首页 > 最新文献

2023 Second International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)最新文献

英文 中文
Object Detection and Classification of Hyperspectral Images Using K-NN 基于K-NN的高光谱图像目标检测与分类
Bhavatarini N, Akash B N, A. R. Avinash, Akshay H M
This Object detection and classification using Hyperspectral images is a critical aspect of remote sensing and computer vision. This technology involves identifying objects of interest within an image and classifying them based on their spectral signatures. Hyperspectral imaging provides a more detailed representation of objects compared to traditional color images, enabling more precise classification. The increased accuracy and reliability provided by this technology make it useful in a range of applications, such as environmental monitoring, military surveillance, and agriculture. However, object detection and classification in hyperspectral images can be challenging due to the large size of the data and the complexity of the algorithms involved. Nevertheless, ongoing research in this area continues to improve the performance of object detection and classification using hyperspectral images. In this paper, we are utilizing the K-Nearest Neighbor algorithm as part of the research work to determine the accuracy of our model.
利用高光谱图像进行目标检测和分类是遥感和计算机视觉的一个重要方面。这项技术包括识别图像中感兴趣的物体,并根据它们的光谱特征对它们进行分类。与传统的彩色图像相比,高光谱成像提供了更详细的物体表示,实现了更精确的分类。该技术提供的更高的准确性和可靠性使其在环境监测,军事监视和农业等一系列应用中非常有用。然而,高光谱图像中的目标检测和分类可能具有挑战性,因为数据量大,所涉及的算法复杂。尽管如此,该领域正在进行的研究继续提高使用高光谱图像的目标检测和分类的性能。在本文中,我们利用k近邻算法作为研究工作的一部分来确定我们模型的准确性。
{"title":"Object Detection and Classification of Hyperspectral Images Using K-NN","authors":"Bhavatarini N, Akash B N, A. R. Avinash, Akshay H M","doi":"10.1109/ICEEICT56924.2023.10157645","DOIUrl":"https://doi.org/10.1109/ICEEICT56924.2023.10157645","url":null,"abstract":"This Object detection and classification using Hyperspectral images is a critical aspect of remote sensing and computer vision. This technology involves identifying objects of interest within an image and classifying them based on their spectral signatures. Hyperspectral imaging provides a more detailed representation of objects compared to traditional color images, enabling more precise classification. The increased accuracy and reliability provided by this technology make it useful in a range of applications, such as environmental monitoring, military surveillance, and agriculture. However, object detection and classification in hyperspectral images can be challenging due to the large size of the data and the complexity of the algorithms involved. Nevertheless, ongoing research in this area continues to improve the performance of object detection and classification using hyperspectral images. In this paper, we are utilizing the K-Nearest Neighbor algorithm as part of the research work to determine the accuracy of our model.","PeriodicalId":345324,"journal":{"name":"2023 Second International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133780652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Frequency Optimization in Solar PV Systems Using VI-based Synchronous Inverters with ADP Controller 基于ADP控制器的同步逆变器在太阳能光伏系统中的频率优化
Mukul Sharma, Bharti Koul
This paper proposes an alternate method of opt-mization approach for solar photovoltaic (PV) systems using VI- based synchronous inverters with adaptive dynamic programming controllers. The goal is to enhance the performance of the Grid-connected PV system. A synchronous inverter that is based on VI is used in order to transform the direct current (DC) electricity that is produced by the photovoltaic panels into alternating current (AC) power suitable for use in households or for feeding back into the grid. The adaptive dynamic programming controller is used for the purpose of achieving optimum performance from the inverter and the PV system, taking into account the dynamic behavior of the system and the varying environmental conditions. The proposed approach is evaluated using simulation studies, and the results show that it can significantly improve the performance of the PV system. The approach has the potential to make solar energy more competitive in the market when compared to more traditional electric power sources.
本文提出了一种基于自适应动态规划控制器的同步逆变器优化太阳能光伏系统的方法。目标是提高并网光伏系统的性能。使用基于VI的同步逆变器,将光伏板产生的直流电(DC)转换为适合家庭使用或反馈到电网的交流电(AC)。考虑到系统的动态行为和变化的环境条件,采用自适应动态规划控制器使逆变器和光伏系统的性能达到最优。通过仿真研究对该方法进行了评估,结果表明该方法可以显著提高光伏系统的性能。与更传统的电力来源相比,这种方法有可能使太阳能在市场上更具竞争力。
{"title":"Frequency Optimization in Solar PV Systems Using VI-based Synchronous Inverters with ADP Controller","authors":"Mukul Sharma, Bharti Koul","doi":"10.1109/ICEEICT56924.2023.10157272","DOIUrl":"https://doi.org/10.1109/ICEEICT56924.2023.10157272","url":null,"abstract":"This paper proposes an alternate method of opt-mization approach for solar photovoltaic (PV) systems using VI- based synchronous inverters with adaptive dynamic programming controllers. The goal is to enhance the performance of the Grid-connected PV system. A synchronous inverter that is based on VI is used in order to transform the direct current (DC) electricity that is produced by the photovoltaic panels into alternating current (AC) power suitable for use in households or for feeding back into the grid. The adaptive dynamic programming controller is used for the purpose of achieving optimum performance from the inverter and the PV system, taking into account the dynamic behavior of the system and the varying environmental conditions. The proposed approach is evaluated using simulation studies, and the results show that it can significantly improve the performance of the PV system. The approach has the potential to make solar energy more competitive in the market when compared to more traditional electric power sources.","PeriodicalId":345324,"journal":{"name":"2023 Second International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"45 14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114818911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PVT-variation based Comparative Analysis of Write Driver Designs for SRAM at 32 nm 基于pvt变化的32nm SRAM写入驱动设计比较分析
Monica Gupta, Manisha, R. Jha, Ruchika Kumari, Ankit Singh
In this paper, the existing write driver designs for SRAM are analyzed at 32 nm technology node. The performance of the designs are compared on the basis of Write Delay, Write Power consumption, Energy per Switching activity and Complexity of the design. The simulations are also done under PVT-variations to observe the impact of different operating conditions on the performance of the design. From the results, it is observed that the NOR gate based design performs fastest write operation with up to 9 % improvement in Write Delay. The Pass gate based design consumes least Write Power and Energy per Switching activity with up to 55.9 % and 51.5 % reduction respectively at TT corner, 1.1 V, 27 °C. In addition, the results show that the Write Delay of all the designs suffer at SF corner, low supply voltage and low temperatures. Alternatively, the designs perform faster write operation at FS corner, high supply voltages and high temperatures. The Write Power consumption is minimum at SS corner, low supply voltages and high temperatures and maximum at FF corner, high supply voltages and high temperatures. The Energy consumed per Switching activity is least at SS corner, low supply voltages and high temperatures.
本文分析了现有的32nm节点SRAM写入驱动设计。从写时延、写功耗、每开关活动能量和设计复杂度等方面比较了两种设计的性能。在pvt变化条件下进行仿真,观察不同工况对设计性能的影响。从结果中可以看出,基于NOR门的设计执行最快的写操作,写延迟提高了9%。在TT角,1.1 V, 27°C时,基于通栅极的设计消耗的每个开关活动的写功率和能量分别降低55.9%和51.5%。此外,在SF角、低电源电压和低温条件下,所有设计的写入延迟都受到影响。另外,该设计在FS角、高电源电压和高温下执行更快的写入操作。写功耗在SS角、低电压和高温时最小,在FF角、高电压和高温时最大。在SS角、低电压和高温条件下,每开关活动所消耗的能量最少。
{"title":"PVT-variation based Comparative Analysis of Write Driver Designs for SRAM at 32 nm","authors":"Monica Gupta, Manisha, R. Jha, Ruchika Kumari, Ankit Singh","doi":"10.1109/ICEEICT56924.2023.10157756","DOIUrl":"https://doi.org/10.1109/ICEEICT56924.2023.10157756","url":null,"abstract":"In this paper, the existing write driver designs for SRAM are analyzed at 32 nm technology node. The performance of the designs are compared on the basis of Write Delay, Write Power consumption, Energy per Switching activity and Complexity of the design. The simulations are also done under PVT-variations to observe the impact of different operating conditions on the performance of the design. From the results, it is observed that the NOR gate based design performs fastest write operation with up to 9 % improvement in Write Delay. The Pass gate based design consumes least Write Power and Energy per Switching activity with up to 55.9 % and 51.5 % reduction respectively at TT corner, 1.1 V, 27 °C. In addition, the results show that the Write Delay of all the designs suffer at SF corner, low supply voltage and low temperatures. Alternatively, the designs perform faster write operation at FS corner, high supply voltages and high temperatures. The Write Power consumption is minimum at SS corner, low supply voltages and high temperatures and maximum at FF corner, high supply voltages and high temperatures. The Energy consumed per Switching activity is least at SS corner, low supply voltages and high temperatures.","PeriodicalId":345324,"journal":{"name":"2023 Second International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114642492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi Agent Deep Reinforcement learning with Deep Q-Network based energy efficiency and resource allocation in NOMA wireless Systems 基于深度q网络的多智能体深度强化学习在NOMA无线系统中的能量效率和资源分配
K. R. Chandra, Somasekhar Borugadda
In recent years, there has been an increase in demand for wireless cellular networks to have higher capacity. Operating costs have increased because operators use more energy to build new cell sites or boost the transmission power at existing locations to satisfy demand. Since energy costs are so high, lowering them must be a top goal. Non-orthogonal multiple access (NOMA), which has increased efficiency, has become a practical multiple access technique in wireless network construction. To improve energy efficiency and reduce power consumption, this paper proposes a Deep Q-Network policy with a novel power allocation method for NOMA-enabled network devices. The Multi-Agent Deep Reinforcement Learning (MADRL) with Deep Q-Network (DQN) model is presented for simultaneous wireless information and power transfer in NOMA-enabled devices. We investigate ways to increase the total transmission rate simultaneously and collect energy while meeting each NOMA system's minimum transmission rate and harvested energy requirements using the power splitting (PS) approach. To create an objective function, combine the transmission rates from information decoding with the transformed throughput from energy harvesting. We investigate wireless network development delays and dynamic energy-efficient resource allocation. We develop the resource allocation (i.e., time allocation and power control) problem as a dynamic stochastic optimization model that maximizes system energy efficiency (EE) while simultaneously satisfying a certain quality of service (QoS) in terms of delay. While ensuring throughput and fairness, MADRL-DQN enables the system to maximize energy efficiency; DQN allows energy savings by reducing the number of resources assigned to a user when signal traffic transmission dominates energy utilization. Compared to the methods already in use, the simulation results demonstrated the effectiveness of the proposed MADRL-DQN resource allocation algorithm.
近年来,对具有更高容量的无线蜂窝网络的需求有所增加。运营成本增加了,因为运营商需要更多的能源来建设新的蜂窝基站或提高现有基站的传输功率以满足需求。由于能源成本如此之高,降低成本必须成为首要目标。非正交多址(NOMA)技术提高了效率,已成为无线网络建设中一种实用的多址技术。为了提高能源效率和降低功耗,本文提出了一种具有新颖功率分配方法的深度Q-Network策略,用于支持noma的网络设备。提出了基于深度q -网络的多智能体深度强化学习(MADRL)模型,用于支持noma的设备中同时进行无线信息和电力传输。我们研究了使用功率分割(PS)方法同时提高总传输速率和收集能量的方法,同时满足每个NOMA系统的最小传输速率和收集能量的需求。为了创建一个目标函数,将信息解码的传输速率与能量收集的转换吞吐量结合起来。我们研究无线网络开发延迟和动态节能资源分配。我们将资源分配(即时间分配和功率控制)问题发展为一个动态随机优化模型,该模型在满足一定延迟服务质量(QoS)的同时最大化系统能源效率(EE)。在确保吞吐量和公平性的同时,MADRL-DQN使系统能够最大限度地提高能源效率;DQN通过减少分配给用户的资源数量来节省能源,当信号流量传输占能源利用的主导地位时。通过与已有方法的比较,仿真结果验证了MADRL-DQN资源分配算法的有效性。
{"title":"Multi Agent Deep Reinforcement learning with Deep Q-Network based energy efficiency and resource allocation in NOMA wireless Systems","authors":"K. R. Chandra, Somasekhar Borugadda","doi":"10.1109/ICEEICT56924.2023.10157052","DOIUrl":"https://doi.org/10.1109/ICEEICT56924.2023.10157052","url":null,"abstract":"In recent years, there has been an increase in demand for wireless cellular networks to have higher capacity. Operating costs have increased because operators use more energy to build new cell sites or boost the transmission power at existing locations to satisfy demand. Since energy costs are so high, lowering them must be a top goal. Non-orthogonal multiple access (NOMA), which has increased efficiency, has become a practical multiple access technique in wireless network construction. To improve energy efficiency and reduce power consumption, this paper proposes a Deep Q-Network policy with a novel power allocation method for NOMA-enabled network devices. The Multi-Agent Deep Reinforcement Learning (MADRL) with Deep Q-Network (DQN) model is presented for simultaneous wireless information and power transfer in NOMA-enabled devices. We investigate ways to increase the total transmission rate simultaneously and collect energy while meeting each NOMA system's minimum transmission rate and harvested energy requirements using the power splitting (PS) approach. To create an objective function, combine the transmission rates from information decoding with the transformed throughput from energy harvesting. We investigate wireless network development delays and dynamic energy-efficient resource allocation. We develop the resource allocation (i.e., time allocation and power control) problem as a dynamic stochastic optimization model that maximizes system energy efficiency (EE) while simultaneously satisfying a certain quality of service (QoS) in terms of delay. While ensuring throughput and fairness, MADRL-DQN enables the system to maximize energy efficiency; DQN allows energy savings by reducing the number of resources assigned to a user when signal traffic transmission dominates energy utilization. Compared to the methods already in use, the simulation results demonstrated the effectiveness of the proposed MADRL-DQN resource allocation algorithm.","PeriodicalId":345324,"journal":{"name":"2023 Second International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123684152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Objective Full-Reference Image Assessment Metrics for Estimating the Quality of Remote Sensing Images 目的建立遥感影像质量评价的全参考影像评价指标
R. Maruthi, P. Anusha, P. Sankar, K. Thiyagaragan
Image Quality (IQ) assessment is a very complex task and it is extremely important to evaluate the images with the metrics. The metrics applied can be a full reference, partial reference or no-reference metric and it depends on the application and availability of the ground truth. Most of the IQ metrics are developed by considering the Visual System (VS) of humans. The assessment methods studied in this paper focuses on some of the Full-Reference (FR) measures and it is used to estimate the remote sensing noisy images. The effectiveness of the measures demonstrates a considerable outcome and demonstrates how well the noisy remote sensing images are being quantified.
图像质量(IQ)评估是一项非常复杂的任务,使用指标对图像进行评估是非常重要的。应用的度量可以是全参考、部分参考或无参考度量,它取决于基础真值的应用和可用性。大多数智商指标都是通过考虑人类的视觉系统(VS)来开发的。本文研究的评价方法主要集中在一些全参考测度上,并将其用于遥感噪声图像的评价。这些措施的有效性证明了相当大的结果,并证明了噪声遥感图像的量化是多么好。
{"title":"Objective Full-Reference Image Assessment Metrics for Estimating the Quality of Remote Sensing Images","authors":"R. Maruthi, P. Anusha, P. Sankar, K. Thiyagaragan","doi":"10.1109/ICEEICT56924.2023.10157402","DOIUrl":"https://doi.org/10.1109/ICEEICT56924.2023.10157402","url":null,"abstract":"Image Quality (IQ) assessment is a very complex task and it is extremely important to evaluate the images with the metrics. The metrics applied can be a full reference, partial reference or no-reference metric and it depends on the application and availability of the ground truth. Most of the IQ metrics are developed by considering the Visual System (VS) of humans. The assessment methods studied in this paper focuses on some of the Full-Reference (FR) measures and it is used to estimate the remote sensing noisy images. The effectiveness of the measures demonstrates a considerable outcome and demonstrates how well the noisy remote sensing images are being quantified.","PeriodicalId":345324,"journal":{"name":"2023 Second International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127337963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transformer Models for Recognizing Abusive Language An investigation and review on Tweeteval and SOLID dataset 基于Tweeteval和SOLID数据集的辱骂性语言识别转换模型的研究与回顾
Fabeela Ali Rawther, Geevarghese Titus
Social engineering communities have become very popular among the kids and elderly alike. In this era of social media, the streaming of comments, opinions, reviews and communications is done via most common social media messaging communities like Twitter, Meta owned WhatsApp, FB and Instagram, Snapchat, telegram and YouTube comments. In this paper we perform a review on the different methods and models used to identify the offensive language using different datasets. Offensive language detection is a tedious task as it is country and language specific. The corpus used to identify the offensiveness and abusiveness is not covering all the word usages. We have done a comparison study of different methods on text to detect the post is offensive or not. The detection of abusive language is an unsolved and challenging problem to researchers in Natural Language Processing (NLP). This has led to be one of the reasons for increased level of mental instability among teenagers to elderly. The crime via social media has increased to a large value than older days. The study and surveys show that to recognize the structure and context of the language is the best way to solve this problem to an extent. The paper aims to four recent transformer models pretrained and fine-tuned for offensive language detection on the tweeteval dataset viz; DistilBERT, RoBERTa, DistilRoBERTa and DeBERTa. All the model had limitation in the performance based on the training data size used but are optimized by tuning hyper parameters during training. The models are limited to English language offensive words and recent works are going on in the area of multilingual tweets on both text and speech processing.
社会工程社区在孩子和老人中都很受欢迎。在这个社交媒体时代,评论、观点、评论和交流是通过最常见的社交媒体信息社区完成的,比如Twitter、Meta旗下的WhatsApp、FB和Instagram、Snapchat、telegram和YouTube评论。在本文中,我们对使用不同数据集识别攻击性语言的不同方法和模型进行了回顾。攻击性语言检测是一项繁琐的任务,因为它是特定于国家和语言的。用于识别冒犯性和辱骂性的语料库并没有涵盖所有的词汇用法。我们对不同的文本检测方法进行了对比研究。谩骂语言的检测一直是自然语言处理(NLP)领域的研究热点和难点。这是青少年到老年人精神不稳定程度增加的原因之一。通过社交媒体的犯罪比以前增加了很多。研究和调查表明,在一定程度上认识语言的结构和语境是解决这一问题的最佳途径。本文旨在对四种最新的变形模型进行预训练和微调,用于在twitter数据集上进行攻击性语言检测,即;蒸馏酒,罗伯塔,蒸馏酒罗伯塔和德伯塔。所有模型的性能都受到训练数据大小的限制,但在训练过程中通过调整超参数进行了优化。这些模型仅限于英语中的冒犯性词汇,最近在多语言推文的文本和语音处理领域正在进行研究。
{"title":"Transformer Models for Recognizing Abusive Language An investigation and review on Tweeteval and SOLID dataset","authors":"Fabeela Ali Rawther, Geevarghese Titus","doi":"10.1109/ICEEICT56924.2023.10157848","DOIUrl":"https://doi.org/10.1109/ICEEICT56924.2023.10157848","url":null,"abstract":"Social engineering communities have become very popular among the kids and elderly alike. In this era of social media, the streaming of comments, opinions, reviews and communications is done via most common social media messaging communities like Twitter, Meta owned WhatsApp, FB and Instagram, Snapchat, telegram and YouTube comments. In this paper we perform a review on the different methods and models used to identify the offensive language using different datasets. Offensive language detection is a tedious task as it is country and language specific. The corpus used to identify the offensiveness and abusiveness is not covering all the word usages. We have done a comparison study of different methods on text to detect the post is offensive or not. The detection of abusive language is an unsolved and challenging problem to researchers in Natural Language Processing (NLP). This has led to be one of the reasons for increased level of mental instability among teenagers to elderly. The crime via social media has increased to a large value than older days. The study and surveys show that to recognize the structure and context of the language is the best way to solve this problem to an extent. The paper aims to four recent transformer models pretrained and fine-tuned for offensive language detection on the tweeteval dataset viz; DistilBERT, RoBERTa, DistilRoBERTa and DeBERTa. All the model had limitation in the performance based on the training data size used but are optimized by tuning hyper parameters during training. The models are limited to English language offensive words and recent works are going on in the area of multilingual tweets on both text and speech processing.","PeriodicalId":345324,"journal":{"name":"2023 Second International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130162760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Deep Learning Method for Classification in Brain-Computer Interface 一种脑机接口分类的深度学习方法
Sanoj Chakkithara Subramanian, Daniel D
Neural activity is the controlling signal used in enabling BCI to have direct communication with a computer. An array of EEG signals aid in the selection of the neural signal. The feature extractors and classifiers have a specific pattern of EEG control for a given BCI protocol, which is tailor-made and limited to that specific signal. Although a single protocol is applied in the deep neural networks used in EEG-based brain-computer interfaces, which are being used in the feature extraction and classification of speech recognition and computer vision, it is unclear how these architectures find themselves generalized in other area and prototypes. The deep learning approach used in transferring knowledge acquired from the source tasks to the target tasks is called transfer learning. Conventional machine learning algorithms have been surpassed by deep neural networks while solving problems concerning the real world. However, the best deep neural networks were identified by considering the knowledge of the problem domain. A significant amount of time and computational resources have to be spent to validate this approach. This work presents a deep learning neural network architecture based on Visual Geometry Group Network (VGGNet), Residual Network (ResNet), and inception network methods. Experimental results show that the proposed method achieves better performance than other methods.
神经活动是用来使脑机接口与计算机直接通信的控制信号。一组脑电图信号有助于神经信号的选择。对于给定的BCI协议,特征提取器和分类器具有特定的EEG控制模式,该模式是量身定制的,仅限于特定的信号。尽管在基于脑电图的脑机接口中使用的深度神经网络中应用了单一协议,这些神经网络被用于语音识别和计算机视觉的特征提取和分类,但尚不清楚这些架构如何在其他领域和原型中得到推广。将从源任务获得的知识迁移到目标任务的深度学习方法称为迁移学习。在解决与现实世界有关的问题时,深度神经网络已经超越了传统的机器学习算法。然而,最好的深度神经网络是通过考虑问题域的知识来识别的。必须花费大量的时间和计算资源来验证这种方法。本文提出了一种基于视觉几何群网络(VGGNet)、残差网络(ResNet)和初始网络方法的深度学习神经网络架构。实验结果表明,该方法比其他方法具有更好的性能。
{"title":"A Deep Learning Method for Classification in Brain-Computer Interface","authors":"Sanoj Chakkithara Subramanian, Daniel D","doi":"10.1109/ICEEICT56924.2023.10157910","DOIUrl":"https://doi.org/10.1109/ICEEICT56924.2023.10157910","url":null,"abstract":"Neural activity is the controlling signal used in enabling BCI to have direct communication with a computer. An array of EEG signals aid in the selection of the neural signal. The feature extractors and classifiers have a specific pattern of EEG control for a given BCI protocol, which is tailor-made and limited to that specific signal. Although a single protocol is applied in the deep neural networks used in EEG-based brain-computer interfaces, which are being used in the feature extraction and classification of speech recognition and computer vision, it is unclear how these architectures find themselves generalized in other area and prototypes. The deep learning approach used in transferring knowledge acquired from the source tasks to the target tasks is called transfer learning. Conventional machine learning algorithms have been surpassed by deep neural networks while solving problems concerning the real world. However, the best deep neural networks were identified by considering the knowledge of the problem domain. A significant amount of time and computational resources have to be spent to validate this approach. This work presents a deep learning neural network architecture based on Visual Geometry Group Network (VGGNet), Residual Network (ResNet), and inception network methods. Experimental results show that the proposed method achieves better performance than other methods.","PeriodicalId":345324,"journal":{"name":"2023 Second International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"267 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128899161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Eavesdropping Attack Detection in UAVs using Ensemble Learning 基于集成学习的无人机窃听攻击检测
Krittika Das, Chayan Ghosh, Raja Karmakar
The use of Unmanned Aerial Vehicles (UAVs) is proliferated and is prone to cyber attacks. Eavesdropping attack is an active threat to the security of an UAV as attackers intercept the communication medium over the wireless communication networks and get access to sensitive information. An active eavesdropper infiltrates the system and attacks the UAV during authentication. It involves the unauthorized interception of communication signals between the UAV and its control system. This type of intrusion can have severe consequences, including loss of control over the UAV, theft, espionage, and sabotage. To maintain the privacy and security of UAV communications and to protect sensitive information from unauthorized access, the detection of eavesdropping is of utmost importance. For the detection of eavesdropping attacks, we build an ensemble learning model with supervised machine learning algorithms (Logistic Regression, Decision Tree, Random Forest, k-Nearest Neighbours and Support Vector Machine) and unsupervised learning methods (One Class Support Vector Machine and K-Means Clustering). By combining the predictions of multiple algorithms, ensemble learning enhances the security and privacy of UAV communication. Additionally, by pooling together the strengths of different algorithms, ensemble learning improves the overall robustness and resilience of the UAV communication system and is a beneficial approach for the detection of eavesdropping attack packets. To train our proposed model we use the Kitsune Network Attack dataset. From the results, it is observed that our ensemble learning approach is a valid stratagem and can be used to detect eavesdropping attacks on UAV.
无人驾驶飞行器(uav)的使用激增,容易受到网络攻击。窃听攻击是对无人机安全的一种主动威胁,攻击者通过无线通信网络拦截通信介质并获取敏感信息。主动窃听者渗透到系统中,在认证过程中攻击无人机。它涉及对无人机及其控制系统之间的通信信号进行未经授权的拦截。这种类型的入侵会产生严重的后果,包括失去对无人机的控制、盗窃、间谍活动和破坏活动。为了维护无人机通信的隐私和安全,保护敏感信息不受未经授权的访问,窃听检测至关重要。为了检测窃听攻击,我们使用监督机器学习算法(逻辑回归、决策树、随机森林、k近邻和支持向量机)和无监督学习方法(一类支持向量机和k均值聚类)构建了一个集成学习模型。集成学习通过结合多种算法的预测,提高了无人机通信的安全性和保密性。此外,通过汇集不同算法的优势,集成学习提高了无人机通信系统的整体鲁棒性和弹性,是一种检测窃听攻击数据包的有益方法。为了训练我们提出的模型,我们使用Kitsune网络攻击数据集。结果表明,我们的集成学习方法是一种有效的策略,可以用于检测针对无人机的窃听攻击。
{"title":"Eavesdropping Attack Detection in UAVs using Ensemble Learning","authors":"Krittika Das, Chayan Ghosh, Raja Karmakar","doi":"10.1109/ICEEICT56924.2023.10157306","DOIUrl":"https://doi.org/10.1109/ICEEICT56924.2023.10157306","url":null,"abstract":"The use of Unmanned Aerial Vehicles (UAVs) is proliferated and is prone to cyber attacks. Eavesdropping attack is an active threat to the security of an UAV as attackers intercept the communication medium over the wireless communication networks and get access to sensitive information. An active eavesdropper infiltrates the system and attacks the UAV during authentication. It involves the unauthorized interception of communication signals between the UAV and its control system. This type of intrusion can have severe consequences, including loss of control over the UAV, theft, espionage, and sabotage. To maintain the privacy and security of UAV communications and to protect sensitive information from unauthorized access, the detection of eavesdropping is of utmost importance. For the detection of eavesdropping attacks, we build an ensemble learning model with supervised machine learning algorithms (Logistic Regression, Decision Tree, Random Forest, k-Nearest Neighbours and Support Vector Machine) and unsupervised learning methods (One Class Support Vector Machine and K-Means Clustering). By combining the predictions of multiple algorithms, ensemble learning enhances the security and privacy of UAV communication. Additionally, by pooling together the strengths of different algorithms, ensemble learning improves the overall robustness and resilience of the UAV communication system and is a beneficial approach for the detection of eavesdropping attack packets. To train our proposed model we use the Kitsune Network Attack dataset. From the results, it is observed that our ensemble learning approach is a valid stratagem and can be used to detect eavesdropping attacks on UAV.","PeriodicalId":345324,"journal":{"name":"2023 Second International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126630035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Infrared and Visible Image Fusion with Nuclear Norm Activity Level Measurement 红外和可见光图像融合与核模活动水平测量
Shihabudeen H, Rajeesh J
Image fusion produces a single image from numerous images with complementary information. Infrared images collect information on the thermal distribution of the scene, whereas visible images collect textural information. The fusion of these images creates images with thermal and textural details suitable for night-vision cameras and surveillance applications. The proposed auto encoder network with selected residual paths extracts the salient features from the images and then combines them using the nuclear norm's optimization effectiveness. The combined images are created with 5 CNN layers with a 3 x 3 filter size, and the fused output retains more information from both inputs. The suggested algorithm generates images with improved objective evaluation metrics with values of 6.89971 for entropy, 0.76133 for structural similarity, 3.83682 for mutual information, and 0.91325 for feature mutual information. The model outper- forms similar models for the fusion, and the algorithm is suitable for other fusion problems.
图像融合从具有互补信息的众多图像中生成单个图像。红外图像收集的是场景的热分布信息,而可见光图像收集的是纹理信息。这些图像的融合创建了适合夜视摄像机和监控应用的热和纹理细节图像。所提出的残差路径自编码器网络从图像中提取显著特征,然后利用核范数的优化效果进行组合。合并后的图像由5个具有3 × 3滤波器大小的CNN层创建,融合后的输出保留了来自两个输入的更多信息。该算法生成的图像具有改进的客观评价指标,熵值为6.89971,结构相似度为0.76133,互信息为3.83682,特征互信息为0.91325。该模型优于同类的融合模型,适用于其他的融合问题。
{"title":"Infrared and Visible Image Fusion with Nuclear Norm Activity Level Measurement","authors":"Shihabudeen H, Rajeesh J","doi":"10.1109/ICEEICT56924.2023.10157238","DOIUrl":"https://doi.org/10.1109/ICEEICT56924.2023.10157238","url":null,"abstract":"Image fusion produces a single image from numerous images with complementary information. Infrared images collect information on the thermal distribution of the scene, whereas visible images collect textural information. The fusion of these images creates images with thermal and textural details suitable for night-vision cameras and surveillance applications. The proposed auto encoder network with selected residual paths extracts the salient features from the images and then combines them using the nuclear norm's optimization effectiveness. The combined images are created with 5 CNN layers with a 3 x 3 filter size, and the fused output retains more information from both inputs. The suggested algorithm generates images with improved objective evaluation metrics with values of 6.89971 for entropy, 0.76133 for structural similarity, 3.83682 for mutual information, and 0.91325 for feature mutual information. The model outper- forms similar models for the fusion, and the algorithm is suitable for other fusion problems.","PeriodicalId":345324,"journal":{"name":"2023 Second International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"424 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126716400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning-Based sleep stage prediction using EEG signals recorded in PSG 基于机器学习的睡眠阶段预测,利用PSG记录的脑电图信号
J. K, M. P, S. J
Sleep problems are very common nowadays. Many conventional methods are there for analysing this types of problems. But these methods are often time consuming, expensive and also human interventions are needed. So the need automatic diagnostic tool is very much important. Different artificial intelligence technologies like deep learning ensure the full utilization of data with very less information loss. In this paper a diagnostic tool is proposed by using the methods in machine learning. Signals were pre-processed in the first module, and the feature extraction is done by power spectral density technique (PSD). In the final section, features that had been extracted were put into an ensemble classifier, also known as a rotational support vector machine (RotSVM). The accuracy & sensitivity for the sleep stages classification is also calculated. According to classification performance results, 1D channel EEG can be used to create a sleep monitoring system that is useful for the hospitals and home care monitoring systems.
睡眠问题现在很普遍。分析这类问题有许多传统的方法。但这些方法往往耗时、昂贵,还需要人为干预。因此需要自动诊断工具是非常重要的。不同的人工智能技术,如深度学习,确保了数据的充分利用,信息丢失非常少。本文利用机器学习中的方法提出了一种诊断工具。第一个模块对信号进行预处理,利用功率谱密度技术(PSD)进行特征提取。在最后一节中,将提取的特征放入集成分类器中,也称为旋转支持向量机(RotSVM)。计算了睡眠阶段分类的准确性和灵敏度。根据分类性能结果,1D通道EEG可用于创建睡眠监测系统,可用于医院和家庭护理监测系统。
{"title":"Machine learning-Based sleep stage prediction using EEG signals recorded in PSG","authors":"J. K, M. P, S. J","doi":"10.1109/ICEEICT56924.2023.10157264","DOIUrl":"https://doi.org/10.1109/ICEEICT56924.2023.10157264","url":null,"abstract":"Sleep problems are very common nowadays. Many conventional methods are there for analysing this types of problems. But these methods are often time consuming, expensive and also human interventions are needed. So the need automatic diagnostic tool is very much important. Different artificial intelligence technologies like deep learning ensure the full utilization of data with very less information loss. In this paper a diagnostic tool is proposed by using the methods in machine learning. Signals were pre-processed in the first module, and the feature extraction is done by power spectral density technique (PSD). In the final section, features that had been extracted were put into an ensemble classifier, also known as a rotational support vector machine (RotSVM). The accuracy & sensitivity for the sleep stages classification is also calculated. According to classification performance results, 1D channel EEG can be used to create a sleep monitoring system that is useful for the hospitals and home care monitoring systems.","PeriodicalId":345324,"journal":{"name":"2023 Second International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123332967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 Second International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1