首页 > 最新文献

2022 2nd Asian Conference on Innovation in Technology (ASIANCON)最新文献

英文 中文
Secure QR Code Scanner to Detect Malicious URL using Machine Learning 安全QR码扫描仪检测恶意URL使用机器学习
Pub Date : 2022-08-26 DOI: 10.1109/ASIANCON55314.2022.9908759
Atharva Pawar, Chirag Fatnani, Rajani Sonavane, Riya Waghmare, Sarang A. Saoji
Q-R codes are utilised for a variety of purposes, including accessing online web-pages and making a settlement. The Internet facilitates a wide range of illegal acts, including unsolicited e-marketing, financial embezzlement, and malicious distribution. Even though all the users identify the presence of Q-R codes visually, the information stored in those codes can only be accessed through an allocated Q-R code decoder. Q-R codes have also been shown to be used as an effective attack vector, For example techniques include social engineering, phishing, pharming, etc. Harmful codes are distributed under false pretences in congested areas, or malicious Q-R codes are pasted over current ones on billboards. Finally, consumers rely on decoder operating system to determine a random Q-R code is whether malicious or benign.For the purpose of this report, we consider the identification of malicious Q-R codes as a two-way classification problem in this research, and we test the effectiveness of many well-known M-L algorithms, including namely K-Nearest Neighbour, Random Forest, Binary LSTM and Support Vector Machine. This implies that the proposed method might be deemed an optimal and user-friendly QR code security solution. We created a prototype to test our recommendations and found it to be secure and usable in protecting users from harmful QR Codes.
Q-R码用于各种目的,包括访问在线网页和进行结算。互联网为各种非法行为提供了便利,包括未经请求的电子营销、挪用资金和恶意分销。尽管所有用户都能直观地识别出Q-R码的存在,但存储在这些码中的信息只能通过分配的Q-R码解码器访问。Q-R代码也被证明是一种有效的攻击载体,例如技术包括社会工程,网络钓鱼,钓鱼等。有害的代码在拥挤的地区以虚假的名义分发,或者恶意的Q-R代码粘贴在广告牌上的现有代码之上。最后,消费者依靠解码器操作系统来确定一个随机Q-R码是恶意还是良性。在本报告中,我们将恶意Q-R码的识别视为一个双向分类问题,并测试了许多知名的M-L算法的有效性,包括k -近邻算法、随机森林算法、二进制LSTM算法和支持向量机算法。这意味着所提出的方法可能被认为是一种最佳的、用户友好的二维码安全解决方案。我们创建了一个原型来测试我们的建议,发现它既安全又可用,可以保护用户免受有害QR码的伤害。
{"title":"Secure QR Code Scanner to Detect Malicious URL using Machine Learning","authors":"Atharva Pawar, Chirag Fatnani, Rajani Sonavane, Riya Waghmare, Sarang A. Saoji","doi":"10.1109/ASIANCON55314.2022.9908759","DOIUrl":"https://doi.org/10.1109/ASIANCON55314.2022.9908759","url":null,"abstract":"Q-R codes are utilised for a variety of purposes, including accessing online web-pages and making a settlement. The Internet facilitates a wide range of illegal acts, including unsolicited e-marketing, financial embezzlement, and malicious distribution. Even though all the users identify the presence of Q-R codes visually, the information stored in those codes can only be accessed through an allocated Q-R code decoder. Q-R codes have also been shown to be used as an effective attack vector, For example techniques include social engineering, phishing, pharming, etc. Harmful codes are distributed under false pretences in congested areas, or malicious Q-R codes are pasted over current ones on billboards. Finally, consumers rely on decoder operating system to determine a random Q-R code is whether malicious or benign.For the purpose of this report, we consider the identification of malicious Q-R codes as a two-way classification problem in this research, and we test the effectiveness of many well-known M-L algorithms, including namely K-Nearest Neighbour, Random Forest, Binary LSTM and Support Vector Machine. This implies that the proposed method might be deemed an optimal and user-friendly QR code security solution. We created a prototype to test our recommendations and found it to be secure and usable in protecting users from harmful QR Codes.","PeriodicalId":429704,"journal":{"name":"2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116106444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Systematic Literature Review of Machine Learning based Approaches on Pathology Detection in Gastrointestinal Endoscopy 基于机器学习的胃肠内镜病理检测方法的系统文献综述
Pub Date : 2022-08-26 DOI: 10.1109/ASIANCON55314.2022.9909267
Dinisuru Nisal Gunaratna, Pumudu Fernando
Endoscopy is the most widely adhered medical procedure used to examine the gastrointestinal tract of a person. Accurate pathology detection during the endoscopic procedure is crucial as misidentifications or miss rates could reduce the chance of survival for the patient. After the successful collaboration of artificial intelligence with medicine, researchers around the world have tried different techniques in using this for gastroenterology. Our study demonstrates an extensive survey on existing pathology detection methodologies in endoscopic images using the publicly available datasets. The paper also discusses the content of the recently released datasets, preprocessing techniques tried on these datasets and how they affected the performance of the machine learning models. Furthermore, this study discusses how changing architectures of convolutional neural networks could affect the accuracy of models in relation to different datasets. Finally, the paper presents the results of each reviewed literature along with a brief discussion on the gaps that were identified.
内窥镜检查是最广泛使用的医疗程序,用于检查一个人的胃肠道。在内窥镜检查过程中,准确的病理检测是至关重要的,因为误诊或漏诊率会降低患者的生存机会。在人工智能与医学的成功合作之后,世界各地的研究人员尝试了不同的技术,将其用于胃肠病学。我们的研究展示了利用公开可用的数据集对内窥镜图像中现有病理检测方法的广泛调查。本文还讨论了最近发布的数据集的内容,在这些数据集上尝试的预处理技术以及它们如何影响机器学习模型的性能。此外,本研究还讨论了卷积神经网络架构的变化如何影响与不同数据集相关的模型的准确性。最后,本文介绍了每个审查文献的结果以及对已确定的差距的简要讨论。
{"title":"A Systematic Literature Review of Machine Learning based Approaches on Pathology Detection in Gastrointestinal Endoscopy","authors":"Dinisuru Nisal Gunaratna, Pumudu Fernando","doi":"10.1109/ASIANCON55314.2022.9909267","DOIUrl":"https://doi.org/10.1109/ASIANCON55314.2022.9909267","url":null,"abstract":"Endoscopy is the most widely adhered medical procedure used to examine the gastrointestinal tract of a person. Accurate pathology detection during the endoscopic procedure is crucial as misidentifications or miss rates could reduce the chance of survival for the patient. After the successful collaboration of artificial intelligence with medicine, researchers around the world have tried different techniques in using this for gastroenterology. Our study demonstrates an extensive survey on existing pathology detection methodologies in endoscopic images using the publicly available datasets. The paper also discusses the content of the recently released datasets, preprocessing techniques tried on these datasets and how they affected the performance of the machine learning models. Furthermore, this study discusses how changing architectures of convolutional neural networks could affect the accuracy of models in relation to different datasets. Finally, the paper presents the results of each reviewed literature along with a brief discussion on the gaps that were identified.","PeriodicalId":429704,"journal":{"name":"2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123868204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Imputing missing values for Dataset of Used Cars 二手车数据集缺失值的估算
Pub Date : 2022-08-26 DOI: 10.1109/ASIANCON55314.2022.9908600
Samveg Shah, Mayur Telrandhe, Prathmesh Waghmode, Sunil Ghane
Missing values in a dataset has always been a problem for data analysis and modelling. Building a model over a dataset where the missing values are not handled properly will definitely degrade the accuracy and performance of model. This problem particularly impacts deterministic models. Knowing that majority of the models that are used today are deterministic makes dealing with missing values crucial before applying the machine learning model. In this paper we have discussed various approaches such as statistical method (using mean), MICE and KNN for imputing missing values and tested their accuracy in combination with two prediction algorithms linear regression and random forest regression. We have used dataset of used cars containing missing values in few columns to predict the price of car given the details of car and thus comparing the accuracy of the estimated price with different approaches.
数据集中的缺失值一直是数据分析和建模的一个问题。在缺失值处理不当的数据集上构建模型肯定会降低模型的准确性和性能。这个问题特别影响确定性模型。目前使用的大多数模型都是确定性的,因此在应用机器学习模型之前处理缺失值至关重要。在本文中,我们讨论了各种方法,如统计方法(使用平均值),MICE和KNN来推算缺失值,并结合线性回归和随机森林回归两种预测算法测试了它们的准确性。我们使用了包含缺失值的二手车数据集来预测给定汽车细节的汽车价格,从而比较了不同方法估计价格的准确性。
{"title":"Imputing missing values for Dataset of Used Cars","authors":"Samveg Shah, Mayur Telrandhe, Prathmesh Waghmode, Sunil Ghane","doi":"10.1109/ASIANCON55314.2022.9908600","DOIUrl":"https://doi.org/10.1109/ASIANCON55314.2022.9908600","url":null,"abstract":"Missing values in a dataset has always been a problem for data analysis and modelling. Building a model over a dataset where the missing values are not handled properly will definitely degrade the accuracy and performance of model. This problem particularly impacts deterministic models. Knowing that majority of the models that are used today are deterministic makes dealing with missing values crucial before applying the machine learning model. In this paper we have discussed various approaches such as statistical method (using mean), MICE and KNN for imputing missing values and tested their accuracy in combination with two prediction algorithms linear regression and random forest regression. We have used dataset of used cars containing missing values in few columns to predict the price of car given the details of car and thus comparing the accuracy of the estimated price with different approaches.","PeriodicalId":429704,"journal":{"name":"2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131160341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interference Mitigation Approach using Massive MIMO towards 5G networks 面向5G网络的大规模MIMO干扰缓解方法
Pub Date : 2022-08-26 DOI: 10.1109/ASIANCON55314.2022.9909360
Mithra Venkatesan, A. Kulkarni, Radhika Menon, Shashikant Prasad
There is a drastic increase in the number of users who subscribe to the mobile broadband every year. On the other hand, 4G networks have reached the theoretical limits on the data rate and therefore it is not sufficient to accommodate the above increasing traffic. To overcome this problem, new Generation of mobile communication known as fifth generation (5G) comes into the picture. Large network capacity, ultra-low latency and heterogeneous device support are the important features in 5G Technology. Massive MIMO in 5G Technology is built on multi-tier architecture using several low power Base Stations (BSs) inside small cell. Simultaneous usage of the same spectrum causes interference which further reduces the system throughput and network capacity. Thus resource management is an integral part of 5G Heterogeneous Networks (HetNets) so that interference between several base stations and different devices can be minimized. Proposed scheme introduces feedback on the existing cell association and antenna allocation algorithms and also introduces the evolutionary game theory for interference mitigation in HetNets as Game theory can be efficiently modelled for a competitive and compatible environment. Impact of feedback and game theory into RATs on data rate experienced by users and revenue generated by base station from users respectively are observed. Feedback mechanism along with Game theory approach enables to make efficient and effective resource allocation decisions. This facilitates the existing Cell Association algorithms to maximize the data rate of users in different classes and the antenna allocation algorithm to maximize the total profit of the Base station. Both users and base stations are self-interested to maximize their own benefits in terms of data rate and revenue.
订阅移动宽带的用户数量每年都在急剧增加。另一方面,4G网络已经达到了数据速率的理论极限,因此它不足以容纳上述不断增加的流量。为了解决这一问题,新一代移动通信技术第五代(5G)应运而生。大网络容量、超低时延和异构设备支持是5G技术的重要特点。5G技术中的大规模MIMO建立在多层架构上,在小蜂窝内使用多个低功耗基站(BSs)。同时使用同一频谱会产生干扰,从而进一步降低系统吞吐量和网络容量。因此,资源管理是5G异构网络(HetNets)的一个组成部分,可以最大限度地减少多个基站和不同设备之间的干扰。该方案引入了对现有小区关联和天线分配算法的反馈,并引入了用于HetNets干扰缓解的进化博弈论,因为博弈论可以有效地模拟竞争和兼容的环境。观察反馈和博弈论对rat的影响分别对用户体验的数据速率和基站从用户那里获得的收益的影响。反馈机制与博弈论方法相结合,使资源配置决策高效有效。这使得现有的小区关联算法能够最大限度地提高不同类别用户的数据速率,天线分配算法能够最大限度地提高基站的总利润。用户和基站都是自私自利的,在数据速率和收入方面最大化自己的利益。
{"title":"Interference Mitigation Approach using Massive MIMO towards 5G networks","authors":"Mithra Venkatesan, A. Kulkarni, Radhika Menon, Shashikant Prasad","doi":"10.1109/ASIANCON55314.2022.9909360","DOIUrl":"https://doi.org/10.1109/ASIANCON55314.2022.9909360","url":null,"abstract":"There is a drastic increase in the number of users who subscribe to the mobile broadband every year. On the other hand, 4G networks have reached the theoretical limits on the data rate and therefore it is not sufficient to accommodate the above increasing traffic. To overcome this problem, new Generation of mobile communication known as fifth generation (5G) comes into the picture. Large network capacity, ultra-low latency and heterogeneous device support are the important features in 5G Technology. Massive MIMO in 5G Technology is built on multi-tier architecture using several low power Base Stations (BSs) inside small cell. Simultaneous usage of the same spectrum causes interference which further reduces the system throughput and network capacity. Thus resource management is an integral part of 5G Heterogeneous Networks (HetNets) so that interference between several base stations and different devices can be minimized. Proposed scheme introduces feedback on the existing cell association and antenna allocation algorithms and also introduces the evolutionary game theory for interference mitigation in HetNets as Game theory can be efficiently modelled for a competitive and compatible environment. Impact of feedback and game theory into RATs on data rate experienced by users and revenue generated by base station from users respectively are observed. Feedback mechanism along with Game theory approach enables to make efficient and effective resource allocation decisions. This facilitates the existing Cell Association algorithms to maximize the data rate of users in different classes and the antenna allocation algorithm to maximize the total profit of the Base station. Both users and base stations are self-interested to maximize their own benefits in terms of data rate and revenue.","PeriodicalId":429704,"journal":{"name":"2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129599432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sentiment Classification of English and Hindi Music Lyrics Using Supervised Machine Learning Algorithms 使用监督机器学习算法的英语和印地语音乐歌词情感分类
Pub Date : 2022-08-26 DOI: 10.1109/ASIANCON55314.2022.9908688
S. N., Shruti Wagle, Priyanka Ghosh, Karishma Kishore
Finding music based on one’s mood is difficult unless it is manually classified and separated into distinct playlists. This is especially tough when the song is not in English due to varying lexical and syntactic styles. Our project employs textual sentiment analysis by testing various binary classifier algorithms - Random Forest, Naive Bayes, Support Vector Machine (SVM), and AdaBoost - to gauge which method is best for classifying English and Hindi language music lyrics into positive (happy) and negative (sad) sentiment.
根据一个人的情绪找到音乐是很困难的,除非它被手动分类并分成不同的播放列表。当这首歌不是英文的时候,由于词汇和句法风格的不同,这尤其困难。我们的项目采用文本情感分析,通过测试各种二元分类算法——随机森林、朴素贝叶斯、支持向量机(SVM)和AdaBoost——来衡量哪种方法最适合将英语和印地语音乐歌词分为积极(快乐)和消极(悲伤)情绪。
{"title":"Sentiment Classification of English and Hindi Music Lyrics Using Supervised Machine Learning Algorithms","authors":"S. N., Shruti Wagle, Priyanka Ghosh, Karishma Kishore","doi":"10.1109/ASIANCON55314.2022.9908688","DOIUrl":"https://doi.org/10.1109/ASIANCON55314.2022.9908688","url":null,"abstract":"Finding music based on one’s mood is difficult unless it is manually classified and separated into distinct playlists. This is especially tough when the song is not in English due to varying lexical and syntactic styles. Our project employs textual sentiment analysis by testing various binary classifier algorithms - Random Forest, Naive Bayes, Support Vector Machine (SVM), and AdaBoost - to gauge which method is best for classifying English and Hindi language music lyrics into positive (happy) and negative (sad) sentiment.","PeriodicalId":429704,"journal":{"name":"2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131178107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Detection and Mitigation on Sub Synchronous Resonance in Wind Farm with Series Compensated Line 串联补偿线路对风电场次同步谐振的增强检测与抑制
Pub Date : 2022-08-26 DOI: 10.1109/ASIANCON55314.2022.9908712
Keerthana P.B., Joseph K.D.
Recently, wind energy generation grows quickly because of its economical features and it has less effect on mother earth. The long-distance between generation and customer reduces the maximum transmittable power. For addressing this issue series compensation is broadly used to raise the capacity of transmission. But the insertion of capacitors has the hazardous issue of Sub Synchronous Resonance (SSR). An Enhanced Detection Technique(EDT) is used in Double Fed Induction Generator (DFIG) based wind power system connected to the series compensated line(SCL) for fast detection of SSR. Comparison of enhanced detection technique with the traditional technique validate the superiority of EDT. SSR Damping Controller (SSRDC) in the static synchronous compensator (STATCOM) is applied for mitigation of hazardous effect of SSR. The voltage signal is the input for the detection circuit and line current signal is the input for SSRDC.
近年来,风力发电因其经济的特点和对地球母亲的影响小而迅速发展。发电厂和用户之间的距离降低了最大可传输功率。为了解决这一问题,广泛采用串联补偿来提高传输容量。但电容器的插入存在次同步谐振的危险问题。将一种增强检测技术(EDT)应用于双馈感应发电机(DFIG)与串联补偿线(SCL)相连的风力发电系统中,以实现对SSR的快速检测。增强检测技术与传统检测技术的对比验证了EDT的优越性。在静态同步补偿器(STATCOM)中采用SSR阻尼控制器(SSRDC)来减轻SSR的危害效应。电压信号是检测电路的输入,线路电流信号是SSRDC的输入。
{"title":"Enhanced Detection and Mitigation on Sub Synchronous Resonance in Wind Farm with Series Compensated Line","authors":"Keerthana P.B., Joseph K.D.","doi":"10.1109/ASIANCON55314.2022.9908712","DOIUrl":"https://doi.org/10.1109/ASIANCON55314.2022.9908712","url":null,"abstract":"Recently, wind energy generation grows quickly because of its economical features and it has less effect on mother earth. The long-distance between generation and customer reduces the maximum transmittable power. For addressing this issue series compensation is broadly used to raise the capacity of transmission. But the insertion of capacitors has the hazardous issue of Sub Synchronous Resonance (SSR). An Enhanced Detection Technique(EDT) is used in Double Fed Induction Generator (DFIG) based wind power system connected to the series compensated line(SCL) for fast detection of SSR. Comparison of enhanced detection technique with the traditional technique validate the superiority of EDT. SSR Damping Controller (SSRDC) in the static synchronous compensator (STATCOM) is applied for mitigation of hazardous effect of SSR. The voltage signal is the input for the detection circuit and line current signal is the input for SSRDC.","PeriodicalId":429704,"journal":{"name":"2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128735589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Multivariate Chaotic Time Series using Neural Networks 多元混沌时间序列的神经网络分析
Pub Date : 2022-08-26 DOI: 10.1109/ASIANCON55314.2022.9909083
Avani Sharma, Sumit Dhariwal
With the advent of time series prediction in multidisciplinary domains, Multivariate Chaotic Time Series (MCTS) prediction has become a popular topic of re-search. Manifold applications like weather forecasting, stocks prediction, medical support, etc., deploy such kind prediction approach to predict the future of the time series based on past observations. In literature, various solutions have been explored and proposed to forecast future values in time series data. Significant efforts have been made to utilize various Neural Networks for time series prediction considering their applicability for future data prediction. However, a comprehensive evaluation of such existing methods is missing which demands attention for accurate and efficient prediction of time series data. In this paper, we have applied and evaluated various deep learning techniques on different dynamically generated data sets. Further, a comprehensive comparison of different techniques have been presented referencing loss observed with performance matrix Mean Absolute Error.
随着时间序列预测在多学科领域的应用,多变量混沌时间序列(MCTS)预测成为研究的热点。天气预报、库存预测、医疗保障等多种应用都部署了这种预测方法,根据过去的观测结果预测时间序列的未来。在文献中,已经探索并提出了各种解决方案来预测时间序列数据的未来值。考虑到神经网络对未来数据预测的适用性,人们已经在利用各种神经网络进行时间序列预测方面做出了重大努力。然而,对这些现有方法缺乏全面的评价,这需要关注时间序列数据的准确和高效预测。在本文中,我们在不同的动态生成数据集上应用和评估了各种深度学习技术。此外,参考性能矩阵平均绝对误差观察到的损失,对不同的技术进行了全面的比较。
{"title":"Analysis of Multivariate Chaotic Time Series using Neural Networks","authors":"Avani Sharma, Sumit Dhariwal","doi":"10.1109/ASIANCON55314.2022.9909083","DOIUrl":"https://doi.org/10.1109/ASIANCON55314.2022.9909083","url":null,"abstract":"With the advent of time series prediction in multidisciplinary domains, Multivariate Chaotic Time Series (MCTS) prediction has become a popular topic of re-search. Manifold applications like weather forecasting, stocks prediction, medical support, etc., deploy such kind prediction approach to predict the future of the time series based on past observations. In literature, various solutions have been explored and proposed to forecast future values in time series data. Significant efforts have been made to utilize various Neural Networks for time series prediction considering their applicability for future data prediction. However, a comprehensive evaluation of such existing methods is missing which demands attention for accurate and efficient prediction of time series data. In this paper, we have applied and evaluated various deep learning techniques on different dynamically generated data sets. Further, a comprehensive comparison of different techniques have been presented referencing loss observed with performance matrix Mean Absolute Error.","PeriodicalId":429704,"journal":{"name":"2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124774102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Secure Communication Methodologies for WSN Assisted IoT Applications WSN辅助物联网应用的安全通信方法设计
Pub Date : 2022-08-26 DOI: 10.1109/ASIANCON55314.2022.9908931
G. P, Sanjay Kumar, Jambi Ratna Raja Kumar, Saju Raj T
Wireless Sensor Networks (WSNs) is main IoT module that gathers data from the environment and sends it to the destinations. The IOT may contain a broad variety of devices. Interconnecting several singly operating IoT devices via internet presents various issues, security that is remains a major concern given the large and frequently unknown audience. For resource-constrained nodes, most known techniques are very recursive. The sensor node’s resource will be severely shortened, compromising communication and security. However, the opponents' behaviour in WSNs has never been studied. The IoT network and its applications need a sophisticated security architecture to protect both gateway and sensor nodes from attacks. A secure communication system is the major goal of this work.
无线传感器网络(wsn)是主要的物联网模块,从环境中收集数据并将其发送到目的地。物联网可能包含各种各样的设备。通过互联网连接多个单一操作的物联网设备会出现各种问题,考虑到大量且经常未知的受众,安全性仍然是一个主要问题。对于资源受限的节点,大多数已知技术都是非常递归的。传感器节点的资源将严重缩短,危及通信和安全。然而,在无线传感器网络中,反对者的行为从未被研究过。物联网网络及其应用需要一个复杂的安全架构来保护网关和传感器节点免受攻击。一个安全的通信系统是这项工作的主要目标。
{"title":"Design of Secure Communication Methodologies for WSN Assisted IoT Applications","authors":"G. P, Sanjay Kumar, Jambi Ratna Raja Kumar, Saju Raj T","doi":"10.1109/ASIANCON55314.2022.9908931","DOIUrl":"https://doi.org/10.1109/ASIANCON55314.2022.9908931","url":null,"abstract":"Wireless Sensor Networks (WSNs) is main IoT module that gathers data from the environment and sends it to the destinations. The IOT may contain a broad variety of devices. Interconnecting several singly operating IoT devices via internet presents various issues, security that is remains a major concern given the large and frequently unknown audience. For resource-constrained nodes, most known techniques are very recursive. The sensor node’s resource will be severely shortened, compromising communication and security. However, the opponents' behaviour in WSNs has never been studied. The IoT network and its applications need a sophisticated security architecture to protect both gateway and sensor nodes from attacks. A secure communication system is the major goal of this work.","PeriodicalId":429704,"journal":{"name":"2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128504618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Investigation of On-site Channel Model for 5G Indoor Applications 5G室内应用现场信道模型研究
Pub Date : 2022-08-26 DOI: 10.1109/ASIANCON55314.2022.9909153
Shivam Wadhwa, Shailesh Mishra
In this paper, various real time indoor scenarios have been analyzed to provide the on-site practical solutions for efficient communication link establishment for futuristic 5G indoor application. The presented real time indoor scenario contains a transmitting and a receiving antenna with resonant frequency of 60GHz with 4.39 GHz bandwidth. The user equipment (UE) is considered as a receiving antenna which is placed at various coordinates in the room and a 5G transmitting antenna is placed at different positions in the room. The result analysis is carried out to find the best orientation of transmitting antenna such that it gives maximum power at the receiver antenna placed at different positions in the room. The orientation of the transmitting antenna can be implemented electronically using beamforming technique to established the efficient link.
本文通过对室内各种实时场景的分析,为未来5G室内应用的高效通信链路建立提供现场实用的解决方案。所提出的实时室内场景包含一个发射天线和一个接收天线,谐振频率为60GHz,带宽为4.39 GHz。将用户设备(UE)视为放置在房间内不同坐标的接收天线和放置在房间内不同位置的5G发射天线。通过结果分析,找出放置在房间内不同位置的接收天线的最佳发射方向,使接收天线的功率最大。利用波束形成技术可以实现发射天线的定向,从而建立有效的链路。
{"title":"Investigation of On-site Channel Model for 5G Indoor Applications","authors":"Shivam Wadhwa, Shailesh Mishra","doi":"10.1109/ASIANCON55314.2022.9909153","DOIUrl":"https://doi.org/10.1109/ASIANCON55314.2022.9909153","url":null,"abstract":"In this paper, various real time indoor scenarios have been analyzed to provide the on-site practical solutions for efficient communication link establishment for futuristic 5G indoor application. The presented real time indoor scenario contains a transmitting and a receiving antenna with resonant frequency of 60GHz with 4.39 GHz bandwidth. The user equipment (UE) is considered as a receiving antenna which is placed at various coordinates in the room and a 5G transmitting antenna is placed at different positions in the room. The result analysis is carried out to find the best orientation of transmitting antenna such that it gives maximum power at the receiver antenna placed at different positions in the room. The orientation of the transmitting antenna can be implemented electronically using beamforming technique to established the efficient link.","PeriodicalId":429704,"journal":{"name":"2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125568849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying Vulnerabilities in Docker Image Code using ML Techniques 使用 ML 技术识别 Docker Image 代码中的漏洞
Pub Date : 2022-08-26 DOI: 10.1109/ASIANCON55314.2022.9908676
Jayama Pinnamaneni, N. S, Prasad B. Honnavalli
A Docker container image can be defined as a lightweight, unattached, executable package of software that includes everything like code, runtime, system tools, system libraries and settings, needed to run an application, because of these features the container images are preferred over virtual machines. With this enormous usage, there is a lot of scope for the security issues arising in the container images. There are many open-source projects like Anchore, Clair that statically scan the container image’s docker file to find the vulnerabilities using databases like CVE, RedHat etc. Static analysis of container image main code is equally necessary to identify any vulnerabilities in the code and not only focus on the vulnerabilities based on OS level, as many malicious activities might take place if code is not scanned for any vulnerabilities. The main aim of the project is to create a static code analysing machine learning model to identify the vulnerable python libraries in container images.
Docker 容器镜像可定义为一个轻量级、无附加、可执行的软件包,其中包括运行应用程序所需的代码、运行时、系统工具、系统库和设置等一切内容。由于使用量巨大,容器映像中出现的安全问题也有很大的空间。有许多开源项目,如 Anchore、Clair 等,都会使用 CVE、RedHat 等数据库对容器镜像的 docker 文件进行静态扫描,以查找漏洞。对容器镜像的主代码进行静态分析同样有必要,这样才能识别代码中的任何漏洞,而不是仅仅关注基于操作系统级别的漏洞,因为如果不扫描代码中的任何漏洞,可能会发生许多恶意活动。该项目的主要目的是创建一个静态代码分析机器学习模型,以识别容器镜像中存在漏洞的 python 库。
{"title":"Identifying Vulnerabilities in Docker Image Code using ML Techniques","authors":"Jayama Pinnamaneni, N. S, Prasad B. Honnavalli","doi":"10.1109/ASIANCON55314.2022.9908676","DOIUrl":"https://doi.org/10.1109/ASIANCON55314.2022.9908676","url":null,"abstract":"A Docker container image can be defined as a lightweight, unattached, executable package of software that includes everything like code, runtime, system tools, system libraries and settings, needed to run an application, because of these features the container images are preferred over virtual machines. With this enormous usage, there is a lot of scope for the security issues arising in the container images. There are many open-source projects like Anchore, Clair that statically scan the container image’s docker file to find the vulnerabilities using databases like CVE, RedHat etc. Static analysis of container image main code is equally necessary to identify any vulnerabilities in the code and not only focus on the vulnerabilities based on OS level, as many malicious activities might take place if code is not scanned for any vulnerabilities. The main aim of the project is to create a static code analysing machine learning model to identify the vulnerable python libraries in container images.","PeriodicalId":429704,"journal":{"name":"2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127010420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 2nd Asian Conference on Innovation in Technology (ASIANCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1