首页 > 最新文献

2022 IEEE Bombay Section Signature Conference (IBSSC)最新文献

英文 中文
SC Connect: Secure Server Access from Mobile Device SC连接:安全的服务器访问从移动设备
Pub Date : 2022-12-08 DOI: 10.1109/IBSSC56953.2022.10037430
Wilfred Almeida
With the rise of technology, Server requirements have grown at an overwhelming pace. Accessing these servers and performing administrative tasks on them remotely has always been a great challenge. A popular utility used for this is the Secure Shell (SSH) which is being used extensively to get shell access on servers. SSH is however prone to vulnerabilities like Dictionary Attacks and Man-In-The-Middle (MITM) attacks. Further on, accessing servers from mobile devices is not yet feasible, SSH remains the de facto choice for it however SSH via third-party applications from mobile devices poses a security risk. In this paper, I've proposed an alternative system for accessing servers from mobile devices from operating systems Android and iOS. The main idea here is to keep commands pre-defined on servers and facilitate their execution from mobile applications securely.
随着技术的发展,服务器需求以惊人的速度增长。远程访问这些服务器并在其上执行管理任务一直是一个巨大的挑战。用于此目的的一个流行实用程序是Secure Shell (SSH),它被广泛用于获取服务器上的Shell访问。然而,SSH容易受到字典攻击和中间人(MITM)攻击等漏洞的攻击。此外,从移动设备访问服务器还不可行,SSH仍然是它事实上的选择,但SSH通过第三方应用程序从移动设备带来了安全风险。在本文中,我提出了一种从Android和iOS操作系统的移动设备访问服务器的替代系统。这里的主要思想是在服务器上保持预定义的命令,并促进它们在移动应用程序中的安全执行。
{"title":"SC Connect: Secure Server Access from Mobile Device","authors":"Wilfred Almeida","doi":"10.1109/IBSSC56953.2022.10037430","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037430","url":null,"abstract":"With the rise of technology, Server requirements have grown at an overwhelming pace. Accessing these servers and performing administrative tasks on them remotely has always been a great challenge. A popular utility used for this is the Secure Shell (SSH) which is being used extensively to get shell access on servers. SSH is however prone to vulnerabilities like Dictionary Attacks and Man-In-The-Middle (MITM) attacks. Further on, accessing servers from mobile devices is not yet feasible, SSH remains the de facto choice for it however SSH via third-party applications from mobile devices poses a security risk. In this paper, I've proposed an alternative system for accessing servers from mobile devices from operating systems Android and iOS. The main idea here is to keep commands pre-defined on servers and facilitate their execution from mobile applications securely.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116945878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Realtime Deepfake Detection using Video Vision Transformer 使用视频视觉变压器的实时深度伪造检测
Pub Date : 2022-12-08 DOI: 10.1109/IBSSC56953.2022.10037344
Abhishek Doshi, Abhinav Venkatadri, Sayali Kulkarni, Vedant Athavale, Akhila Jagarlapudi, Shraddha Suratkar, F. Kazi
Practically, Deepfake technology has given people access to generate fake videos that look like real content using neural networks, and can further create misconceptions and deceit about the innocuous elements of society. This technology can prove fatal not only to national security but on an international level. Existing methodologies that apply deep learning to automatically extract salient and discriminative features to detect Deepfakes based on typical CNN-LSTM models tend to have their shortcomings. Having said that, we propose a system that extracts Spatio-Temporal features and achieves Real-Time Deepfake detection using Transformers. For the end user, a web application was developed, which with utmost simplicity allows the uploading of a video that will be further authenticated within the application and, at the same time, features the authentication of live meetings.
实际上,Deepfake技术允许人们使用神经网络生成看起来像真实内容的假视频,并可能进一步造成对社会无害元素的误解和欺骗。这项技术不仅对国家安全,而且在国际层面上都是致命的。现有的基于典型CNN-LSTM模型应用深度学习自动提取显著特征和判别特征来检测Deepfakes的方法往往存在缺点。因此,我们提出了一种提取时空特征并利用变压器实现实时深度伪造检测的系统。对于最终用户,开发了一个web应用程序,该应用程序极其简单地允许上传视频,该视频将在应用程序中进一步验证,同时具有实时会议的验证功能。
{"title":"Realtime Deepfake Detection using Video Vision Transformer","authors":"Abhishek Doshi, Abhinav Venkatadri, Sayali Kulkarni, Vedant Athavale, Akhila Jagarlapudi, Shraddha Suratkar, F. Kazi","doi":"10.1109/IBSSC56953.2022.10037344","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037344","url":null,"abstract":"Practically, Deepfake technology has given people access to generate fake videos that look like real content using neural networks, and can further create misconceptions and deceit about the innocuous elements of society. This technology can prove fatal not only to national security but on an international level. Existing methodologies that apply deep learning to automatically extract salient and discriminative features to detect Deepfakes based on typical CNN-LSTM models tend to have their shortcomings. Having said that, we propose a system that extracts Spatio-Temporal features and achieves Real-Time Deepfake detection using Transformers. For the end user, a web application was developed, which with utmost simplicity allows the uploading of a video that will be further authenticated within the application and, at the same time, features the authentication of live meetings.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134642735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Study of CNN Models on the Classification of Dyslexic Handwriting CNN模型对阅读困难笔迹分类的比较研究
Pub Date : 2022-12-08 DOI: 10.1109/IBSSC56953.2022.10037428
Subha Sreekumar, Lijiya A
Developmental Dyslexia, one of the learning disabilities is a topic of scientific interest in a variety of disciplines such as psychology, speech and language therapy, data science, etc. While the reason for Dyslexia and its symptoms are still being researched by psychologists, data science is providing ways to intervene and detect them with the aid of technological advancements. Dyslexia is a neurological condition that impairs reading comprehension and has long-lasting impacts. But timely detection and intervention programs can alleviate its effects to a certain extent. This study aims to classify images of handwritten English characters into three classes namely: normal, corrected, and reversed, where normal class refers to normal handwriting, and corrected or reversed constitutes handwriting of children with Dyslexia. The dataset used for the study is available publicly on Kaggle. The building of an efficient CNN (Convolutional Neural Network) model for classifying dyslexic handwriting is the major emphasis of this work. This is accomplished by comparing several CNN models and evaluating how well they detect Dyslexia on the same dataset. The proposed CNN approach has demonstrated a sizable improvement in reliably classifying dyslexic handwritten images.
发展性阅读障碍是学习障碍的一种,是心理学、言语和语言治疗、数据科学等多个学科关注的科学话题。虽然心理学家仍在研究阅读障碍的原因及其症状,但数据科学正在提供在技术进步的帮助下进行干预和检测的方法。阅读障碍是一种神经系统疾病,会损害阅读理解能力,并产生长期影响。但及时发现和干预方案可以在一定程度上缓解其影响。本研究的目的是将手写的英文汉字图像分为正常、纠正和反三种类型,其中正常类型是指正常的笔迹,而纠正或反则构成阅读障碍儿童的笔迹。该研究使用的数据集可以在Kaggle上公开获取。建立一个有效的CNN(卷积神经网络)模型来分类诵读困难的笔迹是本工作的主要重点。这是通过比较几个CNN模型并评估它们在相同数据集上检测阅读障碍的效果来完成的。提出的CNN方法在可靠地分类阅读困难的手写图像方面取得了相当大的进步。
{"title":"Comparative Study of CNN Models on the Classification of Dyslexic Handwriting","authors":"Subha Sreekumar, Lijiya A","doi":"10.1109/IBSSC56953.2022.10037428","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037428","url":null,"abstract":"Developmental Dyslexia, one of the learning disabilities is a topic of scientific interest in a variety of disciplines such as psychology, speech and language therapy, data science, etc. While the reason for Dyslexia and its symptoms are still being researched by psychologists, data science is providing ways to intervene and detect them with the aid of technological advancements. Dyslexia is a neurological condition that impairs reading comprehension and has long-lasting impacts. But timely detection and intervention programs can alleviate its effects to a certain extent. This study aims to classify images of handwritten English characters into three classes namely: normal, corrected, and reversed, where normal class refers to normal handwriting, and corrected or reversed constitutes handwriting of children with Dyslexia. The dataset used for the study is available publicly on Kaggle. The building of an efficient CNN (Convolutional Neural Network) model for classifying dyslexic handwriting is the major emphasis of this work. This is accomplished by comparing several CNN models and evaluating how well they detect Dyslexia on the same dataset. The proposed CNN approach has demonstrated a sizable improvement in reliably classifying dyslexic handwritten images.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123658897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep-3DConvNet: A Network to Detect Abnormal Activities at Megastores Deep-3DConvNet:一种检测大型商店异常活动的网络
Pub Date : 2022-12-08 DOI: 10.1109/IBSSC56953.2022.10037326
Mohd. Aquib Ansari, D. Singh
These days, there has been a rapid increase in cases of abnormal human behavior at megastores/shops, where people commit theft by stealing, consuming, or unwrapping packets when no one is seeing and then leaving the place without paying. Such unusual actions cause huge losses in business. Therefore, there is an urgent need to attract the research community's attention to detect abnormal events at megastores. To address this issue, we have designed an advanced three-dimensional convolutional neural architecture to identify abnormal activities at megastores. The proposed network is 15 layers deep, takes a video stream of resolution 120× 120 as input, and produces classification results as output. It extracts fine-tuned as well as general details from the video feed using small and large-sized 3D convolutional filters and categorizes them into respective classes. The proposed architecture is trained and tested on a synthesized action dataset that consists of human actions distributed into five classes: normal, stealing, eating, drinking, and damaging acts. Experimental results show that our model outperforms other state-of-the-art approaches with an accuracy of 88.88%.
这些天来,在大型超市/商店里,人类异常行为的案例迅速增加,人们在没有人看到的情况下偷窃、消费或打开包裹,然后不付钱就离开了。这种不寻常的行为造成了巨大的商业损失。因此,迫切需要引起研究界的关注,以检测特大商场的异常事件。为了解决这个问题,我们设计了一个先进的三维卷积神经体系结构来识别大卖场的异常活动。该网络深度为15层,以分辨率为120× 120的视频流为输入,产生分类结果作为输出。它使用小尺寸和大尺寸的3D卷积过滤器从视频提要中提取微调和一般细节,并将它们分类为各自的类。所提出的架构在一个合成动作数据集上进行训练和测试,该数据集由人类行为组成,分为五类:正常、偷窃、吃、喝和破坏行为。实验结果表明,我们的模型以88.88%的准确率优于其他最先进的方法。
{"title":"Deep-3DConvNet: A Network to Detect Abnormal Activities at Megastores","authors":"Mohd. Aquib Ansari, D. Singh","doi":"10.1109/IBSSC56953.2022.10037326","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037326","url":null,"abstract":"These days, there has been a rapid increase in cases of abnormal human behavior at megastores/shops, where people commit theft by stealing, consuming, or unwrapping packets when no one is seeing and then leaving the place without paying. Such unusual actions cause huge losses in business. Therefore, there is an urgent need to attract the research community's attention to detect abnormal events at megastores. To address this issue, we have designed an advanced three-dimensional convolutional neural architecture to identify abnormal activities at megastores. The proposed network is 15 layers deep, takes a video stream of resolution 120× 120 as input, and produces classification results as output. It extracts fine-tuned as well as general details from the video feed using small and large-sized 3D convolutional filters and categorizes them into respective classes. The proposed architecture is trained and tested on a synthesized action dataset that consists of human actions distributed into five classes: normal, stealing, eating, drinking, and damaging acts. Experimental results show that our model outperforms other state-of-the-art approaches with an accuracy of 88.88%.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121527475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empirical Evaluation of Traffic Shaping Algorithms for Time Sensitive Networking 时间敏感网络流量整形算法的实证评价
Pub Date : 2022-12-08 DOI: 10.1109/IBSSC56953.2022.10037572
Kuni Naik, D. Kumari, M. Tahiliani
Standard Ethernet networks cannot provide solutions to handle latency sensitive applications efficiently. The packet scheduling algorithms like First In First Out (FIFO), Class Based Queueing (CBQ), and others do not provide efficient solutions to Quality of Service (QoS) parameters like end-toend delay, packet loss, and jitter. Time Sensitive Networking (TSN) can be used as a solution to provide QoS to time sensitive applications. TSN has emerged as a future of realtime communication. The main advantage of TSN is that it enables determinism by supporting time critical traffic while the best effort traffic is also present in the network. This paper explores two of the most popular and widespread traffic shaping mechanisms in TSN: Time Aware Shaper (TAS) and Credit Based Shaper (CBS). IEEE 802.1Qbv is used for delivering time assurance using TAS. CBS is a key traffic shaping algorithm to provide bandwidth assurance to the time critical and real time traffic, such as the audio traffic. This paper evaluates TAS and CBS using TSN enabled Network Interface Cards (NIC) with time synchronization, real time kernel and real traffic, which includes time sensitive traffic and elastic background traffic.
标准以太网不能提供有效处理延迟敏感应用程序的解决方案。诸如先进先出(FIFO)、基于类的队列(CBQ)等数据包调度算法不能有效地解决服务质量(QoS)参数,如端到端延迟、数据包丢失和抖动。TSN (Time Sensitive Networking)是一种为时间敏感型应用提供QoS的解决方案。TSN已经成为实时通信的未来。TSN的主要优点是,它通过支持时间关键型流量来实现确定性,同时网络中也存在尽力而为的流量。本文探讨了TSN中最流行和最广泛的两种流量整形机制:时间感知整形器(TAS)和基于信用的整形器(CBS)。IEEE 802.1Qbv用于使用TAS提供时间保证。CBS是一种关键的流量整形算法,可以为音频等时间关键型实时流量提供带宽保障。本文利用具有时间同步、实时内核和真实流量(包括时间敏感流量和弹性后台流量)的支持TSN的网卡对TAS和CBS进行了评估。
{"title":"Empirical Evaluation of Traffic Shaping Algorithms for Time Sensitive Networking","authors":"Kuni Naik, D. Kumari, M. Tahiliani","doi":"10.1109/IBSSC56953.2022.10037572","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037572","url":null,"abstract":"Standard Ethernet networks cannot provide solutions to handle latency sensitive applications efficiently. The packet scheduling algorithms like First In First Out (FIFO), Class Based Queueing (CBQ), and others do not provide efficient solutions to Quality of Service (QoS) parameters like end-toend delay, packet loss, and jitter. Time Sensitive Networking (TSN) can be used as a solution to provide QoS to time sensitive applications. TSN has emerged as a future of realtime communication. The main advantage of TSN is that it enables determinism by supporting time critical traffic while the best effort traffic is also present in the network. This paper explores two of the most popular and widespread traffic shaping mechanisms in TSN: Time Aware Shaper (TAS) and Credit Based Shaper (CBS). IEEE 802.1Qbv is used for delivering time assurance using TAS. CBS is a key traffic shaping algorithm to provide bandwidth assurance to the time critical and real time traffic, such as the audio traffic. This paper evaluates TAS and CBS using TSN enabled Network Interface Cards (NIC) with time synchronization, real time kernel and real traffic, which includes time sensitive traffic and elastic background traffic.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116572119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Antennas in Airborne Applications 航空应用中的天线
Pub Date : 2022-12-08 DOI: 10.1109/IBSSC56953.2022.10037463
A. Shaikh, M. Joshi
This paper gives an overview of various types of antennas used in airborne applications such as delivery using UAVs, defence, disaster management. Antenna characteristics are very sensitive and must be used before implementing in airborne applications. Because of different nature of aerial body on which antennas are mounted, different antenna positions will result in variations in the radiation pattern. In recent studies, researcher considers antenna positioning with respect to azimuth and elevation angles. Effect of aerial body on antenna, its signal strength and radiation pattern is observable. Cross polarization discrimination occurs due to polarization mixing of communicating channels.
本文概述了在机载应用中使用的各种类型的天线,例如使用无人机交付,防御,灾害管理。天线的特性是非常敏感的,必须在机载应用实施之前使用。由于天线所安装的天线体性质不同,不同的天线位置会导致辐射方向图的变化。在最近的研究中,研究人员考虑了相对于方位角和仰角的天线定位。天线体对天线的影响,其信号强度和辐射方向图是可见的。由于通信信道的极化混合而产生交叉极化鉴别。
{"title":"Antennas in Airborne Applications","authors":"A. Shaikh, M. Joshi","doi":"10.1109/IBSSC56953.2022.10037463","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037463","url":null,"abstract":"This paper gives an overview of various types of antennas used in airborne applications such as delivery using UAVs, defence, disaster management. Antenna characteristics are very sensitive and must be used before implementing in airborne applications. Because of different nature of aerial body on which antennas are mounted, different antenna positions will result in variations in the radiation pattern. In recent studies, researcher considers antenna positioning with respect to azimuth and elevation angles. Effect of aerial body on antenna, its signal strength and radiation pattern is observable. Cross polarization discrimination occurs due to polarization mixing of communicating channels.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121122632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computationally efficient image encryption technique based on selective pixel diffusion 基于选择性像素扩散的高效计算图像加密技术
Pub Date : 2022-12-08 DOI: 10.1109/IBSSC56953.2022.10037561
Malik Obaid Ul Islam, S. A. Parah, B. A. Malik
Medical images play a vital role in disease diagnosis. When the medical images are communicated through an insecure transmission channel, their chances of being accessed by an unauthorized user increase resulting in the loss of patients' sensitive personal data. Thus, providing security to such image data while transmitting it over an insecure communication network becomes crucial. This work presents a computationally efficient cryptosystem for encrypting medical images. The encryption process consists of multiple phases. In the first phase the control parameters and initial values for the various chaotic maps used, are evaluated. This phase is followed by encryption in which these evaluated values are used to obtain the chaotic sequences for encryption. In the subsequent phases, we make use of a new approach of selective, pixel-dependent diffusion to obtain the cipher image. The effectiveness of our cryptosystem is evaluated using security analysis and execution time analysis. The obtained outcome shows a high-security level compared to already existing state-of-the-art techniques. In addition, the computational complexity of our scheme is very small (0.1sec for encrypting a 256×256 image) making it suitable for real-time smart health applications.
医学图像在疾病诊断中起着至关重要的作用。当医学图像通过不安全的传输通道进行通信时,未经授权的用户访问图像的可能性会增加,从而导致患者敏感个人数据的丢失。因此,在通过不安全的通信网络传输这些图像数据时,为其提供安全性变得至关重要。这项工作提出了一种计算效率高的加密医学图像的密码系统。加密过程包括多个阶段。在第一阶段,对所使用的各种混沌映射的控制参数和初始值进行评估。这个阶段之后是加密,其中使用这些评估值来获得用于加密的混沌序列。在随后的阶段中,我们使用了一种新的方法,即选择性的、像素相关的扩散来获得密码图像。使用安全性分析和执行时间分析来评估我们的密码系统的有效性。与现有的最先进技术相比,获得的结果显示出较高的安全水平。此外,该方案的计算复杂度非常小(加密256×256图像只需0.1秒),适合于实时智能健康应用。
{"title":"Computationally efficient image encryption technique based on selective pixel diffusion","authors":"Malik Obaid Ul Islam, S. A. Parah, B. A. Malik","doi":"10.1109/IBSSC56953.2022.10037561","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037561","url":null,"abstract":"Medical images play a vital role in disease diagnosis. When the medical images are communicated through an insecure transmission channel, their chances of being accessed by an unauthorized user increase resulting in the loss of patients' sensitive personal data. Thus, providing security to such image data while transmitting it over an insecure communication network becomes crucial. This work presents a computationally efficient cryptosystem for encrypting medical images. The encryption process consists of multiple phases. In the first phase the control parameters and initial values for the various chaotic maps used, are evaluated. This phase is followed by encryption in which these evaluated values are used to obtain the chaotic sequences for encryption. In the subsequent phases, we make use of a new approach of selective, pixel-dependent diffusion to obtain the cipher image. The effectiveness of our cryptosystem is evaluated using security analysis and execution time analysis. The obtained outcome shows a high-security level compared to already existing state-of-the-art techniques. In addition, the computational complexity of our scheme is very small (0.1sec for encrypting a 256×256 image) making it suitable for real-time smart health applications.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116913667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Implementation of IoT Based Local Weather Station - An Experimental Setup 基于物联网的本地气象站的设计与实现——一个实验装置
Pub Date : 2022-12-08 DOI: 10.1109/IBSSC56953.2022.10037309
Nikuni Tandan, Anup Kanse, Oj Uparkar, Riya Modi, Harish Karnam, Saurabh Mehta, Akshaj Raut, Sonali Bedade
In contemporary times it is observed that the climatic and weather conditions have become skeptical and unpredictable. To confound this unreliable nature and variability of weather conditions, we present an experimental setup of loT-based local weather stations. This paper presents the design and implementation details of the experimental setup, ESP8266-based Wi-fi module NodeMCU (12E) is the brain of the prototype. Two sensors are connected to the NodeMCU, namely a temperature and humidity sensor (DHT11), and an Air quality gas sensor (MQ135). Additionally, to display the results, we present VIT Weather Station’ - A local weather station app which can keep people updated regarding the environmental conditions utilizing live data collection and display. The device will monitor the temperature, humidity, and air quality index. This application is supported on Android as well as IOS systems. Local users can also view the monitored data from Twitter for easier convenience.
在当代,人们观察到气候和天气条件变得令人怀疑和不可预测。为了混淆这种不可靠的性质和天气条件的可变性,我们提出了一个基于lot的本地气象站的实验设置。本文介绍了实验装置的设计与实现细节,基于esp8266的Wi-fi模块NodeMCU (12E)是样机的大脑。NodeMCU连接两个传感器,温湿度传感器(DHT11)和空气质量气体传感器(MQ135)。此外,为了显示结果,我们展示了VIT气象站-一个本地气象站应用程序,可以通过实时数据收集和显示让人们了解最新的环境状况。该设备将监测温度、湿度和空气质量指数。此应用程序支持Android以及IOS系统。本地用户也可以从Twitter上查看监控数据,从而更方便。
{"title":"Design and Implementation of IoT Based Local Weather Station - An Experimental Setup","authors":"Nikuni Tandan, Anup Kanse, Oj Uparkar, Riya Modi, Harish Karnam, Saurabh Mehta, Akshaj Raut, Sonali Bedade","doi":"10.1109/IBSSC56953.2022.10037309","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037309","url":null,"abstract":"In contemporary times it is observed that the climatic and weather conditions have become skeptical and unpredictable. To confound this unreliable nature and variability of weather conditions, we present an experimental setup of loT-based local weather stations. This paper presents the design and implementation details of the experimental setup, ESP8266-based Wi-fi module NodeMCU (12E) is the brain of the prototype. Two sensors are connected to the NodeMCU, namely a temperature and humidity sensor (DHT11), and an Air quality gas sensor (MQ135). Additionally, to display the results, we present VIT Weather Station’ - A local weather station app which can keep people updated regarding the environmental conditions utilizing live data collection and display. The device will monitor the temperature, humidity, and air quality index. This application is supported on Android as well as IOS systems. Local users can also view the monitored data from Twitter for easier convenience.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130227185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An approach to detect abusive content incorporating Word2Vec and Multilayer Perceptron 结合Word2Vec和多层感知机的滥用内容检测方法
Pub Date : 2022-12-08 DOI: 10.1109/IBSSC56953.2022.10037274
S. Ghosal, Amit Jain, D. Tayal
With the rapid growth of social media text, millions of negative comments are flowing on social webs and social networking sites. Abusive content is harmful to people and societies that can provoke various criminal offenses like hate crimes. Hate speech is also a form of abusive content. An automatic and improved detection system for hate speech can help to reduce this problem. Implicit abusive content requires contextual semantic and syntactical analysis. We propose a novel abusive text detection model with the word2vec model and compositional vector model to analyze text more semantically and syntactically. The proposed model considers the English language dataset for abusive text. The abusive content detection model exhibits achievable performance compare to various deep learning and machine learning classifiers. Among all models, Multilayer Perceptron classifier achieves 86% accuracy compared to other models.
随着社交媒体文本的快速增长,数以百万计的负面评论在社交网站和社交网站上流动。滥用内容对人们和社会有害,可能引发仇恨犯罪等各种刑事犯罪。仇恨言论也是辱骂性内容的一种形式。一个自动改进的仇恨言论检测系统可以帮助减少这个问题。隐性滥用内容需要上下文语义和句法分析。我们提出了一种新的滥用文本检测模型,结合word2vec模型和组合向量模型对文本进行语义和句法分析。提出的模型考虑了英语语言数据集的滥用文本。与各种深度学习和机器学习分类器相比,滥用内容检测模型显示出可实现的性能。在所有模型中,多层感知器分类器与其他模型相比准确率达到86%。
{"title":"An approach to detect abusive content incorporating Word2Vec and Multilayer Perceptron","authors":"S. Ghosal, Amit Jain, D. Tayal","doi":"10.1109/IBSSC56953.2022.10037274","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037274","url":null,"abstract":"With the rapid growth of social media text, millions of negative comments are flowing on social webs and social networking sites. Abusive content is harmful to people and societies that can provoke various criminal offenses like hate crimes. Hate speech is also a form of abusive content. An automatic and improved detection system for hate speech can help to reduce this problem. Implicit abusive content requires contextual semantic and syntactical analysis. We propose a novel abusive text detection model with the word2vec model and compositional vector model to analyze text more semantically and syntactically. The proposed model considers the English language dataset for abusive text. The abusive content detection model exhibits achievable performance compare to various deep learning and machine learning classifiers. Among all models, Multilayer Perceptron classifier achieves 86% accuracy compared to other models.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121985403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PSO Adaptive Fading Memory Kalman Filter Based State Estimation of Indoor Thermal Model with Unknown Inputs 基于PSO自适应衰落记忆卡尔曼滤波的未知输入室内热模型状态估计
Pub Date : 2022-12-08 DOI: 10.1109/IBSSC56953.2022.10037453
Bed Prakash Das, K. D. Sharma, A. Chatterjee, J. Bera
An adaptive filtering approach is proposed in this paper to address the thermal state estimation methodology along with the model parameters jointly for an indoor thermodynamic resistance capacitance model with uncertain stochastic heating inputs. The adaptive dynamics of the state of the model is combined with a particle swarm optimization (PSO) based metaheuristic approach to feed the knowledge of measurement noise statistics and the initial estimation error covariance along with forgetting factor for implementation of fading memory Kalman filter (FMKF). This study has been carried out with the variation of uncertain influential input information to enhance the estimation efficiency with the proposed PSO adaptive FMKF (PSO-AdFMKF) strategy for a real life the test thermodynamic environment scenario inside the building space. Potential observations demonstrate that the proposed estimation algorithm performs encouragingly, with a satisfactory improvement of estimation performance in terms of evaluating error metrics.
针对具有不确定随机热输入的室内热阻电容模型,提出了一种自适应滤波方法,并结合模型参数对热状态进行估计。将模型状态的自适应动态特性与基于粒子群优化(PSO)的元启发式方法相结合,利用测量噪声统计信息和初始估计误差协方差以及遗忘因子来实现衰落记忆卡尔曼滤波(FMKF)。针对建筑空间内的真实测试热力学环境场景,利用不确定影响输入信息的变化,提出了PSO自适应FMKF (PSO- adfmkf)策略,以提高估计效率。潜在的观察结果表明,所提出的估计算法的性能令人鼓舞,在评估误差度量方面,估计性能有了令人满意的改进。
{"title":"PSO Adaptive Fading Memory Kalman Filter Based State Estimation of Indoor Thermal Model with Unknown Inputs","authors":"Bed Prakash Das, K. D. Sharma, A. Chatterjee, J. Bera","doi":"10.1109/IBSSC56953.2022.10037453","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037453","url":null,"abstract":"An adaptive filtering approach is proposed in this paper to address the thermal state estimation methodology along with the model parameters jointly for an indoor thermodynamic resistance capacitance model with uncertain stochastic heating inputs. The adaptive dynamics of the state of the model is combined with a particle swarm optimization (PSO) based metaheuristic approach to feed the knowledge of measurement noise statistics and the initial estimation error covariance along with forgetting factor for implementation of fading memory Kalman filter (FMKF). This study has been carried out with the variation of uncertain influential input information to enhance the estimation efficiency with the proposed PSO adaptive FMKF (PSO-AdFMKF) strategy for a real life the test thermodynamic environment scenario inside the building space. Potential observations demonstrate that the proposed estimation algorithm performs encouragingly, with a satisfactory improvement of estimation performance in terms of evaluating error metrics.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125745114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE Bombay Section Signature Conference (IBSSC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1