首页 > 最新文献

2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)最新文献

英文 中文
Classification and recognition of soybean leaf diseases in Madhya Pradesh and Chhattisgarh using Deep learning methods 利用深度学习方法对中央邦和恰蒂斯加尔邦大豆叶片病害进行分类和识别
Shriniket Dixit, Anant Kumar, Akash Haripriya, Khitij Bohre, Kathiravan Srinivasan
Soybean is a major economic crop worldwide. So proper disease control measures must be implemented to reduce losses. These diseases can significantly affect the yield and quality of soybeans. Machine vision and pattern recognition technologies can help accurately diagnose crop diseases and minimize financial losses for soybean farmers. Many research papers discuss the use of deep learning algorithms for imagebased disease detection, including for soybean crops based on CNN, SVM, KNN, etc. However, lacking a well-curated dataset for soybean diseases is a challenge. Additionally, many existing research papers focus more on demonstrating the approach’s feasibility rather than providing solutions to the specific problems faced in a particular region. The proposed deep learning-based classification system for soybean leaf diseases can help identify Angular Leaf spots, Bacterial blight, Soybean Rust, and Downy mildew. An image dataset was created, and image-enhancing techniques were applied during pre-processing. The proposed classifier system achieved an efficiency of 83.9%, 93.01%, and 71.98% in classifying diseases using CNN, Resnet-V2, and KNN classifiers, respectively.
大豆是世界范围内的主要经济作物。因此,必须采取适当的疾病控制措施,以减少损失。这些病害严重影响大豆的产量和品质。机器视觉和模式识别技术可以帮助准确诊断作物病害,并最大限度地减少大豆种植者的经济损失。许多研究论文讨论了将深度学习算法用于基于图像的病害检测,包括基于CNN、SVM、KNN等的大豆作物病害检测。然而,缺乏一个精心策划的大豆疾病数据集是一个挑战。此外,许多现有的研究论文更多地侧重于证明该方法的可行性,而不是为特定地区面临的具体问题提供解决方案。提出的基于深度学习的大豆叶片病害分类系统可以帮助识别角斑病、白叶枯病、大豆锈病和霜霉病。建立图像数据集,并在预处理过程中应用图像增强技术。本文提出的分类器系统使用CNN、Resnet-V2和KNN分类器对疾病进行分类的效率分别为83.9%、93.01%和71.98%。
{"title":"Classification and recognition of soybean leaf diseases in Madhya Pradesh and Chhattisgarh using Deep learning methods","authors":"Shriniket Dixit, Anant Kumar, Akash Haripriya, Khitij Bohre, Kathiravan Srinivasan","doi":"10.1109/PCEMS58491.2023.10136030","DOIUrl":"https://doi.org/10.1109/PCEMS58491.2023.10136030","url":null,"abstract":"Soybean is a major economic crop worldwide. So proper disease control measures must be implemented to reduce losses. These diseases can significantly affect the yield and quality of soybeans. Machine vision and pattern recognition technologies can help accurately diagnose crop diseases and minimize financial losses for soybean farmers. Many research papers discuss the use of deep learning algorithms for imagebased disease detection, including for soybean crops based on CNN, SVM, KNN, etc. However, lacking a well-curated dataset for soybean diseases is a challenge. Additionally, many existing research papers focus more on demonstrating the approach’s feasibility rather than providing solutions to the specific problems faced in a particular region. The proposed deep learning-based classification system for soybean leaf diseases can help identify Angular Leaf spots, Bacterial blight, Soybean Rust, and Downy mildew. An image dataset was created, and image-enhancing techniques were applied during pre-processing. The proposed classifier system achieved an efficiency of 83.9%, 93.01%, and 71.98% in classifying diseases using CNN, Resnet-V2, and KNN classifiers, respectively.","PeriodicalId":330870,"journal":{"name":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130369351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multimodal Autonomous Verbal Assessment With Visual Inspection 多模态自主语言评估与视觉检查
Meet Agrawal, Atharva Kathale, Sahil Purohit, Kalyani Sainis, Praveen Kumar, Mansi A. Radke
This paper proposes an autonomously assessing system for the verbal examination of candidates. The system uses audio-video inputs and processes them to detect the candidate’s spoken answer, and compares it to the model answer in the dataset with the corresponding question. The semantic similarity score will be calculated and used to recommend the next question from the database using various types of recommendation systems discussed in the paper. Additionally, the system employs video analysis techniques to detect and prevent modern malpractices like multiple faces and reading from notes during the examination process. The proposed system aims to improve the efficiency and fairness of verbal examinations by eliminating human bias and accurately evaluating the candidate’s understanding of the subject. The system performance will be evaluated using a dataset of spoken answers and the results will demonstrate its effectiveness in improving the efficiency and fairness of the verbal examination process.
本文提出了一种用于考生口头考试的自主评估系统。该系统使用音频-视频输入并对其进行处理,以检测候选人的口语答案,并将其与数据集中具有相应问题的模型答案进行比较。使用本文中讨论的各种类型的推荐系统,计算语义相似度得分并用于从数据库中推荐下一个问题。此外,该系统还采用视频分析技术来检测和防止现代的不当行为,如在考试过程中出现多重面孔和阅读笔记等。该系统旨在通过消除人为偏见和准确评估考生对主题的理解来提高口头考试的效率和公平性。系统性能将使用口语答案数据集进行评估,结果将证明其在提高口语考试过程的效率和公平性方面的有效性。
{"title":"Multimodal Autonomous Verbal Assessment With Visual Inspection","authors":"Meet Agrawal, Atharva Kathale, Sahil Purohit, Kalyani Sainis, Praveen Kumar, Mansi A. Radke","doi":"10.1109/PCEMS58491.2023.10136061","DOIUrl":"https://doi.org/10.1109/PCEMS58491.2023.10136061","url":null,"abstract":"This paper proposes an autonomously assessing system for the verbal examination of candidates. The system uses audio-video inputs and processes them to detect the candidate’s spoken answer, and compares it to the model answer in the dataset with the corresponding question. The semantic similarity score will be calculated and used to recommend the next question from the database using various types of recommendation systems discussed in the paper. Additionally, the system employs video analysis techniques to detect and prevent modern malpractices like multiple faces and reading from notes during the examination process. The proposed system aims to improve the efficiency and fairness of verbal examinations by eliminating human bias and accurately evaluating the candidate’s understanding of the subject. The system performance will be evaluated using a dataset of spoken answers and the results will demonstrate its effectiveness in improving the efficiency and fairness of the verbal examination process.","PeriodicalId":330870,"journal":{"name":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130459447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Analysis of various Dimensionality Reduction Techniques on N-BaIoT Dataset for IoT Botnet Detection 基于N-BaIoT数据集的各种降维技术在物联网僵尸网络检测中的比较分析
N. Sakthipriya, V. Govindasamy, V. Akila
Internet of Things plays a vital role in our everyday lives in terms of economic, social, and commercial aspects. The widespread use of IoT devices has made them a prime target for cyber-attacks. IoT botnet attacks usually have a greater sensitivity to the consequences that might result from launching other attacks such as DDoS attacks and dissemination of sensitive information. For botnet detection in the IoT environment, deep learning mechanisms have emerged. But processing high-dimensional data is difficult, and it adversely affects DL-based botnet detection systems. Various dimensionality reduction methods have been proposed by researchers to address this concern. The purpose of this study is to examine and compare current mainstream dimensionality reduction methods. This will enable us to understand how reducing the number of features may lead to higher classification accuracy. Extensive tests are conducted on the NBaIoT dataset to verify the viability of PCA and auto encoder dimensionality reduction strategies. Results show that Auto encoder algorithm outperform PCA dimensionality reduction methods by the accuracy of 95.02%.
物联网在我们的日常生活中发挥着至关重要的作用,无论是在经济、社会还是商业方面。物联网设备的广泛使用使其成为网络攻击的主要目标。物联网僵尸网络攻击通常对发起其他攻击(如DDoS攻击和传播敏感信息)可能导致的后果更敏感。对于物联网环境中的僵尸网络检测,深度学习机制已经出现。但是处理高维数据是困难的,并且会对基于dl的僵尸网络检测系统产生不利影响。研究人员提出了各种降维方法来解决这个问题。本研究的目的是检视和比较目前主流的降维方法。这将使我们能够理解减少特征数量如何导致更高的分类精度。在NBaIoT数据集上进行了大量的测试,以验证主成分分析和自动编码器降维策略的可行性。结果表明,自动编码器算法的准确率达到95.02%,优于PCA降维方法。
{"title":"A Comparative Analysis of various Dimensionality Reduction Techniques on N-BaIoT Dataset for IoT Botnet Detection","authors":"N. Sakthipriya, V. Govindasamy, V. Akila","doi":"10.1109/PCEMS58491.2023.10136065","DOIUrl":"https://doi.org/10.1109/PCEMS58491.2023.10136065","url":null,"abstract":"Internet of Things plays a vital role in our everyday lives in terms of economic, social, and commercial aspects. The widespread use of IoT devices has made them a prime target for cyber-attacks. IoT botnet attacks usually have a greater sensitivity to the consequences that might result from launching other attacks such as DDoS attacks and dissemination of sensitive information. For botnet detection in the IoT environment, deep learning mechanisms have emerged. But processing high-dimensional data is difficult, and it adversely affects DL-based botnet detection systems. Various dimensionality reduction methods have been proposed by researchers to address this concern. The purpose of this study is to examine and compare current mainstream dimensionality reduction methods. This will enable us to understand how reducing the number of features may lead to higher classification accuracy. Extensive tests are conducted on the NBaIoT dataset to verify the viability of PCA and auto encoder dimensionality reduction strategies. Results show that Auto encoder algorithm outperform PCA dimensionality reduction methods by the accuracy of 95.02%.","PeriodicalId":330870,"journal":{"name":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132519857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Issue Tracking Systems using Deep Learning-based Issue Classification 使用基于深度学习的问题分类优化问题跟踪系统
Nimish Samant, Heramba Limaye, Anurag Bapat, Shraddha S. Shinde, Amit K. Nerurkar
This research paper aims to investigate the use of text classification for automatic issue tagging in issue-tracking systems. The study focuses on the current state of issue-tracking systems and their limitations in terms of issue tagging, specifically the manual effort required to tag and categorize issues. The research describes the implementation of a text classification model for automatic issue tagging and evaluates its performance in terms of accuracy and loss. The results of this study show that the use of text classification can significantly improve the efficiency and accuracy of issue tagging in issue-tracking systems, while also providing a more efficient and user-friendly experience. The results also provide valuable insights into the design and implementation of issue-tracking systems and demonstrates the potential of deep learning to enhance the accuracy and efficiency of issue-tracking. This research also provides insights for software development teams and managers on how to use text classification techniques to improve the efficiency and effectiveness of their issue-tracking systems.
本研究旨在探讨在议题追踪系统中使用文本分类来自动标示议题。本研究的重点是问题跟踪系统的当前状态及其在问题标记方面的局限性,特别是标记和分类问题所需的手工工作。本文描述了一种用于自动问题标注的文本分类模型的实现,并对其准确率和丢失率进行了评价。本研究结果表明,使用文本分类可以显著提高问题跟踪系统中问题标注的效率和准确性,同时也提供了更高效和用户友好的体验。研究结果还为问题跟踪系统的设计和实现提供了有价值的见解,并展示了深度学习在提高问题跟踪的准确性和效率方面的潜力。这项研究还为软件开发团队和管理人员提供了如何使用文本分类技术来提高问题跟踪系统的效率和有效性的见解。
{"title":"Optimizing Issue Tracking Systems using Deep Learning-based Issue Classification","authors":"Nimish Samant, Heramba Limaye, Anurag Bapat, Shraddha S. Shinde, Amit K. Nerurkar","doi":"10.1109/PCEMS58491.2023.10136114","DOIUrl":"https://doi.org/10.1109/PCEMS58491.2023.10136114","url":null,"abstract":"This research paper aims to investigate the use of text classification for automatic issue tagging in issue-tracking systems. The study focuses on the current state of issue-tracking systems and their limitations in terms of issue tagging, specifically the manual effort required to tag and categorize issues. The research describes the implementation of a text classification model for automatic issue tagging and evaluates its performance in terms of accuracy and loss. The results of this study show that the use of text classification can significantly improve the efficiency and accuracy of issue tagging in issue-tracking systems, while also providing a more efficient and user-friendly experience. The results also provide valuable insights into the design and implementation of issue-tracking systems and demonstrates the potential of deep learning to enhance the accuracy and efficiency of issue-tracking. This research also provides insights for software development teams and managers on how to use text classification techniques to improve the efficiency and effectiveness of their issue-tracking systems.","PeriodicalId":330870,"journal":{"name":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128445288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Gate All Around Architecture in Polarity Based TFET with RF/Analog Analysis 栅极环绕结构对极性TFET的影响及射频/模拟分析
Chithraja Rajan, Priya Suman, B. Neole, Jyoti Patel
In today’s scenario, a versatile device to minimise power consumption in resource constraint IoT applications are on high demand. Focusing this, we demonstrate a nanowire TFET device comprising of a gate all around structure for better gate controllability and hetero dielectric as gate oxide. Presented high-k oxide at source side provides a high ON-current i.e. 4.28× 1$0^{-5}$A/$mu$m and threshold voltage i.e. 0.3 V, which follows ITRS norms for low power devices. Additionally, instead of fundamental doped device, polarity-based concept is incorporated to provide immunity against RDFs and RF analysis is performed to judge its capability for wireless communication and RFIC applications; in which high cutoff frequency of 0.6 PHz and GBP of 60 THz are effectively obtained. Along with this, a high switching speed is also obtained, which is very much preferable for digital as well as analog applications.
在当今的场景中,在资源受限的物联网应用中,一种能够最大限度地减少功耗的多功能设备需求很高。针对这一点,我们展示了一种纳米线ttfet器件,该器件由栅极全绕结构组成,具有更好的栅极可控性和异质介质作为栅极氧化物。源侧高k氧化物提供高导通电流,即4.28× 1$0^{-5}$ a /$mu$m,阈值电压为0.3 V,符合低功率器件的ITRS规范。此外,采用基于极性的概念代替基元掺杂器件来提供对rdf的免疫,并进行RF分析以判断其在无线通信和RFIC应用中的能力;有效地获得了0.6 PHz的高截止频率和60 THz的GBP。与此同时,还获得了高开关速度,这对于数字和模拟应用都是非常可取的。
{"title":"Impact of Gate All Around Architecture in Polarity Based TFET with RF/Analog Analysis","authors":"Chithraja Rajan, Priya Suman, B. Neole, Jyoti Patel","doi":"10.1109/PCEMS58491.2023.10136086","DOIUrl":"https://doi.org/10.1109/PCEMS58491.2023.10136086","url":null,"abstract":"In today’s scenario, a versatile device to minimise power consumption in resource constraint IoT applications are on high demand. Focusing this, we demonstrate a nanowire TFET device comprising of a gate all around structure for better gate controllability and hetero dielectric as gate oxide. Presented high-k oxide at source side provides a high ON-current i.e. 4.28× 1$0^{-5}$A/$mu$m and threshold voltage i.e. 0.3 V, which follows ITRS norms for low power devices. Additionally, instead of fundamental doped device, polarity-based concept is incorporated to provide immunity against RDFs and RF analysis is performed to judge its capability for wireless communication and RFIC applications; in which high cutoff frequency of 0.6 PHz and GBP of 60 THz are effectively obtained. Along with this, a high switching speed is also obtained, which is very much preferable for digital as well as analog applications.","PeriodicalId":330870,"journal":{"name":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131878416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AIOIML: Automatic Integration of Ontologies for IoT Domain Using Hybridized Machine Learning Techniques 基于混合机器学习技术的物联网领域本体自动集成
Rishi Rakesh Shrivastava, G. Deepak
There is a need for Ontology modelling and automatic generation of Ontologies in order to assimilate knowledge World Wide Web knowledge as a strategic model. Ontologies are the best knowledge descriptor model as they have some amount of human cognition associated with them because either humans are major contributors when they are generated manually or are indirect contributors when they are semi automatically generated. Internet of Things is a domain which has strategically evolved in the last few years, and there is a need for integrating several facets of Internet of Things Ontology. In this paper a strategic scheme for Internet of Things Ontology integration for Internet of Things domain with different perspective are proposed wherein the dataset are subjected to tag generation which is further classified using the AdaBoost classifier which are aligned with the random core classes of the existing variational Ontologies in the Internet of Things domain using Shannon’s entropy and the pointwise mutual information measure with differential step deviation measure. Which yields average precision and recall of 96.83 and 97.95 respectively.
为了将万维网知识作为一种战略模型来吸收,需要本体建模和本体的自动生成。本体是最好的知识描述符模型,因为它们与一定数量的人类认知相关联,因为当它们手动生成时,人类是主要贡献者,而当它们半自动生成时,人类是间接贡献者。物联网是近年来战略性发展的一个领域,物联网本体的多个方面需要进行整合。本文提出了一种面向不同视角的物联网领域的物联网本体集成策略方案,该方案首先对数据集进行标签生成,然后使用AdaBoost分类器对数据集进行分类,该分类器与物联网领域现有变分本体的随机核心类对齐,利用香农熵和点向互信息度量与差阶偏差度量对数据集进行分类。平均查准率为96.83,查全率为97.95。
{"title":"AIOIML: Automatic Integration of Ontologies for IoT Domain Using Hybridized Machine Learning Techniques","authors":"Rishi Rakesh Shrivastava, G. Deepak","doi":"10.1109/PCEMS58491.2023.10136071","DOIUrl":"https://doi.org/10.1109/PCEMS58491.2023.10136071","url":null,"abstract":"There is a need for Ontology modelling and automatic generation of Ontologies in order to assimilate knowledge World Wide Web knowledge as a strategic model. Ontologies are the best knowledge descriptor model as they have some amount of human cognition associated with them because either humans are major contributors when they are generated manually or are indirect contributors when they are semi automatically generated. Internet of Things is a domain which has strategically evolved in the last few years, and there is a need for integrating several facets of Internet of Things Ontology. In this paper a strategic scheme for Internet of Things Ontology integration for Internet of Things domain with different perspective are proposed wherein the dataset are subjected to tag generation which is further classified using the AdaBoost classifier which are aligned with the random core classes of the existing variational Ontologies in the Internet of Things domain using Shannon’s entropy and the pointwise mutual information measure with differential step deviation measure. Which yields average precision and recall of 96.83 and 97.95 respectively.","PeriodicalId":330870,"journal":{"name":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124569097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Log Analysis(OLA) for Malicious User Activities 针对恶意用户活动的在线日志分析
Poongkuyil Muse, M. S., Hamil Stanly
Efficient log analysis involves collecting, evaluating, and managing raw data from computer-generated records. As security vulnerabilities increase, the analysis of logs has become vital and crucial in multidisciplinary domains. Maintaining and analyzing the log is a pivotal part of every organization as tons of logs are generated every millisecond. However, anomaly detection and log parsing addressed so far, rely on a time-consuming training algorithm based on a Machine Learning framework. The proposed method detects anomalies from real-time data generated from the data centre without the need for a training algorithm. Detection and visualization of malicious activities are done by Elasticsearch, Logstash, and Kibana (ELK) framework. The process of shipping, parsing, indexing, and anomaly detection is carried out using an unsupervised machine learning algorithm which gives a clear inference to detect bots and perform unique log session classification. A real-time Apache HTTP Server log is accessed and anomalous behavior is identified based on the incoming requests. Experiments on real-time data show that 13.76% of anomalies are detected on per weekly basis.
有效的日志分析包括从计算机生成的记录中收集、评估和管理原始数据。随着安全漏洞的增加,日志分析在多学科领域变得至关重要。维护和分析日志是每个组织的关键部分,因为每毫秒都会生成大量日志。然而,迄今为止解决的异常检测和日志解析依赖于基于机器学习框架的耗时训练算法。该方法在不需要训练算法的情况下,从数据中心生成的实时数据中检测异常。恶意活动的检测和可视化是由Elasticsearch、Logstash和Kibana (ELK)框架完成的。发送、解析、索引和异常检测的过程使用无监督机器学习算法进行,该算法给出了一个明确的推断来检测机器人并执行唯一的日志会话分类。访问实时Apache HTTP服务器日志,并根据传入请求识别异常行为。对实时数据的实验表明,每周检测到的异常率为13.76%。
{"title":"Online Log Analysis(OLA) for Malicious User Activities","authors":"Poongkuyil Muse, M. S., Hamil Stanly","doi":"10.1109/PCEMS58491.2023.10136101","DOIUrl":"https://doi.org/10.1109/PCEMS58491.2023.10136101","url":null,"abstract":"Efficient log analysis involves collecting, evaluating, and managing raw data from computer-generated records. As security vulnerabilities increase, the analysis of logs has become vital and crucial in multidisciplinary domains. Maintaining and analyzing the log is a pivotal part of every organization as tons of logs are generated every millisecond. However, anomaly detection and log parsing addressed so far, rely on a time-consuming training algorithm based on a Machine Learning framework. The proposed method detects anomalies from real-time data generated from the data centre without the need for a training algorithm. Detection and visualization of malicious activities are done by Elasticsearch, Logstash, and Kibana (ELK) framework. The process of shipping, parsing, indexing, and anomaly detection is carried out using an unsupervised machine learning algorithm which gives a clear inference to detect bots and perform unique log session classification. A real-time Apache HTTP Server log is accessed and anomalous behavior is identified based on the incoming requests. Experiments on real-time data show that 13.76% of anomalies are detected on per weekly basis.","PeriodicalId":330870,"journal":{"name":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128439337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Memory Decoder for SRAM Based AI Accelerator 基于SRAM的AI加速器节能存储器解码器
Biby Joseph, Gopireddy Chaithanyakumar Reddy, R. Kavitha
Address decoders play a vital role in Static Random-Access Memory (SRAM) memory array architecture to fetch the data in less span of time. As compared to other memory devices, SRAM based Artificial Intelligence (AI) accelerator possess high speed in which memory array address decoder plays a vital role. As a result, the address decoder is the key element for SRAM performance. In this paper, an energy efficient address decoder with low power dissipation is proposed, which can be used for SRAM based AI accelerator. Major part of power consumption of memory chip depends on address decoders. As we go down from higher technology nodes to lower technology nodes, leakage power increases which results in total power consumption. Source biasing technique is used to reduce static power consumption. This paper compares the proposed Address decoder in UMC 65nm technology with existing architectures in terms of power, delay and energy. This decoder design has an improvement of 85.8% average power and 87.46% energy as compared with existing conventional 6-64 decoder circuit using pre-decoding methodology.
地址解码器在静态随机存取存储器(SRAM)存储阵列体系结构中起着至关重要的作用,它能在较短的时间内获取数据。与其他存储器件相比,基于SRAM的人工智能加速器具有很高的速度,其中存储器阵列地址解码器起着至关重要的作用。因此,地址解码器是SRAM性能的关键因素。本文提出了一种低功耗的节能地址解码器,可用于基于SRAM的人工智能加速器。存储芯片的主要功耗是地址解码器。当我们从高技术节点下降到低技术节点时,泄漏功率增加,导致总功耗增加。采用源偏置技术降低静态功耗。本文从功耗、延迟和能耗等方面比较了所提出的UMC 65nm技术的地址解码器与现有架构。与采用预解码方法的传统6-64译码电路相比,该译码电路的平均功率提高了85.8%,能量提高了87.46%。
{"title":"Energy Efficient Memory Decoder for SRAM Based AI Accelerator","authors":"Biby Joseph, Gopireddy Chaithanyakumar Reddy, R. Kavitha","doi":"10.1109/PCEMS58491.2023.10136095","DOIUrl":"https://doi.org/10.1109/PCEMS58491.2023.10136095","url":null,"abstract":"Address decoders play a vital role in Static Random-Access Memory (SRAM) memory array architecture to fetch the data in less span of time. As compared to other memory devices, SRAM based Artificial Intelligence (AI) accelerator possess high speed in which memory array address decoder plays a vital role. As a result, the address decoder is the key element for SRAM performance. In this paper, an energy efficient address decoder with low power dissipation is proposed, which can be used for SRAM based AI accelerator. Major part of power consumption of memory chip depends on address decoders. As we go down from higher technology nodes to lower technology nodes, leakage power increases which results in total power consumption. Source biasing technique is used to reduce static power consumption. This paper compares the proposed Address decoder in UMC 65nm technology with existing architectures in terms of power, delay and energy. This decoder design has an improvement of 85.8% average power and 87.46% energy as compared with existing conventional 6-64 decoder circuit using pre-decoding methodology.","PeriodicalId":330870,"journal":{"name":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","volume":"449 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115931360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing Image Denoising Performance through a Family of Algorithms 通过一系列算法增强图像去噪性能
Omkar Gupta, Irika Nikhita Kalapala, K. Bhurchandi
Images are an integral and indispensable aspect of various disciplines, such as medicine, surveillance, and the entertainment industry. However, the quality of images can be severely compromised by the presence of sensor noise, quantization errors, or transmission errors. This research proposes a novel approach that combines wavelet thresholding and BM3D (Block-Matching and 3D Filtering) techniques for effective image denoising.The efficacy of the methodologies is evaluated and compared to cutting-edge denoising techniques, demonstrating superior performance in both quantitative metrics and visual quality. Furthermore, the study delves into the intricate mechanisms underlying the denoising process and the impact of various parameters on the denoising performance, contributing significantly to the field of image denoising.
图像是医学、监控和娱乐行业等各个学科不可或缺的组成部分。然而,图像的质量可以严重损害传感器噪声,量化误差,或传输误差的存在。本研究提出了一种结合小波阈值和BM3D(块匹配和3D滤波)技术的有效图像去噪方法。评估了方法的有效性,并将其与先进的去噪技术进行了比较,证明了在定量指标和视觉质量方面的卓越性能。此外,该研究还深入探讨了去噪过程的复杂机制以及各种参数对去噪性能的影响,为图像去噪领域做出了重要贡献。
{"title":"Enhancing Image Denoising Performance through a Family of Algorithms","authors":"Omkar Gupta, Irika Nikhita Kalapala, K. Bhurchandi","doi":"10.1109/PCEMS58491.2023.10136117","DOIUrl":"https://doi.org/10.1109/PCEMS58491.2023.10136117","url":null,"abstract":"Images are an integral and indispensable aspect of various disciplines, such as medicine, surveillance, and the entertainment industry. However, the quality of images can be severely compromised by the presence of sensor noise, quantization errors, or transmission errors. This research proposes a novel approach that combines wavelet thresholding and BM3D (Block-Matching and 3D Filtering) techniques for effective image denoising.The efficacy of the methodologies is evaluated and compared to cutting-edge denoising techniques, demonstrating superior performance in both quantitative metrics and visual quality. Furthermore, the study delves into the intricate mechanisms underlying the denoising process and the impact of various parameters on the denoising performance, contributing significantly to the field of image denoising.","PeriodicalId":330870,"journal":{"name":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116415609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stratification of Hacker Forums and Predicting Cyber Assaults for Proactive Cyber Threat Intelligence 面向前瞻性网络威胁情报的黑客论坛分层与网络攻击预测
Bhavesh Dhake, C. Shetye, Pratik Borhade, Devish Gawas, Amit K. Nerurkar
Cyber hazards have emerged as a significant cause of worry for society. Firms are beginning to invest heavily in developing Cyber Threat Intelligence in recent years in order to combat the rising threat of cyber-attacks (CTI). Predominantly, many businesses gathered and analyzed data from internal log files, leading in reactive CTI, which is essentially a data-driven process. The internet hacker community may provide significant proactive CTI value by alerting enterprises about risks that they were previously unaware of. Forums, more than any other platform, give the most metadata, data persistence, and tens of thousands of publicly available Tools, Techniques, and Procedures. Anticrawling techniques, including as authentication, throttling, and obfuscation, are commonly employed in forums. This study intends to create a unique web crawler, as well as use machine learning and deep learning approaches with neural networks to automatically categorize hacker forum data into predetermined categories and anticipate probable future cyber risks for proactive and timely CTI.
网络危害已经成为社会担忧的一个重要原因。近年来,企业开始大力投资开发网络威胁情报,以应对日益增长的网络攻击威胁(CTI)。主要是,许多企业从内部日志文件中收集和分析数据,导致被动CTI,这本质上是一个数据驱动的过程。互联网黑客社区可以通过提醒企业注意他们以前没有意识到的风险来提供重要的主动CTI价值。与其他平台相比,论坛提供了最多的元数据、数据持久性以及成千上万的公开可用的工具、技术和过程。防爬行技术,包括身份验证、节流和混淆,通常在论坛中使用。本研究旨在创建一个独特的网络爬虫,并使用机器学习和深度学习方法与神经网络自动将黑客论坛数据分类为预定类别,并预测未来可能的网络风险,以便主动和及时地进行CTI。
{"title":"Stratification of Hacker Forums and Predicting Cyber Assaults for Proactive Cyber Threat Intelligence","authors":"Bhavesh Dhake, C. Shetye, Pratik Borhade, Devish Gawas, Amit K. Nerurkar","doi":"10.1109/PCEMS58491.2023.10136033","DOIUrl":"https://doi.org/10.1109/PCEMS58491.2023.10136033","url":null,"abstract":"Cyber hazards have emerged as a significant cause of worry for society. Firms are beginning to invest heavily in developing Cyber Threat Intelligence in recent years in order to combat the rising threat of cyber-attacks (CTI). Predominantly, many businesses gathered and analyzed data from internal log files, leading in reactive CTI, which is essentially a data-driven process. The internet hacker community may provide significant proactive CTI value by alerting enterprises about risks that they were previously unaware of. Forums, more than any other platform, give the most metadata, data persistence, and tens of thousands of publicly available Tools, Techniques, and Procedures. Anticrawling techniques, including as authentication, throttling, and obfuscation, are commonly employed in forums. This study intends to create a unique web crawler, as well as use machine learning and deep learning approaches with neural networks to automatically categorize hacker forum data into predetermined categories and anticipate probable future cyber risks for proactive and timely CTI.","PeriodicalId":330870,"journal":{"name":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115589556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1