首页 > 最新文献

2021 8th International Conference on Smart Computing and Communications (ICSCC)最新文献

英文 中文
Single-Channel EEG Signal Enhancement in Presence of EMG artifact using ELM-based Regressor 基于elm回归器的肌电信号伪影单通道增强
Pub Date : 2021-07-01 DOI: 10.1109/ICSCC51209.2021.9528156
Chinmayee Dora, P. Biswal, Figlu Mohanty
Electroencephalogram (EEG) used to read the electrical signals from human scalp for diagnostic purposes. The EEG electrodes sensitive, so the low amplitude EEG signals get corrupted by the wide spectrum and high amplitude electromyogram (EMG) signals. Hence, the recorded EEG have segments that have artifacts with the unacceptable state. Effectively recovering the corrupted signal from a single channel EEG is a challenge. The proposed algorithm enhances the single-channel EEG signal in the presence of EMG artifacts using extreme learning machine (ELM) regressor. For training and testing of the ELM network, EEG signals are subjected to S-transform and the obtained transformation matrix is used as the feature set. S-Transform has the advantage of uniquely combining the gradual resolution and complete referenced phase information for the subjected time series. The ELM is trained using both magnitude and phase of corrupted and clean EEG signals in pairs. This training can reduce the EMG artifact from corrupted EEG signals effectively and enhance the same in the testing stage. The evaluation parameters used for the proposed algorithm are the average root mean square error (RMSE) and the correlation coefficient (CC) between the ground truth EEG signal to the estimated EEG signal. The average RMSE and CC were found to be 0.260 and 0.97 respectively for the simulated dataset.
脑电图(EEG)用于从人的头皮上读取电信号以进行诊断。由于脑电电极的敏感性,低幅度的脑电信号容易被广谱、高幅度的肌电信号所干扰。因此,记录的EEG具有具有不可接受状态的工件的片段。有效地从单通道脑电信号中恢复损坏信号是一个挑战。该算法利用极限学习机(ELM)回归量对存在肌电信号伪影的单通道脑电信号进行增强。为了训练和测试ELM网络,对脑电信号进行s变换,并将得到的变换矩阵作为特征集。s变换具有独特的将被测时间序列的渐进分辨率和完整参考相位信息相结合的优点。ELM是用损坏和干净的脑电信号的幅值和相位成对训练的。这种训练方法可以有效地减少脑电信号中的伪影,并在测试阶段增强伪影。该算法的评价参数为真实脑电信号与估计脑电信号之间的平均均方根误差(RMSE)和相关系数(CC)。模拟数据的平均RMSE和CC分别为0.260和0.97。
{"title":"Single-Channel EEG Signal Enhancement in Presence of EMG artifact using ELM-based Regressor","authors":"Chinmayee Dora, P. Biswal, Figlu Mohanty","doi":"10.1109/ICSCC51209.2021.9528156","DOIUrl":"https://doi.org/10.1109/ICSCC51209.2021.9528156","url":null,"abstract":"Electroencephalogram (EEG) used to read the electrical signals from human scalp for diagnostic purposes. The EEG electrodes sensitive, so the low amplitude EEG signals get corrupted by the wide spectrum and high amplitude electromyogram (EMG) signals. Hence, the recorded EEG have segments that have artifacts with the unacceptable state. Effectively recovering the corrupted signal from a single channel EEG is a challenge. The proposed algorithm enhances the single-channel EEG signal in the presence of EMG artifacts using extreme learning machine (ELM) regressor. For training and testing of the ELM network, EEG signals are subjected to S-transform and the obtained transformation matrix is used as the feature set. S-Transform has the advantage of uniquely combining the gradual resolution and complete referenced phase information for the subjected time series. The ELM is trained using both magnitude and phase of corrupted and clean EEG signals in pairs. This training can reduce the EMG artifact from corrupted EEG signals effectively and enhance the same in the testing stage. The evaluation parameters used for the proposed algorithm are the average root mean square error (RMSE) and the correlation coefficient (CC) between the ground truth EEG signal to the estimated EEG signal. The average RMSE and CC were found to be 0.260 and 0.97 respectively for the simulated dataset.","PeriodicalId":382982,"journal":{"name":"2021 8th International Conference on Smart Computing and Communications (ICSCC)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127246398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Obstacle Detection and Avoidance For Mobile Robots Using Monocular Vision 基于单目视觉的移动机器人障碍物检测与避障
Pub Date : 2021-07-01 DOI: 10.1109/ICSCC51209.2021.9528162
V. Nagarajan, Pavan Singh
This paper proposes a robust approach for obstacle detection and avoidance algorithm using a single camera. Monocular Vision using single camera architecture cannot identify depth with a single image and thus depends on pixel gradient or keypoint extractors to identify traversable path and obstacles. Pixel gradient does not work well where there are shadows and sharp illumination changes and keypoint extractor does not work well in the absence of dense texture. In this paper we propose an algorithm that is able to use edges as keypoints along with pixel gradient. The entire algorithm was successfully tested on Sphero RVR Rover platform that uses Raspberry Pi and a color camera with IR. The proposed method performs well in obstacle detection and obstacle avoidance and is potentially an alternative to a binocular solution.
提出了一种基于单摄像机的鲁棒障碍物检测与避障算法。单目视觉采用单摄像头架构,无法对单幅图像进行深度识别,因此需要依靠像素梯度或关键点提取器来识别可穿越的路径和障碍物。像素梯度在有阴影和强烈光照变化的地方不能很好地工作,关键点提取器在没有密集纹理的地方不能很好地工作。在本文中,我们提出了一种能够使用边缘作为关键点以及像素梯度的算法。整个算法在Sphero RVR Rover平台上进行了成功的测试,该平台使用树莓派和带红外的彩色相机。该方法在障碍物检测和避障方面表现良好,具有替代双目视觉的潜力。
{"title":"Obstacle Detection and Avoidance For Mobile Robots Using Monocular Vision","authors":"V. Nagarajan, Pavan Singh","doi":"10.1109/ICSCC51209.2021.9528162","DOIUrl":"https://doi.org/10.1109/ICSCC51209.2021.9528162","url":null,"abstract":"This paper proposes a robust approach for obstacle detection and avoidance algorithm using a single camera. Monocular Vision using single camera architecture cannot identify depth with a single image and thus depends on pixel gradient or keypoint extractors to identify traversable path and obstacles. Pixel gradient does not work well where there are shadows and sharp illumination changes and keypoint extractor does not work well in the absence of dense texture. In this paper we propose an algorithm that is able to use edges as keypoints along with pixel gradient. The entire algorithm was successfully tested on Sphero RVR Rover platform that uses Raspberry Pi and a color camera with IR. The proposed method performs well in obstacle detection and obstacle avoidance and is potentially an alternative to a binocular solution.","PeriodicalId":382982,"journal":{"name":"2021 8th International Conference on Smart Computing and Communications (ICSCC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131398004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
FYEO : A Character Level Model For Lip Reading FYEO:唇读的角色级模型
Pub Date : 2021-07-01 DOI: 10.1109/ICSCC51209.2021.9528104
V. Joshi, Ebin Deni Raj
The human mind is an amazing piece of creation that can handle multiple modalities of input seamlessly and help to make sense about the surroundings. When it comes to making sense about speech, 2 main features of input are sound and vision (although there are many other components). Since not every mind is alike, some of them have trouble processing the sound aspect of input therefore vision becomes their primary source to process and understand speech. Lip reading is a skill that is used mainly by people suffering from hearing deformities and it involves large amount of language specific knowledge as well as contextual awareness i.e. using all possible visual clues that help to make sense of what the other person is saying and thus allow them to take part in the conversation. Recent breakthroughs in the field of Deep learning have clearly shown promise with models that have the ability to extract complex, intricate and generalizable patterns both in spatial as well as temporal dimension. In this paper we present FYEO (For Your Eyes Only) an end-to-end deep learning based solution that only uses vision as its single modality of input and generates a single word, character by character. The model is a modified version of the LipNet architecture from Deep Mind, to a subset of words curated from the Oxford-BBC Lip Reading in the Wild (LRW) dataset. Also, as a part of novel work FYEO is extended by adding attention mechanism for further improvement of the model’s contextual awareness and observe the model’s focus while making a prediction. The standard FYEO model achieves a length normalised test CER (character-error-rate) of 25.024%.
人类的大脑是一个神奇的创造物,它可以无缝地处理多种形式的输入,并帮助理解周围的环境。说到理解语音,输入的两个主要特征是声音和视觉(尽管还有许多其他组成部分)。由于并非每个人的大脑都是一样的,有些人在处理声音输入方面有困难,因此视觉成为他们处理和理解语音的主要来源。唇读是一种主要由听力畸形患者使用的技能,它涉及到大量的语言特定知识以及上下文意识,即使用所有可能的视觉线索来帮助理解他人所说的话,从而使他们能够参与到对话中来。深度学习领域最近的突破已经清楚地显示出有能力在空间和时间维度上提取复杂、复杂和可推广的模式的模型的前景。在本文中,我们提出了FYEO (For Your Eyes Only),这是一种基于端到端深度学习的解决方案,它只使用视觉作为其单一的输入方式,并一个字符一个字符地生成单个单词。该模型是来自Deep Mind的LipNet架构的修改版本,是来自牛津- bbc野生唇读(LRW)数据集的单词子集。此外,作为新颖工作的一部分,FYEO被扩展,加入了注意机制,进一步提高了模型的上下文意识,并在进行预测时观察模型的焦点。标准FYEO模型的长度归一化测试CER(字符错误率)为25.024%。
{"title":"FYEO : A Character Level Model For Lip Reading","authors":"V. Joshi, Ebin Deni Raj","doi":"10.1109/ICSCC51209.2021.9528104","DOIUrl":"https://doi.org/10.1109/ICSCC51209.2021.9528104","url":null,"abstract":"The human mind is an amazing piece of creation that can handle multiple modalities of input seamlessly and help to make sense about the surroundings. When it comes to making sense about speech, 2 main features of input are sound and vision (although there are many other components). Since not every mind is alike, some of them have trouble processing the sound aspect of input therefore vision becomes their primary source to process and understand speech. Lip reading is a skill that is used mainly by people suffering from hearing deformities and it involves large amount of language specific knowledge as well as contextual awareness i.e. using all possible visual clues that help to make sense of what the other person is saying and thus allow them to take part in the conversation. Recent breakthroughs in the field of Deep learning have clearly shown promise with models that have the ability to extract complex, intricate and generalizable patterns both in spatial as well as temporal dimension. In this paper we present FYEO (For Your Eyes Only) an end-to-end deep learning based solution that only uses vision as its single modality of input and generates a single word, character by character. The model is a modified version of the LipNet architecture from Deep Mind, to a subset of words curated from the Oxford-BBC Lip Reading in the Wild (LRW) dataset. Also, as a part of novel work FYEO is extended by adding attention mechanism for further improvement of the model’s contextual awareness and observe the model’s focus while making a prediction. The standard FYEO model achieves a length normalised test CER (character-error-rate) of 25.024%.","PeriodicalId":382982,"journal":{"name":"2021 8th International Conference on Smart Computing and Communications (ICSCC)","volume":"62 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114045141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Unified Power Flow Conditioner with SMC and FLC for Power Factor Improvement 基于SMC和FLC的统一潮流调节器的实现,以改善功率因数
Pub Date : 2021-07-01 DOI: 10.1109/ICSCC51209.2021.9528152
J. K., Sangari A, A. J, Sivamani D, S. D, N. A
Due to rapid developments in high-power semiconductor switches and their control structures, improvement of stability of power system network turns out to be possible with FACTS controllers of different combinations. Unified Power Flow Controller (UPFC) is one of the most commonly used FACTS device. In conventional UPFC, two voltage source inverters(VSI), one is for Static Synchronous Compensator known as STATCOM and another one for Static Synchronous Series Compensator known as SSSC, functioned from a common DC link provided by a DC storage capacitor. To analyze the performance of UPFC in Sliding Mode Control (SMC), it is simulated in MATLAB. It has been observed that the simulation explains P and Q power flow control. SMC is a non-linear control intended to consider the dynamics of the converter for non-linear on-off behavior of the converter. In general, the fuzzy logic encodes human reasoning into a program. Fuzzy Logic Control (FLC) when used as a controlling method for UPFC has better stability, small overshoot and fast response.
随着大功率半导体开关及其控制结构的迅速发展,采用不同组合的FACTS控制器可以提高电网的稳定性。统一潮流控制器(UPFC)是一种最常用的FACTS设备。在传统的UPFC中,两个电压源逆变器(VSI),一个用于静态同步补偿器,称为STATCOM,另一个用于静态同步串联补偿器,称为SSSC,由直流存储电容提供的公共直流链路起作用。为了分析UPFC在滑模控制(SMC)中的性能,在MATLAB中对其进行了仿真。结果表明,该仿真解释了P和Q功率流控制。SMC是一种非线性控制,旨在考虑变换器的非线性通断行为的动力学。一般来说,模糊逻辑将人类的推理编码到程序中。模糊逻辑控制(FLC)作为UPFC的控制方法,具有稳定性好、超调量小、响应快等优点。
{"title":"Implementation of Unified Power Flow Conditioner with SMC and FLC for Power Factor Improvement","authors":"J. K., Sangari A, A. J, Sivamani D, S. D, N. A","doi":"10.1109/ICSCC51209.2021.9528152","DOIUrl":"https://doi.org/10.1109/ICSCC51209.2021.9528152","url":null,"abstract":"Due to rapid developments in high-power semiconductor switches and their control structures, improvement of stability of power system network turns out to be possible with FACTS controllers of different combinations. Unified Power Flow Controller (UPFC) is one of the most commonly used FACTS device. In conventional UPFC, two voltage source inverters(VSI), one is for Static Synchronous Compensator known as STATCOM and another one for Static Synchronous Series Compensator known as SSSC, functioned from a common DC link provided by a DC storage capacitor. To analyze the performance of UPFC in Sliding Mode Control (SMC), it is simulated in MATLAB. It has been observed that the simulation explains P and Q power flow control. SMC is a non-linear control intended to consider the dynamics of the converter for non-linear on-off behavior of the converter. In general, the fuzzy logic encodes human reasoning into a program. Fuzzy Logic Control (FLC) when used as a controlling method for UPFC has better stability, small overshoot and fast response.","PeriodicalId":382982,"journal":{"name":"2021 8th International Conference on Smart Computing and Communications (ICSCC)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124082211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Green Radio Technology for Energy Saving in Cellular Towers with Embedded Systems and IOT 绿色无线电技术用于嵌入式系统和物联网蜂窝塔的节能
Pub Date : 2021-07-01 DOI: 10.1109/ICSCC51209.2021.9528118
Ayan Bhattacharya, B. Yashwanth, F. V. Jayasudha
In modern days number of cell phone users are increasing at a higher rate. Along with the increasing rate of users also comes the increasing need of more speed for faster browsing, good calling quality and hence invention of cellular technologies like 3G, 4G, 5G, etc. With this evaluation in mobile bands there has been an increase in the number of cellular towers installed to provide flawless network to all the users, but one thing remains unchecked is the energy consumed by these towers. For mobile towers, the consumption of energy is in terms of electricity and which is produced in great amount by either using coal or by burning fossil fuels (Generators that run in Diesels). Based on various network operators, it has been seen that the energy consumed by the radio access networks is the most imminent factor relating to impact on the environment. Also, the current wireless system is not energy efficient mainly the Base Station (BS). In order to restructure the existing network architecture, we need to control each and every system of the base station. We have proposed an innovative and promising method for enhancing the energy efficiency of the wireless networks and have developed solutions on IOT which will surely reduce the operating cost and effects on the environment.
在现代,手机用户的数量正在以较高的速度增长。随着用户数量的增加,人们也越来越需要更快的速度,以获得更快的浏览速度和良好的通话质量,因此发明了3G、4G、5G等蜂窝技术。随着对移动频段的评估,为向所有用户提供完美网络而安装的蜂窝塔数量有所增加,但有一件事仍未得到检查,即这些塔所消耗的能量。对于移动塔来说,能源消耗是以电力为单位的,而电力的大量产生要么是使用煤炭,要么是燃烧化石燃料(使用柴油的发电机)。从各网络运营商的情况来看,无线接入网所消耗的能量是对环境影响最紧迫的因素。此外,目前的无线系统主要是基站(BS),能效不高。为了重构现有的网络架构,我们需要对基站的每一个系统进行控制。我们提出了一种创新和有前途的方法来提高无线网络的能源效率,并开发了物联网解决方案,这必将降低运营成本和对环境的影响。
{"title":"Green Radio Technology for Energy Saving in Cellular Towers with Embedded Systems and IOT","authors":"Ayan Bhattacharya, B. Yashwanth, F. V. Jayasudha","doi":"10.1109/ICSCC51209.2021.9528118","DOIUrl":"https://doi.org/10.1109/ICSCC51209.2021.9528118","url":null,"abstract":"In modern days number of cell phone users are increasing at a higher rate. Along with the increasing rate of users also comes the increasing need of more speed for faster browsing, good calling quality and hence invention of cellular technologies like 3G, 4G, 5G, etc. With this evaluation in mobile bands there has been an increase in the number of cellular towers installed to provide flawless network to all the users, but one thing remains unchecked is the energy consumed by these towers. For mobile towers, the consumption of energy is in terms of electricity and which is produced in great amount by either using coal or by burning fossil fuels (Generators that run in Diesels). Based on various network operators, it has been seen that the energy consumed by the radio access networks is the most imminent factor relating to impact on the environment. Also, the current wireless system is not energy efficient mainly the Base Station (BS). In order to restructure the existing network architecture, we need to control each and every system of the base station. We have proposed an innovative and promising method for enhancing the energy efficiency of the wireless networks and have developed solutions on IOT which will surely reduce the operating cost and effects on the environment.","PeriodicalId":382982,"journal":{"name":"2021 8th International Conference on Smart Computing and Communications (ICSCC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116718249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[ICSCC 2021 Front cover] [ICSCC 2021封面]
Pub Date : 2021-07-01 DOI: 10.1109/icscc51209.2021.9528251
{"title":"[ICSCC 2021 Front cover]","authors":"","doi":"10.1109/icscc51209.2021.9528251","DOIUrl":"https://doi.org/10.1109/icscc51209.2021.9528251","url":null,"abstract":"","PeriodicalId":382982,"journal":{"name":"2021 8th International Conference on Smart Computing and Communications (ICSCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122594222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stabilization of Rotary Inverted Pendulum using PID Controller 旋转式倒立摆的PID控制
Pub Date : 2021-07-01 DOI: 10.1109/ICSCC51209.2021.9528290
A. M, Anas Kunjumuhammed, Jithin Tomy, Urmila G, M. Sivadas, Ambili Mohan
The rotary inverted pendulum is a nonlinear and intrinsically unstable system that is broadly used for experimental studies and analysis. This paper focuses on the development of a nonlinear model for the rotary inverted pendulum, which encompasses the complex dynamics of the system unlike the linear model. The nonlinear behavior of the system is analyzed and validated for varying inputs. Further, the system is stabilized using a PID controller in the upright position. The controller is validated when the system is subjected to output disturbance.
旋转倒立摆是一个非线性的、本质不稳定的系统,广泛用于实验研究和分析。本文重点研究了旋转倒立摆的非线性模型的建立,该模型与线性模型不同,包含了系统的复杂动力学。分析并验证了系统在不同输入条件下的非线性行为。此外,在直立位置使用PID控制器来稳定系统。当系统受到输出扰动时,对控制器进行了验证。
{"title":"Stabilization of Rotary Inverted Pendulum using PID Controller","authors":"A. M, Anas Kunjumuhammed, Jithin Tomy, Urmila G, M. Sivadas, Ambili Mohan","doi":"10.1109/ICSCC51209.2021.9528290","DOIUrl":"https://doi.org/10.1109/ICSCC51209.2021.9528290","url":null,"abstract":"The rotary inverted pendulum is a nonlinear and intrinsically unstable system that is broadly used for experimental studies and analysis. This paper focuses on the development of a nonlinear model for the rotary inverted pendulum, which encompasses the complex dynamics of the system unlike the linear model. The nonlinear behavior of the system is analyzed and validated for varying inputs. Further, the system is stabilized using a PID controller in the upright position. The controller is validated when the system is subjected to output disturbance.","PeriodicalId":382982,"journal":{"name":"2021 8th International Conference on Smart Computing and Communications (ICSCC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121749068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Experimental Analysis on Malware Detection in Executable Files using Machine Learning 基于机器学习的可执行文件恶意软件检测实验分析
Pub Date : 2021-07-01 DOI: 10.1109/ICSCC51209.2021.9528122
Anurag Sharma, Suman Mohanty, Md. Ruhul Islam
In the recent time due to advancement of technology, Malware and its clan have continued to advance and become more diverse. Malware otherwise Malicious Software consists of Virus, Trojan horse, Adware, Spyware etc. This said software leads to extrusion of data (Spyware), continuously flow of Ads (Adware), modifying or damaging the system files (Virus), or access of personal information (Trojan horse). Some of the major factors driving the growth of these attacks are due to poorly secured devices and the ease of availability of tools in the Internet with which anyone can attack any system. The attackers or the developers of Malware usually lean towards blending of malware into the executable file, which makes it hard to detect the presence of malware in executable files. In this paper we have done experimental study on various algorithms of Machine Learning for detecting the presence of Malware in executable files. After testing Naïve Bayes, KNN and SVM, we found out that SVM was the most suited algorithm and had the accuracy of 94%. We then created a web application where the user could upload executable file and test the authenticity of the said executable file if it is a Malware file or a benign file.
近年来,由于技术的进步,恶意软件及其家族不断发展,变得更加多样化。恶意软件包括病毒、特洛伊木马、广告软件、间谍软件等。这些软件导致数据的挤压(间谍软件),广告的持续流动(广告软件),修改或破坏系统文件(病毒),或访问个人信息(特洛伊木马)。推动这些攻击增长的一些主要因素是由于设备的安全性较差以及Internet上任何人都可以攻击任何系统的工具的易用性。恶意软件的攻击者或开发人员通常倾向于将恶意软件混合到可执行文件中,这使得很难检测到可执行文件中存在恶意软件。本文对机器学习中检测可执行文件中是否存在恶意软件的各种算法进行了实验研究。通过对Naïve贝叶斯、KNN和支持向量机的测试,我们发现支持向量机是最合适的算法,准确率达到94%。然后我们创建了一个web应用程序,用户可以在其中上传可执行文件,并测试所述可执行文件的真实性,如果它是恶意软件文件或良性文件。
{"title":"An Experimental Analysis on Malware Detection in Executable Files using Machine Learning","authors":"Anurag Sharma, Suman Mohanty, Md. Ruhul Islam","doi":"10.1109/ICSCC51209.2021.9528122","DOIUrl":"https://doi.org/10.1109/ICSCC51209.2021.9528122","url":null,"abstract":"In the recent time due to advancement of technology, Malware and its clan have continued to advance and become more diverse. Malware otherwise Malicious Software consists of Virus, Trojan horse, Adware, Spyware etc. This said software leads to extrusion of data (Spyware), continuously flow of Ads (Adware), modifying or damaging the system files (Virus), or access of personal information (Trojan horse). Some of the major factors driving the growth of these attacks are due to poorly secured devices and the ease of availability of tools in the Internet with which anyone can attack any system. The attackers or the developers of Malware usually lean towards blending of malware into the executable file, which makes it hard to detect the presence of malware in executable files. In this paper we have done experimental study on various algorithms of Machine Learning for detecting the presence of Malware in executable files. After testing Naïve Bayes, KNN and SVM, we found out that SVM was the most suited algorithm and had the accuracy of 94%. We then created a web application where the user could upload executable file and test the authenticity of the said executable file if it is a Malware file or a benign file.","PeriodicalId":382982,"journal":{"name":"2021 8th International Conference on Smart Computing and Communications (ICSCC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131914983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Effect of Active Layer Thickness Variation on Overlap Length Scaling in a-IGZO Thin Film Transistors 有源层厚度变化对a-IGZO薄膜晶体管重叠长度缩放的影响
Pub Date : 2021-07-01 DOI: 10.1109/ICSCC51209.2021.9528296
Roshna B. Raj, A. Tripathi, Shiny Nair, Deepak Gupta, T. Shahana, T. Mukundan
Bandwidth improvement in amorphous oxide thin film transistors, demands lower overlap length between the contact and gate. But lowering overlap length can lead to lower efficiency of current transfer between the metal and the semiconductor due to reduced area for current injection. The influence of semiconductor thickness on this injection area is studied by fabricating three batches of TFTs; batch 1 with thickness of 5 nm, batch 2 with thickness of 10 nm and batch 3 with thickness of 30 nm. As the value of overlap length is scaled down the devices failed to operate with steadily increasing transconductance beyond a limiting value of overlap length. Batch 1 displayed a limiting overlap length of 5 µm and batch 2 provided a limiting overlap length of 10 µm. Batch 3 devices failed to display field effect operation even at an overlap length as high as 10 µm. It is found that lower thickness can lead to better immunity towards overlap length changes. The hump displayed by transconductance in thicker devices points to Schottky contact formation. Hence thickness of the semiconductor limits the extent to which overlap length can be scaled in thin film transistors.
非晶氧化物薄膜晶体管的带宽改善,要求更低的触点和栅极之间的重叠长度。但是减小重叠长度会导致金属与半导体之间电流传递效率的降低,因为电流注入面积减小了。通过制备三批tft,研究了半导体厚度对注射面积的影响;第1批厚度为5纳米,第2批厚度为10纳米,第3批厚度为30纳米。随着重叠长度的减小,器件无法在超过重叠长度限制值的情况下稳定地增加跨导。批次1的极限重叠长度为5µm,批次2的极限重叠长度为10µm。第3批器件即使在重叠长度高达10 μ m时也无法显示场效应操作。研究发现,厚度越低,对重叠长度变化的免疫能力越强。在较厚的装置中,跨导所显示的驼峰指向肖特基触点形成。因此,半导体的厚度限制了在薄膜晶体管中重叠长度可缩放的程度。
{"title":"Effect of Active Layer Thickness Variation on Overlap Length Scaling in a-IGZO Thin Film Transistors","authors":"Roshna B. Raj, A. Tripathi, Shiny Nair, Deepak Gupta, T. Shahana, T. Mukundan","doi":"10.1109/ICSCC51209.2021.9528296","DOIUrl":"https://doi.org/10.1109/ICSCC51209.2021.9528296","url":null,"abstract":"Bandwidth improvement in amorphous oxide thin film transistors, demands lower overlap length between the contact and gate. But lowering overlap length can lead to lower efficiency of current transfer between the metal and the semiconductor due to reduced area for current injection. The influence of semiconductor thickness on this injection area is studied by fabricating three batches of TFTs; batch 1 with thickness of 5 nm, batch 2 with thickness of 10 nm and batch 3 with thickness of 30 nm. As the value of overlap length is scaled down the devices failed to operate with steadily increasing transconductance beyond a limiting value of overlap length. Batch 1 displayed a limiting overlap length of 5 µm and batch 2 provided a limiting overlap length of 10 µm. Batch 3 devices failed to display field effect operation even at an overlap length as high as 10 µm. It is found that lower thickness can lead to better immunity towards overlap length changes. The hump displayed by transconductance in thicker devices points to Schottky contact formation. Hence thickness of the semiconductor limits the extent to which overlap length can be scaled in thin film transistors.","PeriodicalId":382982,"journal":{"name":"2021 8th International Conference on Smart Computing and Communications (ICSCC)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130538610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Empirical Auto-Evaluation of Python Code for Performance Analysis of Transformer Network Using T5 Architecture 基于T5架构的变压器网络性能分析Python代码的经验自评价
Pub Date : 2021-07-01 DOI: 10.1109/ICSCC51209.2021.9528123
Isha Ganguli, Rajat Subhra Bhowmick, Shivam Biswas, J. Sil
The immense real-time applicability of Python coding makes the task of evaluating the code highly intriguing, in the Natural Language Processing (NLP) domain. Evaluation of computer programs induces a challenge of logical and arithmetic understanding. Therefore, it is indeed very relevant to analyze the empirical ability of current state-of-the-art sequence-based neural architectures in evaluating small computer programs. One of the possible applications of such analysis is the auto-evaluation of erroneous Python code. In this context, we focused our work on evaluating small python code blocks with or without error and examined the efficiency of the latest T5 Transformer network model in this task. In terms of accuracy, different Rouge scores, and BLEU scores, the performance measurements has been calculated. Observations reveal that T5 Transformer is able to compute the output for both correct and erroneous python code blocks with more than 65% accuracy.
Python编码的巨大实时适用性使得在自然语言处理(NLP)领域中评估代码的任务非常有趣。对计算机程序的评估是对逻辑和算术理解的挑战。因此,分析当前最先进的基于序列的神经架构在评估小型计算机程序中的经验能力确实非常相关。这种分析的一个可能应用是自动评估错误的Python代码。在这种情况下,我们的工作重点是评估小的python代码块是否有错误,并检查最新的T5 Transformer网络模型在此任务中的效率。在准确性、不同的Rouge分数和BLEU分数方面,计算了性能度量。观察显示,T5 Transformer能够以超过65%的准确率计算正确和错误的python代码块的输出。
{"title":"Empirical Auto-Evaluation of Python Code for Performance Analysis of Transformer Network Using T5 Architecture","authors":"Isha Ganguli, Rajat Subhra Bhowmick, Shivam Biswas, J. Sil","doi":"10.1109/ICSCC51209.2021.9528123","DOIUrl":"https://doi.org/10.1109/ICSCC51209.2021.9528123","url":null,"abstract":"The immense real-time applicability of Python coding makes the task of evaluating the code highly intriguing, in the Natural Language Processing (NLP) domain. Evaluation of computer programs induces a challenge of logical and arithmetic understanding. Therefore, it is indeed very relevant to analyze the empirical ability of current state-of-the-art sequence-based neural architectures in evaluating small computer programs. One of the possible applications of such analysis is the auto-evaluation of erroneous Python code. In this context, we focused our work on evaluating small python code blocks with or without error and examined the efficiency of the latest T5 Transformer network model in this task. In terms of accuracy, different Rouge scores, and BLEU scores, the performance measurements has been calculated. Observations reveal that T5 Transformer is able to compute the output for both correct and erroneous python code blocks with more than 65% accuracy.","PeriodicalId":382982,"journal":{"name":"2021 8th International Conference on Smart Computing and Communications (ICSCC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130861422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2021 8th International Conference on Smart Computing and Communications (ICSCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1