首页 > 最新文献

2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)最新文献

英文 中文
Recommender Systems -The Lifeline Of The Current Streaming Zeitgeist 推荐系统——当前流媒体时代精神的生命线
Gautham Sathish Nambissan, Prateek Mahajan, Shivam Sharma, P. Nagrath, Rachna Jain
The modern age is a peculiar anomaly wherein content is being so voraciously consumed at an astonishing pace. Netflix, Amazon Prime and the litany of streaming services have taken it upon themselves to secure exclusive deals with studios to add to their ever-growing entertainment library. But the real secret sauce behind the outrageous watching times of these platforms are recommender systems which efficiently advise the user to watch what to watch. Three contenders come into mind while describing them, Popularity based filtering system, Content Based filtering system, and collaborative based filtering system. The authors have devised a similarity-based approach which adjudges a similarity score or rather a matrix of scores between two movies or items with the help of cosine similarity (for content based as well as collaborative filtering) and the Pearson Correlation method (for collaborative filtering). These methods will be studied in depth and furthermore, there will be comparison between clustering and Euclidean distance similarity with this and the results will be displayed. Also discussed is the scenario when both types of filtering are combined.
现代是一种奇特的反常现象,内容正以惊人的速度被贪婪地消费。Netflix、亚马逊Prime和一长串的流媒体服务都主动与电影公司达成独家协议,为它们不断增长的娱乐库增添新的内容。但这些平台惊人的观看时间背后的真正秘密是推荐系统,它有效地建议用户看什么。在描述它们时,我想到了三个竞争者,基于人气的过滤系统,基于内容的过滤系统和基于协作的过滤系统。作者设计了一种基于相似度的方法,通过余弦相似度(用于基于内容的协同过滤)和Pearson相关性方法(用于协同过滤)来判断两个电影或项目之间的相似度得分,或者更确切地说是分数矩阵。我们将对这些方法进行深入的研究,并以此对聚类和欧氏距离相似度进行比较,并将结果显示出来。还讨论了两种过滤类型组合使用的场景。
{"title":"Recommender Systems -The Lifeline Of The Current Streaming Zeitgeist","authors":"Gautham Sathish Nambissan, Prateek Mahajan, Shivam Sharma, P. Nagrath, Rachna Jain","doi":"10.1109/ICICT46931.2019.8977676","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977676","url":null,"abstract":"The modern age is a peculiar anomaly wherein content is being so voraciously consumed at an astonishing pace. Netflix, Amazon Prime and the litany of streaming services have taken it upon themselves to secure exclusive deals with studios to add to their ever-growing entertainment library. But the real secret sauce behind the outrageous watching times of these platforms are recommender systems which efficiently advise the user to watch what to watch. Three contenders come into mind while describing them, Popularity based filtering system, Content Based filtering system, and collaborative based filtering system. The authors have devised a similarity-based approach which adjudges a similarity score or rather a matrix of scores between two movies or items with the help of cosine similarity (for content based as well as collaborative filtering) and the Pearson Correlation method (for collaborative filtering). These methods will be studied in depth and furthermore, there will be comparison between clustering and Euclidean distance similarity with this and the results will be displayed. Also discussed is the scenario when both types of filtering are combined.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126760833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SPV Plant Performance Analysis for Optimized Inter-Row Spacing and Module Mounting Structure 优化排间距和模块安装结构的SPV装置性能分析
K. Joshi, B. Bora, Sanjeev Mishra, M. Lalwani, Sanjay Kumar
Total solar plant installation has been increased in recent years, thus performance optimization techniques for plant solar plant need to be applied to reduce payback period of grid connected SPV plants. Present work gives an in-depth, by evaluating and analyzing the effect of inter-row spacing of grid-connected solar photovoltaic (SPV) plant on the performance of power plant and the most appropriate structure that can be used for plant installation in the context of generation and performance installed at optimum fixed tilt of the location. This work deals with selection of optimized inter-row spacing as 1,1.2, 1.3, 1.4, 1.5, 1.6 times of height of module from the ground and structure for plant installation obtained by simulated results and designing of the solar photovoltaic power (SPV) plant on PV-Syst designing software for Delhi-NCR, location situated in the composite zone of India by parameters like performance ratio, energy generated for different condition.
近年来,太阳能电站总安装量不断增加,因此需要采用电厂太阳能电站性能优化技术来缩短并网SPV电站的投资回收期。本文通过对并网太阳能光伏(SPV)电站行距对电站性能的影响进行了深入的评价和分析,并在发电的背景下选择了最合适的电站安装结构,并将其安装在最佳的固定倾斜位置。本文通过对位于印度复合带的德里- ncr的PV-Syst设计软件,根据性能比、不同条件下产生的能量等参数,对所获得的组件离地高度和结构高度的1、1.2、1.3、1.4、1.5、1.6倍的最佳行间距进行了选择,并对该太阳能光伏电站进行了设计。
{"title":"SPV Plant Performance Analysis for Optimized Inter-Row Spacing and Module Mounting Structure","authors":"K. Joshi, B. Bora, Sanjeev Mishra, M. Lalwani, Sanjay Kumar","doi":"10.1109/ICICT46931.2019.8977660","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977660","url":null,"abstract":"Total solar plant installation has been increased in recent years, thus performance optimization techniques for plant solar plant need to be applied to reduce payback period of grid connected SPV plants. Present work gives an in-depth, by evaluating and analyzing the effect of inter-row spacing of grid-connected solar photovoltaic (SPV) plant on the performance of power plant and the most appropriate structure that can be used for plant installation in the context of generation and performance installed at optimum fixed tilt of the location. This work deals with selection of optimized inter-row spacing as 1,1.2, 1.3, 1.4, 1.5, 1.6 times of height of module from the ground and structure for plant installation obtained by simulated results and designing of the solar photovoltaic power (SPV) plant on PV-Syst designing software for Delhi-NCR, location situated in the composite zone of India by parameters like performance ratio, energy generated for different condition.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126127490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparison of COSYSMO Model with Different Software Cost Estimation Techniques COSYSMO模型与不同软件成本估算技术的比较
Neha Yadav, N. Gupta, Mukul Aggarwal, Aruna Yadav
Cost Estimation of any software is process of evaluating the estimating cost and effort which is must necessary to build any software system or project for increasing the output. The basic input is the cost drivers set and the size of code and the output is the effort which is calculated in terms of Person-Months (PM’s). To estimate cost for software is the main portions of any project type and right estimation of cost for the software will help in completing project in of time and budget. Proper cost estimation of a software project is highly needed to avoid any risk failure. So, there is a strong need to calculate the project’s cost annually and compare it to the other techniques. This paper deals with the analysis and comparison of COCOMO model of Boehm’s and COSYSMO model of Valerdi’s through the help of formulae’s and an online tool present at the CSSE website. For this we have used the COCOMO dataset and it has been observed that COSYSMO model works better than the COCOMO model in every aspect.
任何软件的成本估算都是评估估算成本和工作量的过程,这是构建任何软件系统或项目以增加产出所必需的。基本的输入是成本驱动因素和代码的大小,而输出是按人月计算的工作量。软件成本估算是任何项目类型的主要部分,正确的软件成本估算将有助于在时间和预算内完成项目。对软件项目进行适当的成本估算是非常必要的,以避免任何风险失败。因此,有必要每年计算项目的成本,并将其与其他技术进行比较。本文借助公式和CSSE网站上的在线工具,对Boehm的COCOMO模型和Valerdi的COSYSMO模型进行了分析和比较。为此,我们使用了COCOMO数据集,并观察到COSYSMO模型在各个方面都比COCOMO模型更好。
{"title":"Comparison of COSYSMO Model with Different Software Cost Estimation Techniques","authors":"Neha Yadav, N. Gupta, Mukul Aggarwal, Aruna Yadav","doi":"10.1109/ICICT46931.2019.8977686","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977686","url":null,"abstract":"Cost Estimation of any software is process of evaluating the estimating cost and effort which is must necessary to build any software system or project for increasing the output. The basic input is the cost drivers set and the size of code and the output is the effort which is calculated in terms of Person-Months (PM’s). To estimate cost for software is the main portions of any project type and right estimation of cost for the software will help in completing project in of time and budget. Proper cost estimation of a software project is highly needed to avoid any risk failure. So, there is a strong need to calculate the project’s cost annually and compare it to the other techniques. This paper deals with the analysis and comparison of COCOMO model of Boehm’s and COSYSMO model of Valerdi’s through the help of formulae’s and an online tool present at the CSSE website. For this we have used the COCOMO dataset and it has been observed that COSYSMO model works better than the COCOMO model in every aspect.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128103495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identifying Parking Lots from Satellite Images using Transfer Learning 利用迁移学习从卫星图像中识别停车场
Shushant Kumar, Edwin Thomas, Anmol Horo
With the advent of digital image processing techniques and convolutional neural networks, the world has derived numerous benefits such as computerized photography, biological Image Processing, finger print and iris recognition, to name a few. Computer vision coupled with convolutional neural networks has attributed machines with a virtual intellectual ability to recognize and distinguish images based on several characteristics that may be impossible for the human eye to perceive. We have exploited this advancement in technology to particular use case of detecting number of empty and occupied parking slots from satellite images of parking lots. We have proposed a befitting sequence of classical image processing techniques and algorithms to perform pre-processing of satellite images of parking spaces. Moreover, we have proposed a Convolutional Neural Network model that takes as input these preprocessed images and identifies the empty and occupied parking slots with an accuracy of 97.73%. The potential benefits of using Neural Networks to realize the objective can be extended to open parking spaces of different configurations. This is due to the fact that establishing sensors over a large number of parking slots over a given open parking space can be a cumbersome and exorbitant task. The proposed model comprises of few convolutional layers and uses Rectified Linear Classification activation function.
随着数字图像处理技术和卷积神经网络的出现,世界已经获得了许多好处,如计算机摄影,生物图像处理,指纹和虹膜识别,仅举几例。计算机视觉与卷积神经网络相结合,使机器具有虚拟智能能力,可以识别和区分基于人眼可能无法感知的几个特征的图像。我们利用这项技术的进步,从停车场的卫星图像中检测空车位和占用车位的数量。我们提出了一系列适合的经典图像处理技术和算法来对卫星停车位图像进行预处理。此外,我们提出了一个卷积神经网络模型,将这些预处理图像作为输入,以97.73%的准确率识别空车位和占用车位。利用神经网络实现目标的潜在效益可以扩展到不同配置的开放式停车位。这是因为在一个给定的开放停车位上,在大量停车位上建立传感器可能是一项繁琐而昂贵的任务。该模型由几个卷积层组成,并使用纠偏线性分类激活函数。
{"title":"Identifying Parking Lots from Satellite Images using Transfer Learning","authors":"Shushant Kumar, Edwin Thomas, Anmol Horo","doi":"10.1109/ICICT46931.2019.8977634","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977634","url":null,"abstract":"With the advent of digital image processing techniques and convolutional neural networks, the world has derived numerous benefits such as computerized photography, biological Image Processing, finger print and iris recognition, to name a few. Computer vision coupled with convolutional neural networks has attributed machines with a virtual intellectual ability to recognize and distinguish images based on several characteristics that may be impossible for the human eye to perceive. We have exploited this advancement in technology to particular use case of detecting number of empty and occupied parking slots from satellite images of parking lots. We have proposed a befitting sequence of classical image processing techniques and algorithms to perform pre-processing of satellite images of parking spaces. Moreover, we have proposed a Convolutional Neural Network model that takes as input these preprocessed images and identifies the empty and occupied parking slots with an accuracy of 97.73%. The potential benefits of using Neural Networks to realize the objective can be extended to open parking spaces of different configurations. This is due to the fact that establishing sensors over a large number of parking slots over a given open parking space can be a cumbersome and exorbitant task. The proposed model comprises of few convolutional layers and uses Rectified Linear Classification activation function.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130567351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-assessments and Feedback Mechanisms in Moocs mooc中的电子评估和反馈机制
Neha Shukla, Arti Sharma, A. Saggu
Assessment can be defined as the interpretation of a student’s work performed. It can be the guiding as well as decision making point for various stakeholders. It checks the learner on three pillars as to how student represent knowledge, how to develop competence and how to draw influence from the topic. Assessment is the best way to identify what the student wants as in support to increase his/her knowledge base. It encourages the desire in the learner to excel in various fields and progress further. Assessment is sometimes mistaken as evaluation but they are different in many perspective such as: Assessment is to evaluate the effectiveness of the teaching done, the process of appraising something, to check the level of performance whereas evaluation is judging the learner based on the standards, to determine to which degree the goals are satisfied. From the reference of all the assessment, we can propose m-assessment in which the practice tests and enhancement of the topic related questions can be uploaded and be assessed frequently and immediately.
评估可以定义为对学生工作表现的解释。它可以成为各种利益相关者的指导和决策点。它从三个方面考察学习者,即学生如何表达知识,如何发展能力以及如何从主题中汲取影响。评估是确定学生想要什么来支持增加他/她的知识基础的最好方法。它鼓励学习者在各个领域脱颖而出并进一步进步的愿望。评估有时被误认为是评估,但它们在许多方面是不同的,例如:评估是评估教学的有效性,评估事物的过程,检查表现水平,而评估是根据标准来判断学习者,确定目标的满足程度。从所有评估的参考中,我们可以提出m-assessment,即可以上传与主题相关的练习测试和增强问题,并经常和立即进行评估。
{"title":"E-assessments and Feedback Mechanisms in Moocs","authors":"Neha Shukla, Arti Sharma, A. Saggu","doi":"10.1109/ICICT46931.2019.8977681","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977681","url":null,"abstract":"Assessment can be defined as the interpretation of a student’s work performed. It can be the guiding as well as decision making point for various stakeholders. It checks the learner on three pillars as to how student represent knowledge, how to develop competence and how to draw influence from the topic. Assessment is the best way to identify what the student wants as in support to increase his/her knowledge base. It encourages the desire in the learner to excel in various fields and progress further. Assessment is sometimes mistaken as evaluation but they are different in many perspective such as: Assessment is to evaluate the effectiveness of the teaching done, the process of appraising something, to check the level of performance whereas evaluation is judging the learner based on the standards, to determine to which degree the goals are satisfied. From the reference of all the assessment, we can propose m-assessment in which the practice tests and enhancement of the topic related questions can be uploaded and be assessed frequently and immediately.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116485379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mathematical Analysis of oxygen Transport in the Retina 视网膜中氧运输的数学分析
Deepti Seth
The aim of the present work was to simulate the oxygenation of the whole retina under normal conditions as well as during retinal ischemia. A differential equation describing how oxygen is transported from blood to tissue, diffuses through the tissue and is consumed according to Michaelis–Menten kinetics was constructed. The outer retina was divided into three regions of which one was set to have consumption. The inner retina was considered as one uniform region with respect to maximal rate of oxygen consumption and blood flow. The results suggest that extreme hyperoxia would be needed to make the choroid capable of supplying the whole retina during total retinal artery occlusion and moreover confirm that light might to some extent be beneficial.
本研究的目的是模拟正常情况下和视网膜缺血时整个视网膜的氧合情况。根据Michaelis-Menten动力学,建立了一个描述氧气如何从血液输送到组织,在组织中扩散并被消耗的微分方程。外层视网膜被分成三个区域,其中一个区域被设置为消耗。就最大耗氧量和血流速率而言,内视网膜被认为是一个均匀的区域。结果表明,在视网膜全动脉闭塞时,需要极度高氧才能使脉络膜能够供应整个视网膜,并且证实光可能在一定程度上是有益的。
{"title":"Mathematical Analysis of oxygen Transport in the Retina","authors":"Deepti Seth","doi":"10.1109/ICICT46931.2019.8977711","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977711","url":null,"abstract":"The aim of the present work was to simulate the oxygenation of the whole retina under normal conditions as well as during retinal ischemia. A differential equation describing how oxygen is transported from blood to tissue, diffuses through the tissue and is consumed according to Michaelis–Menten kinetics was constructed. The outer retina was divided into three regions of which one was set to have consumption. The inner retina was considered as one uniform region with respect to maximal rate of oxygen consumption and blood flow. The results suggest that extreme hyperoxia would be needed to make the choroid capable of supplying the whole retina during total retinal artery occlusion and moreover confirm that light might to some extent be beneficial.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129952525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Intrusion Detection: A comparative study using state-of-the-art machine learning methods 网络入侵检测:使用最先进的机器学习方法的比较研究
Mahima Rai, H. Mandoria
Cyber threats are not only increasing with the years, but are also becoming harder to recognize and evolving with time so that they can easily bypass normal antivirus. There have been numerous cyber crimes that have attacked confidentiality and privacy of data. To ensure network security, an effective intrusion detection system is required. Several ensemble methods like XG-Boost and LGBM have been developed in the past 4-5 years. These have not been exploited in the previous researches on anomaly detection. This study makes use of these novel Gradient Boosting Decision Tree algorithms. XG-Boost and LGBM have proved to be the most productive techniques for several supervised and unsupervised learning tasks. This research studies several machine learning and deep learning classifiers and compare their performances. To predict the probability of occurrence of 21 different classes of attacks on a network the NSL KDD dataset has been used. We studied three different categories of models-Linear Models including Logistic Regression and Stochastic Gradient Descent (SGD) classifier; Gradient Boosting Decision Tree ensembles including Light GBM (LGBM) and XG-Boost; and a Deep Neural Network (DNN) classifier and also trained a stacked model consisting of all these models as base learners. This study compares the performances of all the models for Network Intrusion Detection and useful conclusions are drawn. The simulation results show that ensemble methods are more effective for detecting network intrusion.
网络威胁不仅随着时间的推移而增加,而且随着时间的推移变得越来越难以识别和发展,因此它们可以轻松绕过正常的反病毒软件。有许多网络犯罪攻击了数据的机密性和隐私性。为了保证网络的安全,需要一个有效的入侵检测系统。XG-Boost和LGBM等集成方法在过去的4-5年里得到了发展。这些在以往的异常检测研究中尚未被充分利用。本研究利用了这些新颖的梯度增强决策树算法。XG-Boost和LGBM已被证明是几种有监督和无监督学习任务中最有效的技术。本研究研究了几种机器学习和深度学习分类器,并比较了它们的性能。为了预测网络上21种不同类型攻击的发生概率,使用了NSL KDD数据集。我们研究了三种不同类型的模型:线性模型包括逻辑回归和随机梯度下降(SGD)分类器;包括Light GBM (LGBM)和XG-Boost的梯度增强决策树以及一个深度神经网络(DNN)分类器,并训练了一个由所有这些模型组成的堆叠模型作为基础学习器。本研究比较了各种网络入侵检测模型的性能,得出了有益的结论。仿真结果表明,集成方法对网络入侵检测更为有效。
{"title":"Network Intrusion Detection: A comparative study using state-of-the-art machine learning methods","authors":"Mahima Rai, H. Mandoria","doi":"10.1109/ICICT46931.2019.8977679","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977679","url":null,"abstract":"Cyber threats are not only increasing with the years, but are also becoming harder to recognize and evolving with time so that they can easily bypass normal antivirus. There have been numerous cyber crimes that have attacked confidentiality and privacy of data. To ensure network security, an effective intrusion detection system is required. Several ensemble methods like XG-Boost and LGBM have been developed in the past 4-5 years. These have not been exploited in the previous researches on anomaly detection. This study makes use of these novel Gradient Boosting Decision Tree algorithms. XG-Boost and LGBM have proved to be the most productive techniques for several supervised and unsupervised learning tasks. This research studies several machine learning and deep learning classifiers and compare their performances. To predict the probability of occurrence of 21 different classes of attacks on a network the NSL KDD dataset has been used. We studied three different categories of models-Linear Models including Logistic Regression and Stochastic Gradient Descent (SGD) classifier; Gradient Boosting Decision Tree ensembles including Light GBM (LGBM) and XG-Boost; and a Deep Neural Network (DNN) classifier and also trained a stacked model consisting of all these models as base learners. This study compares the performances of all the models for Network Intrusion Detection and useful conclusions are drawn. The simulation results show that ensemble methods are more effective for detecting network intrusion.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128387971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Traffic Characteristics of Broadband Networks: Impact on Scalability 宽带网络的流量特性:对可扩展性的影响
Sanjeev Kumar, A. Bajpai, Pinaki Chattopadhyaya
The networks as we see today are increasingly becoming more complex as additional nodes or computers are being added to it. It would be beyond expectations after few years as addition of latest mobiles would result in massive communication networks. This paper addressed most challengeable upcoming issue whether the present protocols would be able to function with the same efficiency in very large networks and so questions of scalability are observed. A protocol or network architecture is buffer scalable or scalable if the performance of the network with limited buffer space at each node does not degrade as the total size of the network increases. It is argued that mathematical treatment of large networks is essential as it is not feasible to build large networks for experimental purposes.
我们今天看到的网络正变得越来越复杂,因为有更多的节点或计算机加入其中。几年后,由于最新手机的加入将导致大规模的通信网络,这将超出预期。本文解决了即将到来的最具挑战性的问题,即当前协议是否能够在非常大的网络中以相同的效率运行,从而观察到可扩展性问题。如果在每个节点上具有有限缓冲区空间的网络的性能不会随着网络总规模的增加而降低,则协议或网络体系结构是缓冲区可伸缩的或可伸缩的。有人认为,大型网络的数学处理是必不可少的,因为建立大型网络用于实验目的是不可行的。
{"title":"Traffic Characteristics of Broadband Networks: Impact on Scalability","authors":"Sanjeev Kumar, A. Bajpai, Pinaki Chattopadhyaya","doi":"10.1109/ICICT46931.2019.8977635","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977635","url":null,"abstract":"The networks as we see today are increasingly becoming more complex as additional nodes or computers are being added to it. It would be beyond expectations after few years as addition of latest mobiles would result in massive communication networks. This paper addressed most challengeable upcoming issue whether the present protocols would be able to function with the same efficiency in very large networks and so questions of scalability are observed. A protocol or network architecture is buffer scalable or scalable if the performance of the network with limited buffer space at each node does not degrade as the total size of the network increases. It is argued that mathematical treatment of large networks is essential as it is not feasible to build large networks for experimental purposes.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133386198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fraud Detection During Money Transaction and Prevention 货币交易中的欺诈检测与预防
Surbhi Surbhi, D. S. Kumar
With the increased use of digital money, online financial frauds are observed to be one of the most common cyber crimes. Credit/Debit card frauds are among the easy cyber crimes targeted by fraudster. In this paper all possible online frauds of present era and likely to be occur in future have been discussed. Ignorance, greed, availability of technical tools, malafide intentions, online and offline security breaches are some reasons behind these financial cyber crimes. Most of the fraud detections techniques have been studied with their merits and constraints. Proposal of two techniques to detect and understand dynamics of evolution of fraudsters with improvement of security systems and another technique of analysis of time series data of random variables describing characteristics of online frauds have been suggested to use in future scope.
随着数字货币使用的增加,在线金融欺诈被认为是最常见的网络犯罪之一。信用卡/借记卡诈骗是诈骗者最容易针对的网络犯罪之一。本文讨论了当今时代和未来可能发生的网络欺诈行为。无知、贪婪、技术工具的可用性、恶意意图、在线和离线安全漏洞是这些金融网络犯罪背后的一些原因。对大多数欺诈检测技术进行了研究,分析了它们的优点和局限性。建议在未来的范围内使用两种技术来检测和理解欺诈者随着安全系统的改进而演变的动态,以及另一种分析描述在线欺诈特征的随机变量的时间序列数据的技术。
{"title":"Fraud Detection During Money Transaction and Prevention","authors":"Surbhi Surbhi, D. S. Kumar","doi":"10.1109/ICICT46931.2019.8977668","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977668","url":null,"abstract":"With the increased use of digital money, online financial frauds are observed to be one of the most common cyber crimes. Credit/Debit card frauds are among the easy cyber crimes targeted by fraudster. In this paper all possible online frauds of present era and likely to be occur in future have been discussed. Ignorance, greed, availability of technical tools, malafide intentions, online and offline security breaches are some reasons behind these financial cyber crimes. Most of the fraud detections techniques have been studied with their merits and constraints. Proposal of two techniques to detect and understand dynamics of evolution of fraudsters with improvement of security systems and another technique of analysis of time series data of random variables describing characteristics of online frauds have been suggested to use in future scope.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"22 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114014152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modified KDF & ERLS Regressing Filter Based Satellite Image Restoration Method 基于改进KDF和ERLS回归滤波的卫星图像恢复方法
Rajni Barman, D. K. Meda
Image taken by Satellite sending are much for time dependent because for station impacts or environmental situations. These impacts present different commotion examples, for example, variable Additive White Gaussian Noise, high Salt Pepper Noise and sometime Mixed Noise. On the other hand, recovered pictures at receiving station are exceedingly highly noisy debased on grounds that picture substance are progressively weakened or intensified. Reconstruction for ideal picture rearrangement pixel sifting strategy depends to known about attributes for abnormal framework highly noisy design in a received image. In this paper work a Extended Recursive Least Square (ERLS) with complex calculation & Kalman diffeomorphism filter (KDF) is merging for picture re-fabrication from exceptionally commotion available debased pictures. Implementation for proposed method is being done by analysing and evaluation existing examples for remote channel through designing System Identification with ERLS complex calculation. At that point, these evaluated highly noisy images are dispensed with by designing Signal Enhancement with ERLS calculation. Re-established pictures are worked for further de-noising & improvement strategies. Picture is re-fabricated & further handling calculations are recreated in MATLAB condition. Presentation is assessed by methods for Human Visual System, quantitative measures as far as MSE, RMSE, and SNR & PSNR &by graphical measures. Trial results exhibit that RLS versatile calculation productively wiped out high noise from twisted pictures & conveyed an upright assessment without plenteous debasement in execution.
由于受站点影响或环境情况的影响,卫星发送的图像有很大的时间依赖性。这些影响表现出不同的扰动形式,如可变加性高斯白噪声、高盐胡椒噪声和有时的混合噪声。另一方面,由于图像物质逐渐减弱或增强,在接收站恢复的图像具有极高的噪声。理想图像重构重排像素筛选策略依赖于已知接收图像中异常框架高噪声设计的属性。本文将复杂计算的扩展递归最小二乘(ERLS)与卡尔曼微分同态滤波(KDF)相结合,用于从异常混乱的可用退化图像中重构图像。通过对现有远程信道实例的分析和评价,设计了基于ERLS复杂计算的系统辨识方法,实现了该方法。此时,通过设计带有ERLS计算的信号增强来消除这些评估过的高噪声图像。重新建立的图像用于进一步的去噪和改进策略。在MATLAB环境下对图像进行了重构,并进行了进一步的处理计算。通过人类视觉系统的方法,定量测量MSE, RMSE和SNR & PSNR &通过图形测量来评估呈现。试验结果表明,RLS通用计算有效地消除了扭曲图像中的高噪声,并在执行过程中传达了一个正确的评估。
{"title":"Modified KDF & ERLS Regressing Filter Based Satellite Image Restoration Method","authors":"Rajni Barman, D. K. Meda","doi":"10.1109/ICICT46931.2019.8977639","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977639","url":null,"abstract":"Image taken by Satellite sending are much for time dependent because for station impacts or environmental situations. These impacts present different commotion examples, for example, variable Additive White Gaussian Noise, high Salt Pepper Noise and sometime Mixed Noise. On the other hand, recovered pictures at receiving station are exceedingly highly noisy debased on grounds that picture substance are progressively weakened or intensified. Reconstruction for ideal picture rearrangement pixel sifting strategy depends to known about attributes for abnormal framework highly noisy design in a received image. In this paper work a Extended Recursive Least Square (ERLS) with complex calculation & Kalman diffeomorphism filter (KDF) is merging for picture re-fabrication from exceptionally commotion available debased pictures. Implementation for proposed method is being done by analysing and evaluation existing examples for remote channel through designing System Identification with ERLS complex calculation. At that point, these evaluated highly noisy images are dispensed with by designing Signal Enhancement with ERLS calculation. Re-established pictures are worked for further de-noising & improvement strategies. Picture is re-fabricated & further handling calculations are recreated in MATLAB condition. Presentation is assessed by methods for Human Visual System, quantitative measures as far as MSE, RMSE, and SNR & PSNR &by graphical measures. Trial results exhibit that RLS versatile calculation productively wiped out high noise from twisted pictures & conveyed an upright assessment without plenteous debasement in execution.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129392587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1