首页 > 最新文献

2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)最新文献

英文 中文
SMD Defect Classification by Convolution Neural Network and PCB Image Transform 基于卷积神经网络和PCB图像变换的SMD缺陷分类
Young-Gyu Kim, Dae-ui Lim, Jong-Hyun Ryu, T. Park
Surface Mount Technology (SMT) is a manufacturing process in which chips are mounted on the surface of a printed circuit board (PCB). The automatic optical inspection system (AOI) has mainly used the learning-based method for the defect classification of the SMT process, and recently the CNN-based classification method has appeared. However, existing techniques do not consider the area margin of the part and uneven color distribution according to the position of the chip, so the classification accuracy decreases. In this paper, we propose a system that can extract the chip region and improve the color distribution by the input image transformation. We extract the correct chip area through vertical and horizontal projection, and the color improvement enhance the brightness value distribution of the chip image through local histogram stretching. By experimental result, we prove the performance of the proposed classification method.
表面贴装技术(SMT)是一种将芯片安装在印刷电路板(PCB)表面上的制造工艺。自动光学检测系统(AOI)主要采用基于学习的方法对SMT工艺缺陷进行分类,近年来出现了基于cnn的分类方法。然而,现有的技术没有根据芯片的位置考虑零件的面积边缘和颜色分布的不均匀,因此分类精度降低。本文提出了一种通过输入图像变换提取芯片区域并改善颜色分布的系统。我们通过垂直和水平投影提取出正确的芯片区域,颜色改进通过局部直方图拉伸增强芯片图像的亮度值分布。实验结果证明了该分类方法的有效性。
{"title":"SMD Defect Classification by Convolution Neural Network and PCB Image Transform","authors":"Young-Gyu Kim, Dae-ui Lim, Jong-Hyun Ryu, T. Park","doi":"10.1109/CCCS.2018.8586818","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586818","url":null,"abstract":"Surface Mount Technology (SMT) is a manufacturing process in which chips are mounted on the surface of a printed circuit board (PCB). The automatic optical inspection system (AOI) has mainly used the learning-based method for the defect classification of the SMT process, and recently the CNN-based classification method has appeared. However, existing techniques do not consider the area margin of the part and uneven color distribution according to the position of the chip, so the classification accuracy decreases. In this paper, we propose a system that can extract the chip region and improve the color distribution by the input image transformation. We extract the correct chip area through vertical and horizontal projection, and the color improvement enhance the brightness value distribution of the chip image through local histogram stretching. By experimental result, we prove the performance of the proposed classification method.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"48 1","pages":"180-183"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85454519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Benchmarking datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 alternatives 基于异常的网络入侵检测的基准测试数据集:KDD CUP 99替代方案
Abhishek Divekar, Meet Parekh, Vaibhav Savla, Rudra Mishra, M. Shirole
Machine Learning has been steadily gaining traction for its use in Anomaly-based Network Intrusion Detection Systems (A-NIDS). Research into this domain is frequently performed using the KDD CUP 99 dataset as a benchmark. Several studies question its usability while constructing a contemporary NIDS, due to the skewed response distribution, non-stationarity, and failure to incorporate modern attacks. In this paper, we compare the performance for KDD-99 alternatives when trained using classification models commonly found in literature: Neural Network, Support Vector Machine, Decision Tree, Random Forest, Naive Bayes and K-Means. Applying the SMOTE oversampling technique and random undersampling, we create a balanced version of NSL-KDD and prove that skewed target classes in KDD-99 and NSL-KDD hamper the efficacy of classifiers on minority classes (U2R and R2L), leading to possible security risks. We explore UNSW-NB15, a modern substitute to KDD-99 with greater uniformity of pattern distribution. We benchmark this dataset before and after SMOTE oversampling to observe the effect on minority performance. Our results indicate that classifiers trained on UNSW-NB15 match or better the Weighted F1-Score of those trained on NSL-KDD and KDD-99 in the binary case, thus advocating UNSW-NB15 as a modern substitute to these datasets.
机器学习在基于异常的网络入侵检测系统(A-NIDS)中的应用一直在稳步获得关注。对这个领域的研究经常使用KDD CUP 99数据集作为基准。一些研究质疑其在构建当代NIDS时的可用性,因为响应分布偏斜、非平稳性和未能纳入现代攻击。在本文中,我们比较了在使用文献中常见的分类模型(神经网络、支持向量机、决策树、随机森林、朴素贝叶斯和K-Means)训练KDD-99备选方案时的性能。利用SMOTE过采样技术和随机欠采样,我们创建了一个平衡版本的NSL-KDD,并证明了KDD-99和NSL-KDD中倾斜的目标类别阻碍了分类器对少数类别(U2R和R2L)的有效性,从而导致可能的安全风险。我们探索的UNSW-NB15是KDD-99的现代替代品,具有更均匀的格局分布。我们在SMOTE过采样之前和之后对该数据集进行基准测试,以观察对少数派性能的影响。我们的研究结果表明,在二元情况下,UNSW-NB15训练的分类器与NSL-KDD和KDD-99训练的分类器的加权F1-Score相当或更好,因此提倡UNSW-NB15作为这些数据集的现代替代品。
{"title":"Benchmarking datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 alternatives","authors":"Abhishek Divekar, Meet Parekh, Vaibhav Savla, Rudra Mishra, M. Shirole","doi":"10.1109/CCCS.2018.8586840","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586840","url":null,"abstract":"Machine Learning has been steadily gaining traction for its use in Anomaly-based Network Intrusion Detection Systems (A-NIDS). Research into this domain is frequently performed using the KDD CUP 99 dataset as a benchmark. Several studies question its usability while constructing a contemporary NIDS, due to the skewed response distribution, non-stationarity, and failure to incorporate modern attacks. In this paper, we compare the performance for KDD-99 alternatives when trained using classification models commonly found in literature: Neural Network, Support Vector Machine, Decision Tree, Random Forest, Naive Bayes and K-Means. Applying the SMOTE oversampling technique and random undersampling, we create a balanced version of NSL-KDD and prove that skewed target classes in KDD-99 and NSL-KDD hamper the efficacy of classifiers on minority classes (U2R and R2L), leading to possible security risks. We explore UNSW-NB15, a modern substitute to KDD-99 with greater uniformity of pattern distribution. We benchmark this dataset before and after SMOTE oversampling to observe the effect on minority performance. Our results indicate that classifiers trained on UNSW-NB15 match or better the Weighted F1-Score of those trained on NSL-KDD and KDD-99 in the binary case, thus advocating UNSW-NB15 as a modern substitute to these datasets.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"20 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81890080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 100
Industrial Control Systems - Legacy System Documentation and Augmentation 工业控制系统。遗留系统文件和扩充
S. Sudarsan, Devina Mohan, S. Rohit
Industrial control systems are used to automate process industries. Over 50 billion USD worth such systems are more than 20 years old resulting in their hardware having become outdated. Yet the process remains very little altered. These legacy systems need to be migrated to newer hardware and software platforms to ensure support and compliance to current standards. The time elapsed has resulted in shortage of subject matter and system experts available to understand the nitty gritties of the process functionality implementation in the legacy system using control language of that era. Documentation, if at all existing, is as built and not as running. Hence there is a need to generate documentation that could be understood by current generation automation and process engineers from the back-up of the running legacy system. This paper proposes a novel software tool to generate documents from the legacy industrial control system back-up. We test it with a real legacy system and verify the documents with actual back up. This helps in brownfield engineering migration projects.
工业控制系统用于实现过程工业的自动化。价值超过500亿美元的此类系统已经使用了20多年,导致其硬件已经过时。然而,这一过程几乎没有改变。需要将这些遗留系统迁移到较新的硬件和软件平台上,以确保对当前标准的支持和遵从。时间的流逝导致了主题和系统专家的短缺,无法使用那个时代的控制语言来理解遗留系统中过程功能实现的细节。文档(如果存在的话)是构建的,而不是运行的。因此,需要从正在运行的遗留系统的备份中生成能够被当前生成的自动化和过程工程师理解的文档。本文提出了一种新的软件工具,用于从遗留工业控制系统备份中生成文档。我们使用真实的遗留系统进行测试,并使用实际备份验证文档。这有助于棕地工程迁移项目。
{"title":"Industrial Control Systems - Legacy System Documentation and Augmentation","authors":"S. Sudarsan, Devina Mohan, S. Rohit","doi":"10.1109/CCCS.2018.8586843","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586843","url":null,"abstract":"Industrial control systems are used to automate process industries. Over 50 billion USD worth such systems are more than 20 years old resulting in their hardware having become outdated. Yet the process remains very little altered. These legacy systems need to be migrated to newer hardware and software platforms to ensure support and compliance to current standards. The time elapsed has resulted in shortage of subject matter and system experts available to understand the nitty gritties of the process functionality implementation in the legacy system using control language of that era. Documentation, if at all existing, is as built and not as running. Hence there is a need to generate documentation that could be understood by current generation automation and process engineers from the back-up of the running legacy system. This paper proposes a novel software tool to generate documents from the legacy industrial control system back-up. We test it with a real legacy system and verify the documents with actual back up. This helps in brownfield engineering migration projects.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"103 1","pages":"167-170"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76869627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Prediction of Churning Behavior of Customers in Telecom Sector Using Supervised Learning Techniques 基于监督学习技术的电信行业客户流失行为预测
Muhammad Ishtiaq Ali, A. Rehman, Shamaz Hafeez
Data mining is vast area that co-relates diverse branches i.e Statistics, Data Base, Machine learning and Artificial intelligence. Various applications are accessible in various areas. Churning of the Customer is the behavior when client never again needs to stay with his association with the company. Customer Churn Management is assuming essential job in client management. Nowadays different telecommunication companies are concentrating on distinguishing high esteemed and potential churning clients to expand benefit and share market. It is comprehended that making new clients are costlier than to holding existing client. There is a current issue that customer leave the organization because of obscure reasons. In our investigation, we predict churn behavior of the client by utilizing diverse data mining methods. It will in the long run help in breaking down client's behavior and characterize whether it is a churning client or not. We utilize online accessible data set available at Kaggle repository and for forecasting of Customer behavior we utilized different algorithms while we achieved 99.8% accuracy level using Bagging Algorithms.
数据挖掘是一个广阔的领域,它涉及不同的分支,如统计学、数据库、机器学习和人工智能。在不同的领域可以访问不同的应用程序。客户流失是指客户不再需要与公司保持联系的行为。客户流失管理是客户管理中的一项重要工作。目前,各电信公司都在集中精力发掘高价值和潜在的流动客户,以扩大效益和市场份额。据了解,开发新客户比保持现有客户的成本更高。当前存在一个问题,即客户由于不明原因而离开组织。在我们的调查中,我们通过使用不同的数据挖掘方法来预测客户的流失行为。从长远来看,这将有助于分解客户的行为,并确定其是否为流失客户。我们利用Kaggle存储库提供的在线可访问数据集,对于客户行为的预测,我们使用了不同的算法,而我们使用Bagging算法达到了99.8%的准确率水平。
{"title":"Prediction of Churning Behavior of Customers in Telecom Sector Using Supervised Learning Techniques","authors":"Muhammad Ishtiaq Ali, A. Rehman, Shamaz Hafeez","doi":"10.1109/cccs.2018.8586836","DOIUrl":"https://doi.org/10.1109/cccs.2018.8586836","url":null,"abstract":"Data mining is vast area that co-relates diverse branches i.e Statistics, Data Base, Machine learning and Artificial intelligence. Various applications are accessible in various areas. Churning of the Customer is the behavior when client never again needs to stay with his association with the company. Customer Churn Management is assuming essential job in client management. Nowadays different telecommunication companies are concentrating on distinguishing high esteemed and potential churning clients to expand benefit and share market. It is comprehended that making new clients are costlier than to holding existing client. There is a current issue that customer leave the organization because of obscure reasons. In our investigation, we predict churn behavior of the client by utilizing diverse data mining methods. It will in the long run help in breaking down client's behavior and characterize whether it is a churning client or not. We utilize online accessible data set available at Kaggle repository and for forecasting of Customer behavior we utilized different algorithms while we achieved 99.8% accuracy level using Bagging Algorithms.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"7 1","pages":"143-147"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74399714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EEG based Directional Signal Classification using RNN Variants 基于脑电的RNN变量定向信号分类
Bikram Adhikari, Ankit Shrestha, Shailesh Mishra, Suyog Singh, Arun K. Timalsina
EEG(Electroencephalogram) signals generated within the brain can be extracted using sensors. Thus generated signals can be classified based on the feature that are embedded within it. The signals once recognized can act as alternative inputs for users suffering from severe motor impairment. The inputs can be used for motion signal i.e directions left, right, up and down. In this paper, the raw EEG signals and power signals generated from NeuroSky Mindwave device have been classified using deep neural networks. Bi-directional Long Short Term Network architecture(Bi-LSTM) and a model which uses Long Short Term Memory(LSTM) with Attention layer have been implemented for the purpose. An accuracy of 56% was obtained using bi-directional LSTM network with raw signals, 44.75% accuracy with power signals, and with attention network using raw signals an accuracy of 63% was obtained.
利用传感器可以提取大脑内产生的脑电图信号。因此,可以根据嵌入其中的特征对生成的信号进行分类。这些信号一旦被识别,就可以作为患有严重运动障碍的用户的替代输入。输入可用于运动信号,即方向左,右,上,下。本文采用深度神经网络对神经天空脑电波装置产生的原始脑电信号和功率信号进行分类。为此,实现了双向长短期网络体系结构(Bi-LSTM)和具有注意层的长短期记忆(LSTM)模型。使用原始信号的双向LSTM网络的准确率为56%,使用功率信号的准确率为44.75%,使用原始信号的注意力网络的准确率为63%。
{"title":"EEG based Directional Signal Classification using RNN Variants","authors":"Bikram Adhikari, Ankit Shrestha, Shailesh Mishra, Suyog Singh, Arun K. Timalsina","doi":"10.1109/CCCS.2018.8586823","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586823","url":null,"abstract":"EEG(Electroencephalogram) signals generated within the brain can be extracted using sensors. Thus generated signals can be classified based on the feature that are embedded within it. The signals once recognized can act as alternative inputs for users suffering from severe motor impairment. The inputs can be used for motion signal i.e directions left, right, up and down. In this paper, the raw EEG signals and power signals generated from NeuroSky Mindwave device have been classified using deep neural networks. Bi-directional Long Short Term Network architecture(Bi-LSTM) and a model which uses Long Short Term Memory(LSTM) with Attention layer have been implemented for the purpose. An accuracy of 56% was obtained using bi-directional LSTM network with raw signals, 44.75% accuracy with power signals, and with attention network using raw signals an accuracy of 63% was obtained.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"309 1","pages":"218-223"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78363504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
[Title page] (标题页)
{"title":"[Title page]","authors":"","doi":"10.1109/cccs.2018.8586806","DOIUrl":"https://doi.org/10.1109/cccs.2018.8586806","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"80 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88591047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Memcached DDoS Exploits: Operations, Vulnerabilities, Preventions and Mitigations Memcached DDoS攻击:操作,漏洞,预防和缓解
Kulvinder Singh, Ajit Singh
This paper focuses on Memcached security from DDoS attacks during all stages of attack life cycle. It identifies Memcached architecture flaws on the one hand (which are long been ignored by developers of Memcached) and preventions/mitigation of DDoS attacks through several techniques depending on the type of vulnerability being exploited by the attacker on the other hand. In this paper we have explained the Memcached operations and architecture to identify and show the possible flaws in both of them. We have also taken reference of largest DDoS attacks ever recorded in the history of computer networks and as a follow up to recent attacks on Memcached this paper presents a fresh and strong list of simple commands and configuration security steps that are capable to avoid or mitigate Memcached DDoS attacks.
本文重点研究了Memcached在攻击生命周期各个阶段抵御DDoS攻击的安全性。它一方面识别Memcached架构缺陷(长期以来被Memcached开发人员所忽视),另一方面根据攻击者利用的漏洞类型,通过多种技术预防/缓解DDoS攻击。在本文中,我们解释了Memcached操作和体系结构,以识别和显示它们可能存在的缺陷。我们还参考了计算机网络历史上记录的最大的DDoS攻击,并作为最近对Memcached的攻击的后续行动,本文提出了一个新的强大的简单命令和配置安全步骤列表,能够避免或减轻Memcached DDoS攻击。
{"title":"Memcached DDoS Exploits: Operations, Vulnerabilities, Preventions and Mitigations","authors":"Kulvinder Singh, Ajit Singh","doi":"10.1109/CCCS.2018.8586810","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586810","url":null,"abstract":"This paper focuses on Memcached security from DDoS attacks during all stages of attack life cycle. It identifies Memcached architecture flaws on the one hand (which are long been ignored by developers of Memcached) and preventions/mitigation of DDoS attacks through several techniques depending on the type of vulnerability being exploited by the attacker on the other hand. In this paper we have explained the Memcached operations and architecture to identify and show the possible flaws in both of them. We have also taken reference of largest DDoS attacks ever recorded in the history of computer networks and as a follow up to recent attacks on Memcached this paper presents a fresh and strong list of simple commands and configuration security steps that are capable to avoid or mitigate Memcached DDoS attacks.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"06 1","pages":"171-179"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81899111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Multipurpose Unmanned Rover in WiFi Wireless Sensor Network WiFi无线传感器网络中的多用途无人探测车
Lyla B. Das, J. G., J. E.P., V. K, K. Chandra, M. N. Reddy, B. Yaswant, A. Vivek
The project aims to build a multipurpose autonomous rover that could move by itself or by a remote controlled mechanism. It can be sent to hostile and hazardous places where it is unsafe for humans, like mines, radioactive prone areas, etc. thereby reducing human risk. The rover is provided with various sensors that monitors parameter like temperature and smoke. The sensors continuously monitors the environment and update the value to the cloud server, enabling the user to view the values in a website, in real time. The rover could be controlled from smartphone with the help of a Bluetooth app. In addition to this, the webpage has buttons to control the rover. Also, a camera mounted on the rover live streams the video to the webpage, assisting in controlling the movement. The rover can also be used for surveillance, with the help of camera and motion detection algorithms. There is also an automatic mode in which the rover moves on its own in a predefined path.
该项目旨在建造一个多用途的自主漫游车,可以自行移动或通过遥控机构移动。它可以被送到对人类不安全的敌对和危险的地方,如矿山、放射性易发地区等,从而降低人类的风险。火星车配备了各种传感器,用于监测温度和烟雾等参数。传感器持续监测环境并将值更新到云服务器,使用户能够在网站上实时查看值。通过蓝牙应用程序,可以从智能手机上控制漫游者。除此之外,网页上还有控制漫游者的按钮。此外,安装在月球车上的摄像机将实时视频传输到网页上,帮助控制移动。在摄像机和运动检测算法的帮助下,漫游车还可以用于监视。还有一种自动模式,在这种模式下,漫游者会在预定义的路径上自行移动。
{"title":"Multipurpose Unmanned Rover in WiFi Wireless Sensor Network","authors":"Lyla B. Das, J. G., J. E.P., V. K, K. Chandra, M. N. Reddy, B. Yaswant, A. Vivek","doi":"10.1109/CCCS.2018.8586820","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586820","url":null,"abstract":"The project aims to build a multipurpose autonomous rover that could move by itself or by a remote controlled mechanism. It can be sent to hostile and hazardous places where it is unsafe for humans, like mines, radioactive prone areas, etc. thereby reducing human risk. The rover is provided with various sensors that monitors parameter like temperature and smoke. The sensors continuously monitors the environment and update the value to the cloud server, enabling the user to view the values in a website, in real time. The rover could be controlled from smartphone with the help of a Bluetooth app. In addition to this, the webpage has buttons to control the rover. Also, a camera mounted on the rover live streams the video to the webpage, assisting in controlling the movement. The rover can also be used for surveillance, with the help of camera and motion detection algorithms. There is also an automatic mode in which the rover moves on its own in a predefined path.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"44 1","pages":"20-24"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80263351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Traffic Light Control with Statistical Multiplexing Technique and Particle Swarm Optimization in Smart Cities 基于统计复用技术和粒子群优化的智慧城市自适应红绿灯控制
B. Manandhar, B. Joshi
Vehicular traffic in Urban areas of the globe is continuously increasing and the resulting congestion has become a major concern for transportation management. The traffic signal controls are the major way to manage vehicular flow at the intersections in these urban areas. However, traditional systems fail to adjust the timing pattern based on traffic which demands for need of developing adaptive systems. The focus is this study is to develop an intelligent system that is adaptive to the traffic flow at an intersection point of the real scenarios. A hybrid system comprising of Statistical Multiplexing and Particle Swarm Optimization(PSO) has been developed to control the flow of traffic. The performance of the developed algorithm was tested with both simulated and real traffic count of some major traffic congestion intersection of Kathmandu valley. It was observed that the average waiting time of vehicles on a junction has been reduced.
全球城市地区的车辆交通不断增加,由此产生的拥堵已成为交通管理的一个主要问题。交通信号控制是城市交叉口车辆流量管理的主要方式。然而,传统的系统不能根据交通流量来调整配时模式,这需要开发自适应系统。本研究的重点是开发一种适应真实场景下交叉口交通流的智能系统。提出了一种基于统计复用和粒子群算法的混合交通流控制系统。用加德满都谷地主要交通拥堵路口的模拟和真实车流量对算法的性能进行了测试。据观察,车辆在路口的平均等候时间已缩短。
{"title":"Adaptive Traffic Light Control with Statistical Multiplexing Technique and Particle Swarm Optimization in Smart Cities","authors":"B. Manandhar, B. Joshi","doi":"10.1109/CCCS.2018.8586845","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586845","url":null,"abstract":"Vehicular traffic in Urban areas of the globe is continuously increasing and the resulting congestion has become a major concern for transportation management. The traffic signal controls are the major way to manage vehicular flow at the intersections in these urban areas. However, traditional systems fail to adjust the timing pattern based on traffic which demands for need of developing adaptive systems. The focus is this study is to develop an intelligent system that is adaptive to the traffic flow at an intersection point of the real scenarios. A hybrid system comprising of Statistical Multiplexing and Particle Swarm Optimization(PSO) has been developed to control the flow of traffic. The performance of the developed algorithm was tested with both simulated and real traffic count of some major traffic congestion intersection of Kathmandu valley. It was observed that the average waiting time of vehicles on a junction has been reduced.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"87 1","pages":"210-217"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79378288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Sparse Regularization based Fusion Technique for Hyperspectral and Multispectral Images using Non-linear Mixing Model 基于稀疏正则化的非线性混合模型高光谱与多光谱图像融合技术
Nishanth Augustine, S. N. George
In this paper, an image fusion technique for fusing hyper spectral and multispectral images based on sparse regularization and subspace modeling is proposed. Here, the problem of fusion is modeled as a linear inverse problem and is solved in a lower dimensional subspace. Non Linear Mixing Model (NLMM) of hyper spectral image is used for the subspace identification and it gives better results than Linear Mixing Model (LMM). A sparse regularization term is generated through adaptive dictionary learning and the fusion task is solved by using alternating optimization technique. Subspace modeling reduces computational complexity considerably. Experimental results show that this method offers significant improvement in fusion performance when compared to that of existing methods.
提出了一种基于稀疏正则化和子空间建模的高光谱和多光谱图像融合技术。在这里,融合问题被建模为一个线性逆问题,并在低维子空间中求解。采用高光谱图像的非线性混合模型(NLMM)进行子空间识别,其效果优于线性混合模型(LMM)。通过自适应字典学习生成稀疏正则化项,采用交替优化技术解决融合问题。子空间建模大大降低了计算复杂度。实验结果表明,与现有方法相比,该方法的融合性能有了显著提高。
{"title":"Sparse Regularization based Fusion Technique for Hyperspectral and Multispectral Images using Non-linear Mixing Model","authors":"Nishanth Augustine, S. N. George","doi":"10.1109/CCCS.2018.8586817","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586817","url":null,"abstract":"In this paper, an image fusion technique for fusing hyper spectral and multispectral images based on sparse regularization and subspace modeling is proposed. Here, the problem of fusion is modeled as a linear inverse problem and is solved in a lower dimensional subspace. Non Linear Mixing Model (NLMM) of hyper spectral image is used for the subspace identification and it gives better results than Linear Mixing Model (LMM). A sparse regularization term is generated through adaptive dictionary learning and the fusion task is solved by using alternating optimization technique. Subspace modeling reduces computational complexity considerably. Experimental results show that this method offers significant improvement in fusion performance when compared to that of existing methods.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"64 1","pages":"56-63"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86664240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1