogeneity in the CT images make the algorithms to settle at local minima and lead to wrong segmentation. Re-initialization increases the time required and makes the algorithm slow. Region-based active contour models are powerful and flexible methods which can able to segment real and synthetic images. In the proposed method Global Convex Segmentation (GCS) and Split Bregman technique is incorporated into a region based active contour model such as Chan-Vese (CV) with Region-Scalable Fitting (RSF) scheme to segment the Lung nodules region. Local Binary Pattern descriptor (LBP) is used to extract the tumor features. The extracted features are used to classify the nodules as tumor or non-tumor with the help of Support Vector Machine (SVM). The classification accuracy obtained is enhanced compared to other existing methods. Experimental results are demonstrated by using Lung CT images.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128473208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PUF Authentication using Visual Secret Sharing Scheme 基于可视化秘密共享方案的PUF认证
D. Naveen, K. Praveen
There are so many modern cryptographic protocols are available which can be used for authenticating wirelessly connected devices. Usually the keys are stored inside the memory of the integrated device which will prompt adversaries to extract secret keys from integrated device. We can persist these attacks by using Physically unclonable functions (PUFs). PUF protocol are designed in such a way that it needs to be light-weight and is resistance against physical attacks. In this paper, we are utilizing the secret sharing method with PUF for an efficient and secure method to authenticate the devices. This new approach is lightweight and suitable for energy constrained platforms such as IOT, smart cards. The proposed protocol does not follow the classic PUF protocol challenge and response pairs, instead of that here a set of shares generated using (2, n) ideal visual secret sharing method are used for authentication
有很多现代的加密协议可用来验证无线连接的设备。密钥通常存储在集成设备的内存中,这将提示攻击者从集成设备中提取密钥。我们可以通过使用物理不可克隆函数(puf)来持久化这些攻击。PUF协议的设计要求它必须是轻量级的,并且能够抵抗物理攻击。在本文中,我们利用PUF的秘密共享方法作为一种高效、安全的设备认证方法。这种新方法重量轻,适用于物联网、智能卡等能源受限平台。本文提出的协议不遵循经典的PUF协议的挑战和响应对,而是使用(2,n)理想的可视化秘密共享方法生成的一组共享进行身份验证
{"title":"PUF Authentication using Visual Secret Sharing Scheme","authors":"D. Naveen, K. Praveen","doi":"10.1109/ICACCS.2019.8728504","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728504","url":null,"abstract":"There are so many modern cryptographic protocols are available which can be used for authenticating wirelessly connected devices. Usually the keys are stored inside the memory of the integrated device which will prompt adversaries to extract secret keys from integrated device. We can persist these attacks by using Physically unclonable functions (PUFs). PUF protocol are designed in such a way that it needs to be light-weight and is resistance against physical attacks. In this paper, we are utilizing the secret sharing method with PUF for an efficient and secure method to authenticate the devices. This new approach is lightweight and suitable for energy constrained platforms such as IOT, smart cards. The proposed protocol does not follow the classic PUF protocol challenge and response pairs, instead of that here a set of shares generated using (2, n) ideal visual secret sharing method are used for authentication","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116894073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy Efficient Hierarchical Key Management Protocol 节能分层密钥管理协议
T. Kavitha, Rajadurai Kaliyaperumal
A wireless sensor network (WSN) is a group of resource-constrained, inexpensive, tiny, and homogeneous or heterogeneous sensor nodes. The inherent nature of WSNs such that it makes them deployable in a variety of circumstances, which increases the interest towards them but at the same time poses tremendous challenges such as resource-constrained nodes, unattended operations, unknown topology and wireless communication links. Security in WSNs can be achieved with the help of various cryptographic operations. The strength of cryptographic system depends on the secrecy of the key it uses. So, a solid strong key management frame work is the prerequisite for the cryptographic primitive upon which other security primitives are built.To improve the energy efficiency and increase the resilience more effectively, an Energy Efficient Hierarchical Key management Protocol (EEHKMP) for hierarchical homogeneous WSN is proposed. In this protocol, a Differentiated random KPD (DKPD) process is employed for randomly deployed distributed WSN. Its main objective is to distribute different number of keys which are chosen randomly to different sensors in order to enhance the resilience of certain links such that the nodes can route through those links with higher resilience. This DKPD process divides the sensor nodes into different classes and pre-distributes the keys according to each class. Nodes with maximum residual energy and minimum distance are elected as cluster heads (CHs). The CH sets up the intra-cluster and inter-cluster routes with nodes having more shared keys. CH generates multiple random key shares to generate pair-wise key and transmits each key share to source and destination on each hop route, which is selected based on the cost function. Key shares are hop-by-hop encrypted / decrypted by a combination of all shared pre-distributed keys on that hop. Finally, a key update mechanism is presented to update the keys.
无线传感器网络(WSN)是一组资源受限、价格低廉、体积小、同质或异构的传感器节点。无线传感器网络的固有特性使其能够在各种情况下进行部署,这增加了人们对其的兴趣,但同时也带来了巨大的挑战,如资源受限节点、无人值守操作、未知拓扑和无线通信链路。无线传感器网络的安全性可以通过各种加密操作来实现。密码系统的强度取决于它所使用的密钥的保密性。因此,坚实的密钥管理框架是构建其他安全原语的加密原语的先决条件。为了更有效地提高能源效率和增强弹性,提出了一种用于分层同构WSN的节能分层密钥管理协议(EEHKMP)。该协议对随机部署的分布式WSN采用差分随机KPD (Differentiated random KPD, DKPD)过程。它的主要目标是将随机选择的不同数量的密钥分配给不同的传感器,以增强某些链路的弹性,使节点能够以更高的弹性通过这些链路。该DKPD过程将传感器节点划分为不同的类别,并根据每个类别预分发密钥。选取剩余能量最大、距离最小的节点作为簇头。CH为拥有更多共享密钥的节点建立集群内和集群间路由。CH生成多个随机密钥共享以生成成对密钥,并将每个密钥共享发送到每一跳路由上的源和目的,根据代价函数选择。密钥共享是由该跳上所有共享的预分发密钥的组合逐跳加密/解密的。最后,提出了一种密钥更新机制来更新密钥。
{"title":"Energy Efficient Hierarchical Key Management Protocol","authors":"T. Kavitha, Rajadurai Kaliyaperumal","doi":"10.1109/ICACCS.2019.8728343","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728343","url":null,"abstract":"A wireless sensor network (WSN) is a group of resource-constrained, inexpensive, tiny, and homogeneous or heterogeneous sensor nodes. The inherent nature of WSNs such that it makes them deployable in a variety of circumstances, which increases the interest towards them but at the same time poses tremendous challenges such as resource-constrained nodes, unattended operations, unknown topology and wireless communication links. Security in WSNs can be achieved with the help of various cryptographic operations. The strength of cryptographic system depends on the secrecy of the key it uses. So, a solid strong key management frame work is the prerequisite for the cryptographic primitive upon which other security primitives are built.To improve the energy efficiency and increase the resilience more effectively, an Energy Efficient Hierarchical Key management Protocol (EEHKMP) for hierarchical homogeneous WSN is proposed. In this protocol, a Differentiated random KPD (DKPD) process is employed for randomly deployed distributed WSN. Its main objective is to distribute different number of keys which are chosen randomly to different sensors in order to enhance the resilience of certain links such that the nodes can route through those links with higher resilience. This DKPD process divides the sensor nodes into different classes and pre-distributes the keys according to each class. Nodes with maximum residual energy and minimum distance are elected as cluster heads (CHs). The CH sets up the intra-cluster and inter-cluster routes with nodes having more shared keys. CH generates multiple random key shares to generate pair-wise key and transmits each key share to source and destination on each hop route, which is selected based on the cost function. Key shares are hop-by-hop encrypted / decrypted by a combination of all shared pre-distributed keys on that hop. Finally, a key update mechanism is presented to update the keys.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"572 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116292398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1