首页 > 最新文献

2022 2nd Asian Conference on Innovation in Technology (ASIANCON)最新文献

英文 中文
Secure QR Code Scanner to Detect Malicious URL using Machine Learning 安全QR码扫描仪检测恶意URL使用机器学习
Pub Date : 2022-08-26 DOI: 10.1109/ASIANCON55314.2022.9908759
Atharva Pawar, Chirag Fatnani, Rajani Sonavane, Riya Waghmare, Sarang A. Saoji
Q-R codes are utilised for a variety of purposes, including accessing online web-pages and making a settlement. The Internet facilitates a wide range of illegal acts, including unsolicited e-marketing, financial embezzlement, and malicious distribution. Even though all the users identify the presence of Q-R codes visually, the information stored in those codes can only be accessed through an allocated Q-R code decoder. Q-R codes have also been shown to be used as an effective attack vector, For example techniques include social engineering, phishing, pharming, etc. Harmful codes are distributed under false pretences in congested areas, or malicious Q-R codes are pasted over current ones on billboards. Finally, consumers rely on decoder operating system to determine a random Q-R code is whether malicious or benign.For the purpose of this report, we consider the identification of malicious Q-R codes as a two-way classification problem in this research, and we test the effectiveness of many well-known M-L algorithms, including namely K-Nearest Neighbour, Random Forest, Binary LSTM and Support Vector Machine. This implies that the proposed method might be deemed an optimal and user-friendly QR code security solution. We created a prototype to test our recommendations and found it to be secure and usable in protecting users from harmful QR Codes.
Q-R码用于各种目的,包括访问在线网页和进行结算。互联网为各种非法行为提供了便利,包括未经请求的电子营销、挪用资金和恶意分销。尽管所有用户都能直观地识别出Q-R码的存在,但存储在这些码中的信息只能通过分配的Q-R码解码器访问。Q-R代码也被证明是一种有效的攻击载体,例如技术包括社会工程,网络钓鱼,钓鱼等。有害的代码在拥挤的地区以虚假的名义分发,或者恶意的Q-R代码粘贴在广告牌上的现有代码之上。最后,消费者依靠解码器操作系统来确定一个随机Q-R码是恶意还是良性。在本报告中,我们将恶意Q-R码的识别视为一个双向分类问题,并测试了许多知名的M-L算法的有效性,包括k -近邻算法、随机森林算法、二进制LSTM算法和支持向量机算法。这意味着所提出的方法可能被认为是一种最佳的、用户友好的二维码安全解决方案。我们创建了一个原型来测试我们的建议,发现它既安全又可用,可以保护用户免受有害QR码的伤害。
{"title":"Secure QR Code Scanner to Detect Malicious URL using Machine Learning","authors":"Atharva Pawar, Chirag Fatnani, Rajani Sonavane, Riya Waghmare, Sarang A. Saoji","doi":"10.1109/ASIANCON55314.2022.9908759","DOIUrl":"https://doi.org/10.1109/ASIANCON55314.2022.9908759","url":null,"abstract":"Q-R codes are utilised for a variety of purposes, including accessing online web-pages and making a settlement. The Internet facilitates a wide range of illegal acts, including unsolicited e-marketing, financial embezzlement, and malicious distribution. Even though all the users identify the presence of Q-R codes visually, the information stored in those codes can only be accessed through an allocated Q-R code decoder. Q-R codes have also been shown to be used as an effective attack vector, For example techniques include social engineering, phishing, pharming, etc. Harmful codes are distributed under false pretences in congested areas, or malicious Q-R codes are pasted over current ones on billboards. Finally, consumers rely on decoder operating system to determine a random Q-R code is whether malicious or benign.For the purpose of this report, we consider the identification of malicious Q-R codes as a two-way classification problem in this research, and we test the effectiveness of many well-known M-L algorithms, including namely K-Nearest Neighbour, Random Forest, Binary LSTM and Support Vector Machine. This implies that the proposed method might be deemed an optimal and user-friendly QR code security solution. We created a prototype to test our recommendations and found it to be secure and usable in protecting users from harmful QR Codes.","PeriodicalId":429704,"journal":{"name":"2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116106444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Diabetes Prediction Using Machine Learning Analytics: Ensemble Learning Techniques 使用机器学习分析预测糖尿病:集成学习技术
Pub Date : 2022-08-26 DOI: 10.1109/ASIANCON55314.2022.9908975
D. Tripathi, S. Biswas, S. Reshmi, Arpita Nath Boruah, B. Purkayastha
Diabetes is an incurable disease which is due to a high level of sugar in the blood over a long period of time. Hence, early prediction is required to reduce its severity significantly. Now-a-days Machine Learning (ML) community has been working on diabetes prediction and much research has been done for decades for its prediction. Keeping in view of its severity, this paper proposes a model, named Diabetes Expert System using Machine Learning Analytics (DESMLA) to explore the diabetes data to predict the disease more effectively. The Diabetes Dataset (DD) is imbalanced in nature; therefore, the DESMLA model uses the 5 most prominent oversampling techniques namely SMOTE, Borderline SMOTE, ADASYN SMOTE, K-Means SMOTE and Gaussian SMOTE to get rid of this class imbalance problem of the diabetes dataset. DESMLA model also performs feature selection to determine only the significant features for diabetes prediction as DD may contain some irrelevant and redundant features. DESMLA shows the comparison between filter and wrapper approaches for feature selection. From the experimental results, it is observed that DESMLA with wrapper approach produces better performance than that of filter approach. The performance improvement of DESMLA with class imbalance treatment and feature selection is observed which is promising and significant.
糖尿病是一种无法治愈的疾病,它是由于长期高水平的血糖在血液中。因此,需要早期预测以显著降低其严重程度。现在的机器学习(ML)社区一直致力于糖尿病预测,几十年来已经做了很多研究。针对糖尿病的严重程度,本文提出了一种基于机器学习分析(DESMLA)的糖尿病专家系统模型来探索糖尿病数据,从而更有效地预测糖尿病。糖尿病数据集(DD)本质上是不平衡的;因此,DESMLA模型使用了5种最突出的过采样技术,即SMOTE、Borderline SMOTE、ADASYN SMOTE、K-Means SMOTE和高斯SMOTE来消除糖尿病数据集的类不平衡问题。由于DD可能包含一些不相关和冗余的特征,DESMLA模型还进行了特征选择,仅确定对糖尿病预测有意义的特征。DESMLA显示了特征选择的过滤器和包装器方法之间的比较。实验结果表明,采用包装方法的DESMLA比采用滤波方法的DESMLA具有更好的性能。类不平衡处理和特征选择对DESMLA的性能有显著的改善。
{"title":"Diabetes Prediction Using Machine Learning Analytics: Ensemble Learning Techniques","authors":"D. Tripathi, S. Biswas, S. Reshmi, Arpita Nath Boruah, B. Purkayastha","doi":"10.1109/ASIANCON55314.2022.9908975","DOIUrl":"https://doi.org/10.1109/ASIANCON55314.2022.9908975","url":null,"abstract":"Diabetes is an incurable disease which is due to a high level of sugar in the blood over a long period of time. Hence, early prediction is required to reduce its severity significantly. Now-a-days Machine Learning (ML) community has been working on diabetes prediction and much research has been done for decades for its prediction. Keeping in view of its severity, this paper proposes a model, named Diabetes Expert System using Machine Learning Analytics (DESMLA) to explore the diabetes data to predict the disease more effectively. The Diabetes Dataset (DD) is imbalanced in nature; therefore, the DESMLA model uses the 5 most prominent oversampling techniques namely SMOTE, Borderline SMOTE, ADASYN SMOTE, K-Means SMOTE and Gaussian SMOTE to get rid of this class imbalance problem of the diabetes dataset. DESMLA model also performs feature selection to determine only the significant features for diabetes prediction as DD may contain some irrelevant and redundant features. DESMLA shows the comparison between filter and wrapper approaches for feature selection. From the experimental results, it is observed that DESMLA with wrapper approach produces better performance than that of filter approach. The performance improvement of DESMLA with class imbalance treatment and feature selection is observed which is promising and significant.","PeriodicalId":429704,"journal":{"name":"2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124670081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
(2,2) Visual Cryptography Based Biometric Authentication Mechanism for Online Elections (2,2)基于视觉密码的在线选举生物特征认证机制
Pub Date : 2022-08-26 DOI: 10.1109/ASIANCON55314.2022.9909485
Sneha Annappanavar, P. Chavan
Voting is a process of choosing leader who we trust and will work for our benefit. The process of choosing the leader is currently through EVM having the facts to be considered like Voter Authentication, Security of vote casted and Vote anonymity along with Vote verification. The very first thing which requires to improve is moving from EVM voting to Secure Electronic Voting where digitization plays an important role in providing the access to vote from anywhere which meets the current need for keeping us updated with technology and serving the citizens with the advanced Technology. Keeping Electronic voting in mind here we propose the very first step towards new way of voting that is voter authentication. Using visual cryptography schemes, we can here implement the voter authentication mechanism using fingerprint matching. Fingerprint matching is one of the biometric which can be considered as one of the key steps towards voter authentication along with visual cryptography.
投票是一个选择我们信任并将为我们的利益工作的领导人的过程。目前,选举领导人的过程是通过EVM进行的,需要考虑选民身份验证、投票安全、投票匿名以及投票验证等事实。需要改进的第一件事是从EVM投票转向安全电子投票,其中数字化在提供从任何地方投票的访问方面发挥着重要作用,这符合当前技术更新和为公民提供先进技术的需求。考虑到电子投票,我们提出了迈向新的投票方式的第一步,即选民身份验证。使用可视化密码方案,我们可以实现基于指纹匹配的选民认证机制。指纹匹配是生物特征识别的一种,与视觉密码一起是选民身份认证的关键步骤之一。
{"title":"(2,2) Visual Cryptography Based Biometric Authentication Mechanism for Online Elections","authors":"Sneha Annappanavar, P. Chavan","doi":"10.1109/ASIANCON55314.2022.9909485","DOIUrl":"https://doi.org/10.1109/ASIANCON55314.2022.9909485","url":null,"abstract":"Voting is a process of choosing leader who we trust and will work for our benefit. The process of choosing the leader is currently through EVM having the facts to be considered like Voter Authentication, Security of vote casted and Vote anonymity along with Vote verification. The very first thing which requires to improve is moving from EVM voting to Secure Electronic Voting where digitization plays an important role in providing the access to vote from anywhere which meets the current need for keeping us updated with technology and serving the citizens with the advanced Technology. Keeping Electronic voting in mind here we propose the very first step towards new way of voting that is voter authentication. Using visual cryptography schemes, we can here implement the voter authentication mechanism using fingerprint matching. Fingerprint matching is one of the biometric which can be considered as one of the key steps towards voter authentication along with visual cryptography.","PeriodicalId":429704,"journal":{"name":"2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123033238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Literature Review of Machine Learning based Approaches on Pathology Detection in Gastrointestinal Endoscopy 基于机器学习的胃肠内镜病理检测方法的系统文献综述
Pub Date : 2022-08-26 DOI: 10.1109/ASIANCON55314.2022.9909267
Dinisuru Nisal Gunaratna, Pumudu Fernando
Endoscopy is the most widely adhered medical procedure used to examine the gastrointestinal tract of a person. Accurate pathology detection during the endoscopic procedure is crucial as misidentifications or miss rates could reduce the chance of survival for the patient. After the successful collaboration of artificial intelligence with medicine, researchers around the world have tried different techniques in using this for gastroenterology. Our study demonstrates an extensive survey on existing pathology detection methodologies in endoscopic images using the publicly available datasets. The paper also discusses the content of the recently released datasets, preprocessing techniques tried on these datasets and how they affected the performance of the machine learning models. Furthermore, this study discusses how changing architectures of convolutional neural networks could affect the accuracy of models in relation to different datasets. Finally, the paper presents the results of each reviewed literature along with a brief discussion on the gaps that were identified.
内窥镜检查是最广泛使用的医疗程序,用于检查一个人的胃肠道。在内窥镜检查过程中,准确的病理检测是至关重要的,因为误诊或漏诊率会降低患者的生存机会。在人工智能与医学的成功合作之后,世界各地的研究人员尝试了不同的技术,将其用于胃肠病学。我们的研究展示了利用公开可用的数据集对内窥镜图像中现有病理检测方法的广泛调查。本文还讨论了最近发布的数据集的内容,在这些数据集上尝试的预处理技术以及它们如何影响机器学习模型的性能。此外,本研究还讨论了卷积神经网络架构的变化如何影响与不同数据集相关的模型的准确性。最后,本文介绍了每个审查文献的结果以及对已确定的差距的简要讨论。
{"title":"A Systematic Literature Review of Machine Learning based Approaches on Pathology Detection in Gastrointestinal Endoscopy","authors":"Dinisuru Nisal Gunaratna, Pumudu Fernando","doi":"10.1109/ASIANCON55314.2022.9909267","DOIUrl":"https://doi.org/10.1109/ASIANCON55314.2022.9909267","url":null,"abstract":"Endoscopy is the most widely adhered medical procedure used to examine the gastrointestinal tract of a person. Accurate pathology detection during the endoscopic procedure is crucial as misidentifications or miss rates could reduce the chance of survival for the patient. After the successful collaboration of artificial intelligence with medicine, researchers around the world have tried different techniques in using this for gastroenterology. Our study demonstrates an extensive survey on existing pathology detection methodologies in endoscopic images using the publicly available datasets. The paper also discusses the content of the recently released datasets, preprocessing techniques tried on these datasets and how they affected the performance of the machine learning models. Furthermore, this study discusses how changing architectures of convolutional neural networks could affect the accuracy of models in relation to different datasets. Finally, the paper presents the results of each reviewed literature along with a brief discussion on the gaps that were identified.","PeriodicalId":429704,"journal":{"name":"2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123868204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of On-site Channel Model for 5G Indoor Applications 5G室内应用现场信道模型研究
Pub Date : 2022-08-26 DOI: 10.1109/ASIANCON55314.2022.9909153
Shivam Wadhwa, Shailesh Mishra
In this paper, various real time indoor scenarios have been analyzed to provide the on-site practical solutions for efficient communication link establishment for futuristic 5G indoor application. The presented real time indoor scenario contains a transmitting and a receiving antenna with resonant frequency of 60GHz with 4.39 GHz bandwidth. The user equipment (UE) is considered as a receiving antenna which is placed at various coordinates in the room and a 5G transmitting antenna is placed at different positions in the room. The result analysis is carried out to find the best orientation of transmitting antenna such that it gives maximum power at the receiver antenna placed at different positions in the room. The orientation of the transmitting antenna can be implemented electronically using beamforming technique to established the efficient link.
本文通过对室内各种实时场景的分析,为未来5G室内应用的高效通信链路建立提供现场实用的解决方案。所提出的实时室内场景包含一个发射天线和一个接收天线,谐振频率为60GHz,带宽为4.39 GHz。将用户设备(UE)视为放置在房间内不同坐标的接收天线和放置在房间内不同位置的5G发射天线。通过结果分析,找出放置在房间内不同位置的接收天线的最佳发射方向,使接收天线的功率最大。利用波束形成技术可以实现发射天线的定向,从而建立有效的链路。
{"title":"Investigation of On-site Channel Model for 5G Indoor Applications","authors":"Shivam Wadhwa, Shailesh Mishra","doi":"10.1109/ASIANCON55314.2022.9909153","DOIUrl":"https://doi.org/10.1109/ASIANCON55314.2022.9909153","url":null,"abstract":"In this paper, various real time indoor scenarios have been analyzed to provide the on-site practical solutions for efficient communication link establishment for futuristic 5G indoor application. The presented real time indoor scenario contains a transmitting and a receiving antenna with resonant frequency of 60GHz with 4.39 GHz bandwidth. The user equipment (UE) is considered as a receiving antenna which is placed at various coordinates in the room and a 5G transmitting antenna is placed at different positions in the room. The result analysis is carried out to find the best orientation of transmitting antenna such that it gives maximum power at the receiver antenna placed at different positions in the room. The orientation of the transmitting antenna can be implemented electronically using beamforming technique to established the efficient link.","PeriodicalId":429704,"journal":{"name":"2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125568849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Data Feature Selection in Detecting Network Intrusion using Supervised Machine Learning Techniques 使用监督机器学习技术检测网络入侵中的网络数据特征选择
Pub Date : 2022-08-26 DOI: 10.1109/ASIANCON55314.2022.9909208
Arjonel M. Mendoza, Rowell M. Hernandez, Ryndel V. Amorado, Myrna A. Coliat, Poul Isaac C. De Chavez
Network attacks have become necessary in today’s time due to increased network traffic. To determine whether network traffic is normal or anomalous a supervised machine learning system is developed. A network intrusion detection system (IDS) is a must-have piece of a security system. This proposed study aims to discover new patterns automatically from substantial quantities of network data, reducing time manually compiling intrusion and normal behavior patterns. The best model in terms of detection success rate was discovered using a supervised learning algorithm and feature selection method. AdaBoost outperforms Neural Network, kNN, and Naive Bayes in supervised machine learning with feature selection in this study, with a detection accuracy of 100.00%, 99.30%, 91.60%, and 99.70%, respectively. The Network Intrusion Detection dataset is used to classify network intrusions to evaluate the study and it has also been used in past studies. On the other hand, the proposed model proved to be more effective than other studies in terms of intrusion detection. The proposed approach can be used in various fields, including finance, health, and transportation. Furthermore, additional parameter tuning could be added, and different feature selection techniques could be used to improve the performance of the classifiers.
由于网络流量的增加,网络攻击在当今时代变得必要。为了确定网络流量是正常还是异常,开发了一个有监督的机器学习系统。网络入侵检测系统(IDS)是安全系统中必不可少的一部分。本研究旨在从大量的网络数据中自动发现新的模式,减少人工编译入侵和正常行为模式的时间。利用有监督学习算法和特征选择方法找到了检测成功率最高的模型。在本研究中,AdaBoost在带特征选择的监督机器学习中优于神经网络、kNN和朴素贝叶斯,检测准确率分别为100.00%、99.30%、91.60%和99.70%。使用网络入侵检测数据集对网络入侵进行分类来评估研究,并且在过去的研究中也使用了该数据集。另一方面,该模型在入侵检测方面比其他研究更有效。所提出的方法可用于各个领域,包括金融、卫生和运输。此外,可以添加额外的参数调优,并且可以使用不同的特征选择技术来提高分类器的性能。
{"title":"Network Data Feature Selection in Detecting Network Intrusion using Supervised Machine Learning Techniques","authors":"Arjonel M. Mendoza, Rowell M. Hernandez, Ryndel V. Amorado, Myrna A. Coliat, Poul Isaac C. De Chavez","doi":"10.1109/ASIANCON55314.2022.9909208","DOIUrl":"https://doi.org/10.1109/ASIANCON55314.2022.9909208","url":null,"abstract":"Network attacks have become necessary in today’s time due to increased network traffic. To determine whether network traffic is normal or anomalous a supervised machine learning system is developed. A network intrusion detection system (IDS) is a must-have piece of a security system. This proposed study aims to discover new patterns automatically from substantial quantities of network data, reducing time manually compiling intrusion and normal behavior patterns. The best model in terms of detection success rate was discovered using a supervised learning algorithm and feature selection method. AdaBoost outperforms Neural Network, kNN, and Naive Bayes in supervised machine learning with feature selection in this study, with a detection accuracy of 100.00%, 99.30%, 91.60%, and 99.70%, respectively. The Network Intrusion Detection dataset is used to classify network intrusions to evaluate the study and it has also been used in past studies. On the other hand, the proposed model proved to be more effective than other studies in terms of intrusion detection. The proposed approach can be used in various fields, including finance, health, and transportation. Furthermore, additional parameter tuning could be added, and different feature selection techniques could be used to improve the performance of the classifiers.","PeriodicalId":429704,"journal":{"name":"2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129700560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interference Mitigation Approach using Massive MIMO towards 5G networks 面向5G网络的大规模MIMO干扰缓解方法
Pub Date : 2022-08-26 DOI: 10.1109/ASIANCON55314.2022.9909360
Mithra Venkatesan, A. Kulkarni, Radhika Menon, Shashikant Prasad
There is a drastic increase in the number of users who subscribe to the mobile broadband every year. On the other hand, 4G networks have reached the theoretical limits on the data rate and therefore it is not sufficient to accommodate the above increasing traffic. To overcome this problem, new Generation of mobile communication known as fifth generation (5G) comes into the picture. Large network capacity, ultra-low latency and heterogeneous device support are the important features in 5G Technology. Massive MIMO in 5G Technology is built on multi-tier architecture using several low power Base Stations (BSs) inside small cell. Simultaneous usage of the same spectrum causes interference which further reduces the system throughput and network capacity. Thus resource management is an integral part of 5G Heterogeneous Networks (HetNets) so that interference between several base stations and different devices can be minimized. Proposed scheme introduces feedback on the existing cell association and antenna allocation algorithms and also introduces the evolutionary game theory for interference mitigation in HetNets as Game theory can be efficiently modelled for a competitive and compatible environment. Impact of feedback and game theory into RATs on data rate experienced by users and revenue generated by base station from users respectively are observed. Feedback mechanism along with Game theory approach enables to make efficient and effective resource allocation decisions. This facilitates the existing Cell Association algorithms to maximize the data rate of users in different classes and the antenna allocation algorithm to maximize the total profit of the Base station. Both users and base stations are self-interested to maximize their own benefits in terms of data rate and revenue.
订阅移动宽带的用户数量每年都在急剧增加。另一方面,4G网络已经达到了数据速率的理论极限,因此它不足以容纳上述不断增加的流量。为了解决这一问题,新一代移动通信技术第五代(5G)应运而生。大网络容量、超低时延和异构设备支持是5G技术的重要特点。5G技术中的大规模MIMO建立在多层架构上,在小蜂窝内使用多个低功耗基站(BSs)。同时使用同一频谱会产生干扰,从而进一步降低系统吞吐量和网络容量。因此,资源管理是5G异构网络(HetNets)的一个组成部分,可以最大限度地减少多个基站和不同设备之间的干扰。该方案引入了对现有小区关联和天线分配算法的反馈,并引入了用于HetNets干扰缓解的进化博弈论,因为博弈论可以有效地模拟竞争和兼容的环境。观察反馈和博弈论对rat的影响分别对用户体验的数据速率和基站从用户那里获得的收益的影响。反馈机制与博弈论方法相结合,使资源配置决策高效有效。这使得现有的小区关联算法能够最大限度地提高不同类别用户的数据速率,天线分配算法能够最大限度地提高基站的总利润。用户和基站都是自私自利的,在数据速率和收入方面最大化自己的利益。
{"title":"Interference Mitigation Approach using Massive MIMO towards 5G networks","authors":"Mithra Venkatesan, A. Kulkarni, Radhika Menon, Shashikant Prasad","doi":"10.1109/ASIANCON55314.2022.9909360","DOIUrl":"https://doi.org/10.1109/ASIANCON55314.2022.9909360","url":null,"abstract":"There is a drastic increase in the number of users who subscribe to the mobile broadband every year. On the other hand, 4G networks have reached the theoretical limits on the data rate and therefore it is not sufficient to accommodate the above increasing traffic. To overcome this problem, new Generation of mobile communication known as fifth generation (5G) comes into the picture. Large network capacity, ultra-low latency and heterogeneous device support are the important features in 5G Technology. Massive MIMO in 5G Technology is built on multi-tier architecture using several low power Base Stations (BSs) inside small cell. Simultaneous usage of the same spectrum causes interference which further reduces the system throughput and network capacity. Thus resource management is an integral part of 5G Heterogeneous Networks (HetNets) so that interference between several base stations and different devices can be minimized. Proposed scheme introduces feedback on the existing cell association and antenna allocation algorithms and also introduces the evolutionary game theory for interference mitigation in HetNets as Game theory can be efficiently modelled for a competitive and compatible environment. Impact of feedback and game theory into RATs on data rate experienced by users and revenue generated by base station from users respectively are observed. Feedback mechanism along with Game theory approach enables to make efficient and effective resource allocation decisions. This facilitates the existing Cell Association algorithms to maximize the data rate of users in different classes and the antenna allocation algorithm to maximize the total profit of the Base station. Both users and base stations are self-interested to maximize their own benefits in terms of data rate and revenue.","PeriodicalId":429704,"journal":{"name":"2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129599432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Secure Communication Methodologies for WSN Assisted IoT Applications WSN辅助物联网应用的安全通信方法设计
Pub Date : 2022-08-26 DOI: 10.1109/ASIANCON55314.2022.9908931
G. P, Sanjay Kumar, Jambi Ratna Raja Kumar, Saju Raj T
Wireless Sensor Networks (WSNs) is main IoT module that gathers data from the environment and sends it to the destinations. The IOT may contain a broad variety of devices. Interconnecting several singly operating IoT devices via internet presents various issues, security that is remains a major concern given the large and frequently unknown audience. For resource-constrained nodes, most known techniques are very recursive. The sensor node’s resource will be severely shortened, compromising communication and security. However, the opponents' behaviour in WSNs has never been studied. The IoT network and its applications need a sophisticated security architecture to protect both gateway and sensor nodes from attacks. A secure communication system is the major goal of this work.
无线传感器网络(wsn)是主要的物联网模块,从环境中收集数据并将其发送到目的地。物联网可能包含各种各样的设备。通过互联网连接多个单一操作的物联网设备会出现各种问题,考虑到大量且经常未知的受众,安全性仍然是一个主要问题。对于资源受限的节点,大多数已知技术都是非常递归的。传感器节点的资源将严重缩短,危及通信和安全。然而,在无线传感器网络中,反对者的行为从未被研究过。物联网网络及其应用需要一个复杂的安全架构来保护网关和传感器节点免受攻击。一个安全的通信系统是这项工作的主要目标。
{"title":"Design of Secure Communication Methodologies for WSN Assisted IoT Applications","authors":"G. P, Sanjay Kumar, Jambi Ratna Raja Kumar, Saju Raj T","doi":"10.1109/ASIANCON55314.2022.9908931","DOIUrl":"https://doi.org/10.1109/ASIANCON55314.2022.9908931","url":null,"abstract":"Wireless Sensor Networks (WSNs) is main IoT module that gathers data from the environment and sends it to the destinations. The IOT may contain a broad variety of devices. Interconnecting several singly operating IoT devices via internet presents various issues, security that is remains a major concern given the large and frequently unknown audience. For resource-constrained nodes, most known techniques are very recursive. The sensor node’s resource will be severely shortened, compromising communication and security. However, the opponents' behaviour in WSNs has never been studied. The IoT network and its applications need a sophisticated security architecture to protect both gateway and sensor nodes from attacks. A secure communication system is the major goal of this work.","PeriodicalId":429704,"journal":{"name":"2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128504618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Multivariate Chaotic Time Series using Neural Networks 多元混沌时间序列的神经网络分析
Pub Date : 2022-08-26 DOI: 10.1109/ASIANCON55314.2022.9909083
Avani Sharma, Sumit Dhariwal
With the advent of time series prediction in multidisciplinary domains, Multivariate Chaotic Time Series (MCTS) prediction has become a popular topic of re-search. Manifold applications like weather forecasting, stocks prediction, medical support, etc., deploy such kind prediction approach to predict the future of the time series based on past observations. In literature, various solutions have been explored and proposed to forecast future values in time series data. Significant efforts have been made to utilize various Neural Networks for time series prediction considering their applicability for future data prediction. However, a comprehensive evaluation of such existing methods is missing which demands attention for accurate and efficient prediction of time series data. In this paper, we have applied and evaluated various deep learning techniques on different dynamically generated data sets. Further, a comprehensive comparison of different techniques have been presented referencing loss observed with performance matrix Mean Absolute Error.
随着时间序列预测在多学科领域的应用,多变量混沌时间序列(MCTS)预测成为研究的热点。天气预报、库存预测、医疗保障等多种应用都部署了这种预测方法,根据过去的观测结果预测时间序列的未来。在文献中,已经探索并提出了各种解决方案来预测时间序列数据的未来值。考虑到神经网络对未来数据预测的适用性,人们已经在利用各种神经网络进行时间序列预测方面做出了重大努力。然而,对这些现有方法缺乏全面的评价,这需要关注时间序列数据的准确和高效预测。在本文中,我们在不同的动态生成数据集上应用和评估了各种深度学习技术。此外,参考性能矩阵平均绝对误差观察到的损失,对不同的技术进行了全面的比较。
{"title":"Analysis of Multivariate Chaotic Time Series using Neural Networks","authors":"Avani Sharma, Sumit Dhariwal","doi":"10.1109/ASIANCON55314.2022.9909083","DOIUrl":"https://doi.org/10.1109/ASIANCON55314.2022.9909083","url":null,"abstract":"With the advent of time series prediction in multidisciplinary domains, Multivariate Chaotic Time Series (MCTS) prediction has become a popular topic of re-search. Manifold applications like weather forecasting, stocks prediction, medical support, etc., deploy such kind prediction approach to predict the future of the time series based on past observations. In literature, various solutions have been explored and proposed to forecast future values in time series data. Significant efforts have been made to utilize various Neural Networks for time series prediction considering their applicability for future data prediction. However, a comprehensive evaluation of such existing methods is missing which demands attention for accurate and efficient prediction of time series data. In this paper, we have applied and evaluated various deep learning techniques on different dynamically generated data sets. Further, a comprehensive comparison of different techniques have been presented referencing loss observed with performance matrix Mean Absolute Error.","PeriodicalId":429704,"journal":{"name":"2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124774102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptocurrency Analysis and Forecasting 加密货币分析与预测
Pub Date : 2022-08-26 DOI: 10.1109/ASIANCON55314.2022.9909168
Payal Pagariya, Sadhvee Shinde, Rupali Shivpure, Sakshi Patil, Ashwini Jarali
Cryptocurrencies are becoming a well-known and commonly acknowledged kind of substitute trade money. Most monetary businesses now include cryptocurrency. Accordingly, cryptocurrency trading is widely regarded as the most of prevalent and capable types of lucrative investments. However, because this financial sector is already known for its extreme volatility and quick price changes, over brief periods of time. For such constantly changing nature of crypto trends and price, it has become a necessary part for traders and crypto enthusiast to get a detailed analysis before investing. Also, the construction of a precise and dependable forecasting model is regarded vital for portfolio management and optimization. In this paper we propose a web system, which will help to understand cryptocurrency in a more statistical way. Proposed system focuses mainly on four coins : Bitcoin, Ethereum, Dogecoin and Shiba Inu performing analysis and forecasting on all the four coins. System will also do statistical comparison between the coins. Analysis and comparison is carried out using python libraries and modules whereas LSTM and ARIMA are used for forecasting. Extensive research was conducted using real-time and historical information, on four key cryptocurrencies, two of which had the greatest market capitalization, notably Bitcoin and Ethereum, while the other, Dogecoin and Shiba Inu, that had a significant growth in market capitalization over the previous year. In comparison to old fully-connected deep neural networks, the suggested model may employ mixed crypto data more proficiently, minimizing overfitting and computing costs.
加密货币正在成为一种众所周知的、公认的替代交易货币。现在大多数货币业务都包括加密货币。因此,加密货币交易被广泛认为是最普遍和最有利可图的投资类型。然而,由于这个金融部门已经以其极端的波动性和快速的价格变化而闻名,在短时间内。对于这种不断变化的加密趋势和价格性质,交易者和加密爱好者在投资前进行详细分析已成为必要的一部分。此外,建立一个精确可靠的预测模型对投资组合管理和优化至关重要。在本文中,我们提出了一个web系统,它将有助于以更统计的方式理解加密货币。提出的系统主要针对比特币、以太坊、狗狗币和柴犬四种货币进行分析和预测。系统还会对硬币进行统计比较。使用python库和模块进行分析和比较,而使用LSTM和ARIMA进行预测。使用实时和历史信息对四种主要加密货币进行了广泛的研究,其中两种市值最大,特别是比特币和以太坊,而另一种是狗狗币和柴犬,它们的市值在过去一年中显着增长。与旧的全连接深度神经网络相比,建议的模型可以更熟练地使用混合加密数据,最大限度地减少过拟合和计算成本。
{"title":"Cryptocurrency Analysis and Forecasting","authors":"Payal Pagariya, Sadhvee Shinde, Rupali Shivpure, Sakshi Patil, Ashwini Jarali","doi":"10.1109/ASIANCON55314.2022.9909168","DOIUrl":"https://doi.org/10.1109/ASIANCON55314.2022.9909168","url":null,"abstract":"Cryptocurrencies are becoming a well-known and commonly acknowledged kind of substitute trade money. Most monetary businesses now include cryptocurrency. Accordingly, cryptocurrency trading is widely regarded as the most of prevalent and capable types of lucrative investments. However, because this financial sector is already known for its extreme volatility and quick price changes, over brief periods of time. For such constantly changing nature of crypto trends and price, it has become a necessary part for traders and crypto enthusiast to get a detailed analysis before investing. Also, the construction of a precise and dependable forecasting model is regarded vital for portfolio management and optimization. In this paper we propose a web system, which will help to understand cryptocurrency in a more statistical way. Proposed system focuses mainly on four coins : Bitcoin, Ethereum, Dogecoin and Shiba Inu performing analysis and forecasting on all the four coins. System will also do statistical comparison between the coins. Analysis and comparison is carried out using python libraries and modules whereas LSTM and ARIMA are used for forecasting. Extensive research was conducted using real-time and historical information, on four key cryptocurrencies, two of which had the greatest market capitalization, notably Bitcoin and Ethereum, while the other, Dogecoin and Shiba Inu, that had a significant growth in market capitalization over the previous year. In comparison to old fully-connected deep neural networks, the suggested model may employ mixed crypto data more proficiently, minimizing overfitting and computing costs.","PeriodicalId":429704,"journal":{"name":"2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121806240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 2nd Asian Conference on Innovation in Technology (ASIANCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1