首页 > 最新文献

2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)最新文献

英文 中文
Commercial Clustering of Indian Bamboo Species Using Machine Learning Techniques 利用机器学习技术对印度竹子物种进行商业聚类
Ankush D. Sawarkar, D. Shrimankar, S. Sahu, Lal Singh, N. Bokde, Manish Kumar
Bamboo is a grass that grows quickly (lm/days) and is very important to India’s social, economic, and environmental growth. India has a big market for bamboo because of the gap between its imports (3,306 thousand ${$}$) and exports (607 thousand ${$}$) of its products. Clustering bamboo for business will be important in the near future since it can be used in over 1,000 ways and is worth USD 2.969 billion in trade. Machine learning (ML) clustering models play a vital role in achieving this task for the commercial clustering of bamboo. In this research, we have presented details of twenty commercial species of bamboo in India has been identified, and data on the 2000 bamboo species have been collected. Although many algorithms have been introduced for clustering in recent years, not on bamboo, especially on morphological data. The target of this paper is to cluster these different bamboo species based on its commercial value using various ML algorithms such as K-means, Gaussian Mixture Models (GMM), and Balance Iterative Reducing and Clustering using Hierarchies (BIRCH). Clustering comes under unsupervised learning; there is no direct accuracy count. To evaluate the performance of clustering and determine which algorithm is best for clustering, we have used other indirect performance measures such as Silhouette Score, Calinski-Harabasz Index (CHI), and the Davies-Bouldin Index (DBI). K-mean shows the highest performance measures among all the other clustering ML models, with achieve a silhouette score of 0.5126, CHI of 17315 and DBI of 0.6633.
竹子是一种生长迅速的草(100米/天),对印度的社会、经济和环境发展非常重要。由于其产品的进口(3,306万美元)和出口(60.7万美元)之间存在差距,印度的竹子市场很大。在不久的将来,将竹子用于商业将是很重要的,因为竹子可以有1000多种用途,贸易价值29.69亿美元。机器学习聚类模型在实现竹的商业聚类任务中起着至关重要的作用。在这项研究中,我们详细介绍了在印度已经鉴定的20种商业竹子,并收集了2000种竹子的数据。虽然近年来引入了许多聚类算法,但对竹子的聚类,特别是对形态数据的聚类还不够。本文的目标是使用不同的机器学习算法,如K-means、高斯混合模型(GMM)和使用层次结构的平衡迭代约简和聚类(BIRCH),根据其商业价值对这些不同的竹子物种进行聚类。聚类属于无监督学习;没有直接的准确数字。为了评估聚类的性能并确定哪种算法最适合聚类,我们使用了其他间接性能度量,如Silhouette Score、Calinski-Harabasz指数(CHI)和Davies-Bouldin指数(DBI)。K-mean在所有其他聚类ML模型中表现出最高的性能指标,其廓形分数为0.5126,CHI为17315,DBI为0.6633。
{"title":"Commercial Clustering of Indian Bamboo Species Using Machine Learning Techniques","authors":"Ankush D. Sawarkar, D. Shrimankar, S. Sahu, Lal Singh, N. Bokde, Manish Kumar","doi":"10.1109/PCEMS58491.2023.10136094","DOIUrl":"https://doi.org/10.1109/PCEMS58491.2023.10136094","url":null,"abstract":"Bamboo is a grass that grows quickly (lm/days) and is very important to India’s social, economic, and environmental growth. India has a big market for bamboo because of the gap between its imports (3,306 thousand ${$}$) and exports (607 thousand ${$}$) of its products. Clustering bamboo for business will be important in the near future since it can be used in over 1,000 ways and is worth USD 2.969 billion in trade. Machine learning (ML) clustering models play a vital role in achieving this task for the commercial clustering of bamboo. In this research, we have presented details of twenty commercial species of bamboo in India has been identified, and data on the 2000 bamboo species have been collected. Although many algorithms have been introduced for clustering in recent years, not on bamboo, especially on morphological data. The target of this paper is to cluster these different bamboo species based on its commercial value using various ML algorithms such as K-means, Gaussian Mixture Models (GMM), and Balance Iterative Reducing and Clustering using Hierarchies (BIRCH). Clustering comes under unsupervised learning; there is no direct accuracy count. To evaluate the performance of clustering and determine which algorithm is best for clustering, we have used other indirect performance measures such as Silhouette Score, Calinski-Harabasz Index (CHI), and the Davies-Bouldin Index (DBI). K-mean shows the highest performance measures among all the other clustering ML models, with achieve a silhouette score of 0.5126, CHI of 17315 and DBI of 0.6633.","PeriodicalId":330870,"journal":{"name":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125746588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assessment of Asthma BAL Cytokines using Machine Learning Techniques 使用机器学习技术评估哮喘BAL细胞因子
P Pedda Sadhu Naik, M. Padukudru, Jeny Rajan
Asthma is a chronic respiratory disorder characterised by airway inflammation and constriction, leading to difficulty in breathing and recurrent attacks of wheezing, coughing, and shortness of breath. In asthma, various cytokines, including interleukins (IL-4, IL-5, and IL-13) and tumor necrosis factoralpha (TNF-alpha), have been found to be increased in the airways of individuals. These cytokines are involved in the recruitment and activation of immune cells, such as eosinophils and T-lymphocytes, which contribute to the inflammation and airway hyperresponsiveness. Dysregulation of cytokine production and signaling has been implicated in the pathogenesis of asthma and may be targeted by therapies to alleviate symptoms and improve outcomes in individuals with this disease. We propose a predictive binary and multi-class machine learning model analysis that efficiently classify the asthma and healthy control patients by detecting cytokines in bronchoalveolar lavage (BAL) fluid which achieved better F1-score than existing approaches.
哮喘是一种以气道炎症和收缩为特征的慢性呼吸系统疾病,导致呼吸困难和反复发作的喘息、咳嗽和呼吸短促。在哮喘中,各种细胞因子,包括白细胞介素(IL-4、IL-5和IL-13)和肿瘤坏死因子(tnf - α)在个体气道中升高。这些细胞因子参与免疫细胞的募集和激活,如嗜酸性粒细胞和t淋巴细胞,这有助于炎症和气道高反应性。细胞因子产生和信号传导的失调与哮喘的发病机制有关,可能是缓解哮喘患者症状和改善预后的治疗目标。我们提出了一种预测的二元和多类机器学习模型分析,通过检测支气管肺泡灌洗液(BAL)中的细胞因子,有效地对哮喘患者和健康对照患者进行分类,获得了比现有方法更好的f1评分。
{"title":"Assessment of Asthma BAL Cytokines using Machine Learning Techniques","authors":"P Pedda Sadhu Naik, M. Padukudru, Jeny Rajan","doi":"10.1109/PCEMS58491.2023.10136037","DOIUrl":"https://doi.org/10.1109/PCEMS58491.2023.10136037","url":null,"abstract":"Asthma is a chronic respiratory disorder characterised by airway inflammation and constriction, leading to difficulty in breathing and recurrent attacks of wheezing, coughing, and shortness of breath. In asthma, various cytokines, including interleukins (IL-4, IL-5, and IL-13) and tumor necrosis factoralpha (TNF-alpha), have been found to be increased in the airways of individuals. These cytokines are involved in the recruitment and activation of immune cells, such as eosinophils and T-lymphocytes, which contribute to the inflammation and airway hyperresponsiveness. Dysregulation of cytokine production and signaling has been implicated in the pathogenesis of asthma and may be targeted by therapies to alleviate symptoms and improve outcomes in individuals with this disease. We propose a predictive binary and multi-class machine learning model analysis that efficiently classify the asthma and healthy control patients by detecting cytokines in bronchoalveolar lavage (BAL) fluid which achieved better F1-score than existing approaches.","PeriodicalId":330870,"journal":{"name":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129256903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Indian Sign Language Recognition Using Classical And Machine Learning Techniques – A Review 使用经典和机器学习技术的印度手语识别-综述
Mani Deepika Kalava, Likhita Kadiyala, S. Kommineni, Ramana Reddy Atla, V. S. G. Thadikemalla
Humans need to communicate in order to emphasize their thoughts and feelings, collaborate with others, and elevate society as a whole. A hearing-impaired person uses sign language to communicate and this language develops naturally within them. However, the non-signer community doesn’t somehow acknowledge it and hence this remains as a significant barrier that negatively impacts living quality. To bridge the gap, effective sign-language recognition (SLR) system is required and is still an unsolved research issue. New technologies have been developed for the past few years to counter the problem of recognition and were mainly developed using sensors and hardware equipment based on gloves. As contrary to earlier technology, this review presents that, there is no need for expensive and complex hardware in order to recognize sign language, only a modern device with a camera is sufficient. This is accomplished by using Google’s MediaPipe framework and machine learning techniques. In this paper, we had presented various techniques developed for Indian sign language and our future goal is to deliver a reliable SLR system with computer vision and AI due to its self-learning capabilities and increased accuracy.
人类需要交流来强调自己的想法和感受,与他人合作,提升整个社会。听力受损的人使用手语进行交流,这种语言在他们体内自然发展。然而,非签字人群体并不承认这一点,因此这仍然是一个对生活质量产生负面影响的重大障碍。为了弥补这一差距,需要有效的手语识别系统,这是一个尚未解决的研究问题。在过去的几年里,人们开发了一些新技术来解决识别问题,这些技术主要是利用传感器和基于手套的硬件设备开发的。与早期的技术相反,这篇综述表明,为了识别手语,不需要昂贵和复杂的硬件,只需要一个带有摄像头的现代设备就足够了。这是通过使用谷歌的MediaPipe框架和机器学习技术来完成的。在本文中,我们介绍了针对印度手语开发的各种技术,我们未来的目标是提供一个具有计算机视觉和人工智能的可靠单反系统,因为它具有自我学习能力和更高的准确性。
{"title":"Indian Sign Language Recognition Using Classical And Machine Learning Techniques – A Review","authors":"Mani Deepika Kalava, Likhita Kadiyala, S. Kommineni, Ramana Reddy Atla, V. S. G. Thadikemalla","doi":"10.1109/PCEMS58491.2023.10136059","DOIUrl":"https://doi.org/10.1109/PCEMS58491.2023.10136059","url":null,"abstract":"Humans need to communicate in order to emphasize their thoughts and feelings, collaborate with others, and elevate society as a whole. A hearing-impaired person uses sign language to communicate and this language develops naturally within them. However, the non-signer community doesn’t somehow acknowledge it and hence this remains as a significant barrier that negatively impacts living quality. To bridge the gap, effective sign-language recognition (SLR) system is required and is still an unsolved research issue. New technologies have been developed for the past few years to counter the problem of recognition and were mainly developed using sensors and hardware equipment based on gloves. As contrary to earlier technology, this review presents that, there is no need for expensive and complex hardware in order to recognize sign language, only a modern device with a camera is sufficient. This is accomplished by using Google’s MediaPipe framework and machine learning techniques. In this paper, we had presented various techniques developed for Indian sign language and our future goal is to deliver a reliable SLR system with computer vision and AI due to its self-learning capabilities and increased accuracy.","PeriodicalId":330870,"journal":{"name":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130061225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human Fall Detection using Skeleton Features 基于骨骼特征的人体跌倒检测
Manasa Korumilli, Koppula Sai Lasya, Naveen Cheggoju, V. Kamble, V. Satpute
Unintentional falls of people, when left without serve may cause severe injuries and in extreme cases, they may even lead to loss of lives. In order to provide timely medication, detection of fall events when occurred is necessary.Any action can be considered as the specific motion of various bone key points. So, in our work, we considered bone key points as feature extractors. The MediaPipe framework developed by Google is used to detect the bone key features and its coordinates on the human skeleton. The data obtained is then normalized with respect to the boundary box drawn around humans. Machine learning classifiers, RF, SVM and Deep Learning model, DNN are then used individually to recognise and classify the action into fall or non-fall events. NTU-RGB+D dataset is used in our work. Real time detection using a webcam is also tested. The accuracy achieved by DNN model is 97.63% and that of SVM and RF classifiers is 83.3% and 99.34% respectively. Thus, the highest accuracy is achieved by RF classifier which is 99.34%.
人们在不受保护的情况下不慎跌倒,可能造成严重伤害,在极端情况下,甚至可能导致生命损失。为了提供及时的药物治疗,有必要在发生跌倒事件时进行检测。任何动作都可以看作是各个骨关键点的具体运动。因此,在我们的工作中,我们考虑骨关键点作为特征提取器。谷歌开发的MediaPipe框架用于检测骨骼的关键特征及其在人体骨骼上的坐标。然后将获得的数据相对于人类周围绘制的边界框进行归一化。然后分别使用机器学习分类器,RF, SVM和深度学习模型,DNN来识别并将动作分类为跌倒或非跌倒事件。我们的工作使用了NTU-RGB+D数据集。使用网络摄像头进行实时检测也进行了测试。DNN模型的准确率为97.63%,SVM和RF分类器的准确率分别为83.3%和99.34%。因此,RF分类器的准确率最高,为99.34%。
{"title":"Human Fall Detection using Skeleton Features","authors":"Manasa Korumilli, Koppula Sai Lasya, Naveen Cheggoju, V. Kamble, V. Satpute","doi":"10.1109/PCEMS58491.2023.10136111","DOIUrl":"https://doi.org/10.1109/PCEMS58491.2023.10136111","url":null,"abstract":"Unintentional falls of people, when left without serve may cause severe injuries and in extreme cases, they may even lead to loss of lives. In order to provide timely medication, detection of fall events when occurred is necessary.Any action can be considered as the specific motion of various bone key points. So, in our work, we considered bone key points as feature extractors. The MediaPipe framework developed by Google is used to detect the bone key features and its coordinates on the human skeleton. The data obtained is then normalized with respect to the boundary box drawn around humans. Machine learning classifiers, RF, SVM and Deep Learning model, DNN are then used individually to recognise and classify the action into fall or non-fall events. NTU-RGB+D dataset is used in our work. Real time detection using a webcam is also tested. The accuracy achieved by DNN model is 97.63% and that of SVM and RF classifiers is 83.3% and 99.34% respectively. Thus, the highest accuracy is achieved by RF classifier which is 99.34%.","PeriodicalId":330870,"journal":{"name":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131308016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Analysis of various Dimensionality Reduction Techniques on N-BaIoT Dataset for IoT Botnet Detection 基于N-BaIoT数据集的各种降维技术在物联网僵尸网络检测中的比较分析
N. Sakthipriya, V. Govindasamy, V. Akila
Internet of Things plays a vital role in our everyday lives in terms of economic, social, and commercial aspects. The widespread use of IoT devices has made them a prime target for cyber-attacks. IoT botnet attacks usually have a greater sensitivity to the consequences that might result from launching other attacks such as DDoS attacks and dissemination of sensitive information. For botnet detection in the IoT environment, deep learning mechanisms have emerged. But processing high-dimensional data is difficult, and it adversely affects DL-based botnet detection systems. Various dimensionality reduction methods have been proposed by researchers to address this concern. The purpose of this study is to examine and compare current mainstream dimensionality reduction methods. This will enable us to understand how reducing the number of features may lead to higher classification accuracy. Extensive tests are conducted on the NBaIoT dataset to verify the viability of PCA and auto encoder dimensionality reduction strategies. Results show that Auto encoder algorithm outperform PCA dimensionality reduction methods by the accuracy of 95.02%.
物联网在我们的日常生活中发挥着至关重要的作用,无论是在经济、社会还是商业方面。物联网设备的广泛使用使其成为网络攻击的主要目标。物联网僵尸网络攻击通常对发起其他攻击(如DDoS攻击和传播敏感信息)可能导致的后果更敏感。对于物联网环境中的僵尸网络检测,深度学习机制已经出现。但是处理高维数据是困难的,并且会对基于dl的僵尸网络检测系统产生不利影响。研究人员提出了各种降维方法来解决这个问题。本研究的目的是检视和比较目前主流的降维方法。这将使我们能够理解减少特征数量如何导致更高的分类精度。在NBaIoT数据集上进行了大量的测试,以验证主成分分析和自动编码器降维策略的可行性。结果表明,自动编码器算法的准确率达到95.02%,优于PCA降维方法。
{"title":"A Comparative Analysis of various Dimensionality Reduction Techniques on N-BaIoT Dataset for IoT Botnet Detection","authors":"N. Sakthipriya, V. Govindasamy, V. Akila","doi":"10.1109/PCEMS58491.2023.10136065","DOIUrl":"https://doi.org/10.1109/PCEMS58491.2023.10136065","url":null,"abstract":"Internet of Things plays a vital role in our everyday lives in terms of economic, social, and commercial aspects. The widespread use of IoT devices has made them a prime target for cyber-attacks. IoT botnet attacks usually have a greater sensitivity to the consequences that might result from launching other attacks such as DDoS attacks and dissemination of sensitive information. For botnet detection in the IoT environment, deep learning mechanisms have emerged. But processing high-dimensional data is difficult, and it adversely affects DL-based botnet detection systems. Various dimensionality reduction methods have been proposed by researchers to address this concern. The purpose of this study is to examine and compare current mainstream dimensionality reduction methods. This will enable us to understand how reducing the number of features may lead to higher classification accuracy. Extensive tests are conducted on the NBaIoT dataset to verify the viability of PCA and auto encoder dimensionality reduction strategies. Results show that Auto encoder algorithm outperform PCA dimensionality reduction methods by the accuracy of 95.02%.","PeriodicalId":330870,"journal":{"name":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132519857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AIOIML: Automatic Integration of Ontologies for IoT Domain Using Hybridized Machine Learning Techniques 基于混合机器学习技术的物联网领域本体自动集成
Rishi Rakesh Shrivastava, G. Deepak
There is a need for Ontology modelling and automatic generation of Ontologies in order to assimilate knowledge World Wide Web knowledge as a strategic model. Ontologies are the best knowledge descriptor model as they have some amount of human cognition associated with them because either humans are major contributors when they are generated manually or are indirect contributors when they are semi automatically generated. Internet of Things is a domain which has strategically evolved in the last few years, and there is a need for integrating several facets of Internet of Things Ontology. In this paper a strategic scheme for Internet of Things Ontology integration for Internet of Things domain with different perspective are proposed wherein the dataset are subjected to tag generation which is further classified using the AdaBoost classifier which are aligned with the random core classes of the existing variational Ontologies in the Internet of Things domain using Shannon’s entropy and the pointwise mutual information measure with differential step deviation measure. Which yields average precision and recall of 96.83 and 97.95 respectively.
为了将万维网知识作为一种战略模型来吸收,需要本体建模和本体的自动生成。本体是最好的知识描述符模型,因为它们与一定数量的人类认知相关联,因为当它们手动生成时,人类是主要贡献者,而当它们半自动生成时,人类是间接贡献者。物联网是近年来战略性发展的一个领域,物联网本体的多个方面需要进行整合。本文提出了一种面向不同视角的物联网领域的物联网本体集成策略方案,该方案首先对数据集进行标签生成,然后使用AdaBoost分类器对数据集进行分类,该分类器与物联网领域现有变分本体的随机核心类对齐,利用香农熵和点向互信息度量与差阶偏差度量对数据集进行分类。平均查准率为96.83,查全率为97.95。
{"title":"AIOIML: Automatic Integration of Ontologies for IoT Domain Using Hybridized Machine Learning Techniques","authors":"Rishi Rakesh Shrivastava, G. Deepak","doi":"10.1109/PCEMS58491.2023.10136071","DOIUrl":"https://doi.org/10.1109/PCEMS58491.2023.10136071","url":null,"abstract":"There is a need for Ontology modelling and automatic generation of Ontologies in order to assimilate knowledge World Wide Web knowledge as a strategic model. Ontologies are the best knowledge descriptor model as they have some amount of human cognition associated with them because either humans are major contributors when they are generated manually or are indirect contributors when they are semi automatically generated. Internet of Things is a domain which has strategically evolved in the last few years, and there is a need for integrating several facets of Internet of Things Ontology. In this paper a strategic scheme for Internet of Things Ontology integration for Internet of Things domain with different perspective are proposed wherein the dataset are subjected to tag generation which is further classified using the AdaBoost classifier which are aligned with the random core classes of the existing variational Ontologies in the Internet of Things domain using Shannon’s entropy and the pointwise mutual information measure with differential step deviation measure. Which yields average precision and recall of 96.83 and 97.95 respectively.","PeriodicalId":330870,"journal":{"name":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124569097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Log Analysis(OLA) for Malicious User Activities 针对恶意用户活动的在线日志分析
Poongkuyil Muse, M. S., Hamil Stanly
Efficient log analysis involves collecting, evaluating, and managing raw data from computer-generated records. As security vulnerabilities increase, the analysis of logs has become vital and crucial in multidisciplinary domains. Maintaining and analyzing the log is a pivotal part of every organization as tons of logs are generated every millisecond. However, anomaly detection and log parsing addressed so far, rely on a time-consuming training algorithm based on a Machine Learning framework. The proposed method detects anomalies from real-time data generated from the data centre without the need for a training algorithm. Detection and visualization of malicious activities are done by Elasticsearch, Logstash, and Kibana (ELK) framework. The process of shipping, parsing, indexing, and anomaly detection is carried out using an unsupervised machine learning algorithm which gives a clear inference to detect bots and perform unique log session classification. A real-time Apache HTTP Server log is accessed and anomalous behavior is identified based on the incoming requests. Experiments on real-time data show that 13.76% of anomalies are detected on per weekly basis.
有效的日志分析包括从计算机生成的记录中收集、评估和管理原始数据。随着安全漏洞的增加,日志分析在多学科领域变得至关重要。维护和分析日志是每个组织的关键部分,因为每毫秒都会生成大量日志。然而,迄今为止解决的异常检测和日志解析依赖于基于机器学习框架的耗时训练算法。该方法在不需要训练算法的情况下,从数据中心生成的实时数据中检测异常。恶意活动的检测和可视化是由Elasticsearch、Logstash和Kibana (ELK)框架完成的。发送、解析、索引和异常检测的过程使用无监督机器学习算法进行,该算法给出了一个明确的推断来检测机器人并执行唯一的日志会话分类。访问实时Apache HTTP服务器日志,并根据传入请求识别异常行为。对实时数据的实验表明,每周检测到的异常率为13.76%。
{"title":"Online Log Analysis(OLA) for Malicious User Activities","authors":"Poongkuyil Muse, M. S., Hamil Stanly","doi":"10.1109/PCEMS58491.2023.10136101","DOIUrl":"https://doi.org/10.1109/PCEMS58491.2023.10136101","url":null,"abstract":"Efficient log analysis involves collecting, evaluating, and managing raw data from computer-generated records. As security vulnerabilities increase, the analysis of logs has become vital and crucial in multidisciplinary domains. Maintaining and analyzing the log is a pivotal part of every organization as tons of logs are generated every millisecond. However, anomaly detection and log parsing addressed so far, rely on a time-consuming training algorithm based on a Machine Learning framework. The proposed method detects anomalies from real-time data generated from the data centre without the need for a training algorithm. Detection and visualization of malicious activities are done by Elasticsearch, Logstash, and Kibana (ELK) framework. The process of shipping, parsing, indexing, and anomaly detection is carried out using an unsupervised machine learning algorithm which gives a clear inference to detect bots and perform unique log session classification. A real-time Apache HTTP Server log is accessed and anomalous behavior is identified based on the incoming requests. Experiments on real-time data show that 13.76% of anomalies are detected on per weekly basis.","PeriodicalId":330870,"journal":{"name":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128439337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Memory Decoder for SRAM Based AI Accelerator 基于SRAM的AI加速器节能存储器解码器
Biby Joseph, Gopireddy Chaithanyakumar Reddy, R. Kavitha
Address decoders play a vital role in Static Random-Access Memory (SRAM) memory array architecture to fetch the data in less span of time. As compared to other memory devices, SRAM based Artificial Intelligence (AI) accelerator possess high speed in which memory array address decoder plays a vital role. As a result, the address decoder is the key element for SRAM performance. In this paper, an energy efficient address decoder with low power dissipation is proposed, which can be used for SRAM based AI accelerator. Major part of power consumption of memory chip depends on address decoders. As we go down from higher technology nodes to lower technology nodes, leakage power increases which results in total power consumption. Source biasing technique is used to reduce static power consumption. This paper compares the proposed Address decoder in UMC 65nm technology with existing architectures in terms of power, delay and energy. This decoder design has an improvement of 85.8% average power and 87.46% energy as compared with existing conventional 6-64 decoder circuit using pre-decoding methodology.
地址解码器在静态随机存取存储器(SRAM)存储阵列体系结构中起着至关重要的作用,它能在较短的时间内获取数据。与其他存储器件相比,基于SRAM的人工智能加速器具有很高的速度,其中存储器阵列地址解码器起着至关重要的作用。因此,地址解码器是SRAM性能的关键因素。本文提出了一种低功耗的节能地址解码器,可用于基于SRAM的人工智能加速器。存储芯片的主要功耗是地址解码器。当我们从高技术节点下降到低技术节点时,泄漏功率增加,导致总功耗增加。采用源偏置技术降低静态功耗。本文从功耗、延迟和能耗等方面比较了所提出的UMC 65nm技术的地址解码器与现有架构。与采用预解码方法的传统6-64译码电路相比,该译码电路的平均功率提高了85.8%,能量提高了87.46%。
{"title":"Energy Efficient Memory Decoder for SRAM Based AI Accelerator","authors":"Biby Joseph, Gopireddy Chaithanyakumar Reddy, R. Kavitha","doi":"10.1109/PCEMS58491.2023.10136095","DOIUrl":"https://doi.org/10.1109/PCEMS58491.2023.10136095","url":null,"abstract":"Address decoders play a vital role in Static Random-Access Memory (SRAM) memory array architecture to fetch the data in less span of time. As compared to other memory devices, SRAM based Artificial Intelligence (AI) accelerator possess high speed in which memory array address decoder plays a vital role. As a result, the address decoder is the key element for SRAM performance. In this paper, an energy efficient address decoder with low power dissipation is proposed, which can be used for SRAM based AI accelerator. Major part of power consumption of memory chip depends on address decoders. As we go down from higher technology nodes to lower technology nodes, leakage power increases which results in total power consumption. Source biasing technique is used to reduce static power consumption. This paper compares the proposed Address decoder in UMC 65nm technology with existing architectures in terms of power, delay and energy. This decoder design has an improvement of 85.8% average power and 87.46% energy as compared with existing conventional 6-64 decoder circuit using pre-decoding methodology.","PeriodicalId":330870,"journal":{"name":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","volume":"449 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115931360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing Image Denoising Performance through a Family of Algorithms 通过一系列算法增强图像去噪性能
Omkar Gupta, Irika Nikhita Kalapala, K. Bhurchandi
Images are an integral and indispensable aspect of various disciplines, such as medicine, surveillance, and the entertainment industry. However, the quality of images can be severely compromised by the presence of sensor noise, quantization errors, or transmission errors. This research proposes a novel approach that combines wavelet thresholding and BM3D (Block-Matching and 3D Filtering) techniques for effective image denoising.The efficacy of the methodologies is evaluated and compared to cutting-edge denoising techniques, demonstrating superior performance in both quantitative metrics and visual quality. Furthermore, the study delves into the intricate mechanisms underlying the denoising process and the impact of various parameters on the denoising performance, contributing significantly to the field of image denoising.
图像是医学、监控和娱乐行业等各个学科不可或缺的组成部分。然而,图像的质量可以严重损害传感器噪声,量化误差,或传输误差的存在。本研究提出了一种结合小波阈值和BM3D(块匹配和3D滤波)技术的有效图像去噪方法。评估了方法的有效性,并将其与先进的去噪技术进行了比较,证明了在定量指标和视觉质量方面的卓越性能。此外,该研究还深入探讨了去噪过程的复杂机制以及各种参数对去噪性能的影响,为图像去噪领域做出了重要贡献。
{"title":"Enhancing Image Denoising Performance through a Family of Algorithms","authors":"Omkar Gupta, Irika Nikhita Kalapala, K. Bhurchandi","doi":"10.1109/PCEMS58491.2023.10136117","DOIUrl":"https://doi.org/10.1109/PCEMS58491.2023.10136117","url":null,"abstract":"Images are an integral and indispensable aspect of various disciplines, such as medicine, surveillance, and the entertainment industry. However, the quality of images can be severely compromised by the presence of sensor noise, quantization errors, or transmission errors. This research proposes a novel approach that combines wavelet thresholding and BM3D (Block-Matching and 3D Filtering) techniques for effective image denoising.The efficacy of the methodologies is evaluated and compared to cutting-edge denoising techniques, demonstrating superior performance in both quantitative metrics and visual quality. Furthermore, the study delves into the intricate mechanisms underlying the denoising process and the impact of various parameters on the denoising performance, contributing significantly to the field of image denoising.","PeriodicalId":330870,"journal":{"name":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116415609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stratification of Hacker Forums and Predicting Cyber Assaults for Proactive Cyber Threat Intelligence 面向前瞻性网络威胁情报的黑客论坛分层与网络攻击预测
Bhavesh Dhake, C. Shetye, Pratik Borhade, Devish Gawas, Amit K. Nerurkar
Cyber hazards have emerged as a significant cause of worry for society. Firms are beginning to invest heavily in developing Cyber Threat Intelligence in recent years in order to combat the rising threat of cyber-attacks (CTI). Predominantly, many businesses gathered and analyzed data from internal log files, leading in reactive CTI, which is essentially a data-driven process. The internet hacker community may provide significant proactive CTI value by alerting enterprises about risks that they were previously unaware of. Forums, more than any other platform, give the most metadata, data persistence, and tens of thousands of publicly available Tools, Techniques, and Procedures. Anticrawling techniques, including as authentication, throttling, and obfuscation, are commonly employed in forums. This study intends to create a unique web crawler, as well as use machine learning and deep learning approaches with neural networks to automatically categorize hacker forum data into predetermined categories and anticipate probable future cyber risks for proactive and timely CTI.
网络危害已经成为社会担忧的一个重要原因。近年来,企业开始大力投资开发网络威胁情报,以应对日益增长的网络攻击威胁(CTI)。主要是,许多企业从内部日志文件中收集和分析数据,导致被动CTI,这本质上是一个数据驱动的过程。互联网黑客社区可以通过提醒企业注意他们以前没有意识到的风险来提供重要的主动CTI价值。与其他平台相比,论坛提供了最多的元数据、数据持久性以及成千上万的公开可用的工具、技术和过程。防爬行技术,包括身份验证、节流和混淆,通常在论坛中使用。本研究旨在创建一个独特的网络爬虫,并使用机器学习和深度学习方法与神经网络自动将黑客论坛数据分类为预定类别,并预测未来可能的网络风险,以便主动和及时地进行CTI。
{"title":"Stratification of Hacker Forums and Predicting Cyber Assaults for Proactive Cyber Threat Intelligence","authors":"Bhavesh Dhake, C. Shetye, Pratik Borhade, Devish Gawas, Amit K. Nerurkar","doi":"10.1109/PCEMS58491.2023.10136033","DOIUrl":"https://doi.org/10.1109/PCEMS58491.2023.10136033","url":null,"abstract":"Cyber hazards have emerged as a significant cause of worry for society. Firms are beginning to invest heavily in developing Cyber Threat Intelligence in recent years in order to combat the rising threat of cyber-attacks (CTI). Predominantly, many businesses gathered and analyzed data from internal log files, leading in reactive CTI, which is essentially a data-driven process. The internet hacker community may provide significant proactive CTI value by alerting enterprises about risks that they were previously unaware of. Forums, more than any other platform, give the most metadata, data persistence, and tens of thousands of publicly available Tools, Techniques, and Procedures. Anticrawling techniques, including as authentication, throttling, and obfuscation, are commonly employed in forums. This study intends to create a unique web crawler, as well as use machine learning and deep learning approaches with neural networks to automatically categorize hacker forum data into predetermined categories and anticipate probable future cyber risks for proactive and timely CTI.","PeriodicalId":330870,"journal":{"name":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115589556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1