首页 > 最新文献

2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)最新文献

英文 中文
Canonical Huffman Coding for Image Compression 用于图像压缩的规范霍夫曼编码
Shree Ram Khaitu, S. Panday
With the rapid growth of multimedia technology, sharing of multimedia components have become a common practice. Thus, compression of image has become an integral approach that motivates the image compression for the efficient and lossless transmission and for storage of digital data. Huffman coding is one of the entropy encoding approach for compression of image. This paper is based on the fractal image in which Canonical Huffman coding is used for better fractal compression than arithmetic encoding. The result obtained shows that Canonical Huffman coding increases the speed of the compression and has good PNSR, as well as it has better compression ratio than standard Huffman coding.
随着多媒体技术的快速发展,多媒体组件的共享已经成为一种普遍的做法。因此,图像压缩已成为推动图像压缩以实现高效无损传输和数字数据存储的一种不可或缺的方法。霍夫曼编码是一种用于图像压缩的熵编码方法。本文以分形图像为研究对象,在分形压缩中采用标准霍夫曼编码比算术编码具有更好的分形压缩效果。结果表明,规范霍夫曼编码提高了压缩速度,具有良好的PNSR,压缩比优于标准霍夫曼编码。
{"title":"Canonical Huffman Coding for Image Compression","authors":"Shree Ram Khaitu, S. Panday","doi":"10.1109/CCCS.2018.8586816","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586816","url":null,"abstract":"With the rapid growth of multimedia technology, sharing of multimedia components have become a common practice. Thus, compression of image has become an integral approach that motivates the image compression for the efficient and lossless transmission and for storage of digital data. Huffman coding is one of the entropy encoding approach for compression of image. This paper is based on the fractal image in which Canonical Huffman coding is used for better fractal compression than arithmetic encoding. The result obtained shows that Canonical Huffman coding increases the speed of the compression and has good PNSR, as well as it has better compression ratio than standard Huffman coding.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"61 1","pages":"184-190"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83810975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
BitTrusty: A BitCoin incentivized peer-to-peer file sharing system BitTrusty:一个比特币激励的点对点文件共享系统
Shruti Pant, Vishal Kumar
Among the various challenges faced by the P2P file sharing systems like BitTorrent, the most common attack on the basic foundation of such systems is: Free-riding. Generally, free-riders are the users in the file sharing network who avoid contributing any resources but tend to consume the resources unethically from the P2P network whereas white-washers are more specific category of free-riders that voluntarily leave the system in a frequent fashion and appearing again and again with different identities to escape from the penal actions imposed by the network. BitTorrent being a collaborative distributed platform requires techniques for discouraging and punishing such user behavior. In this paper, we propose that “Instead of punishing, we may focus more on rewarding the honest peers”. This approach could be presented as an alternative to other mechanisms of rewarding the peers like tit-for-tat [10], reciprocity based etc., built for the BitTorrent platform. The prime objective of BitTrusty is: providing incentives to the cooperative peers by rewarding in terms of cryptocoins based on blockchain. We have anticipated three ways of achieving the above defined objective. We are further investigating on how to integrate these two technologies of distributed systems viz. P2P file sharing systems and blockchain, and with this new paradigm, interesting research areas can be further developed, both in the field of P2P cryptocurrency networks and also when these networks are combined with other distributed scenarios.
在像BitTorrent这样的P2P文件共享系统所面临的各种挑战中,对这类系统的基本基础最常见的攻击是:搭便车。一般来说,free-riders是指在文件共享网络中避免贡献任何资源,却倾向于不道德地消耗P2P网络资源的用户,而white-washers则是更具体的一类搭便车者,他们频繁地自愿离开系统,以不同的身份一次又一次地出现,以逃避网络施加的惩罚行为。BitTorrent作为一个协作分布式平台,需要一些技术来阻止和惩罚这样的用户行为。在本文中,我们提出“与其惩罚,不如奖励诚实的同伴”。这种方法可以作为其他奖励对等机制的替代方案,如为BitTorrent平台构建的针锋相对[10]、基于互惠的机制等。BitTrusty的主要目标是:通过基于区块链的加密货币奖励来激励合作伙伴。我们预期有三种方法可以实现上述确定的目标。我们正在进一步研究如何整合这两种分布式系统技术,即P2P文件共享系统和区块链,通过这种新的范式,可以进一步开发有趣的研究领域,无论是在P2P加密货币网络领域,还是当这些网络与其他分布式场景相结合时。
{"title":"BitTrusty: A BitCoin incentivized peer-to-peer file sharing system","authors":"Shruti Pant, Vishal Kumar","doi":"10.1109/CCCS.2018.8586835","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586835","url":null,"abstract":"Among the various challenges faced by the P2P file sharing systems like BitTorrent, the most common attack on the basic foundation of such systems is: Free-riding. Generally, free-riders are the users in the file sharing network who avoid contributing any resources but tend to consume the resources unethically from the P2P network whereas white-washers are more specific category of free-riders that voluntarily leave the system in a frequent fashion and appearing again and again with different identities to escape from the penal actions imposed by the network. BitTorrent being a collaborative distributed platform requires techniques for discouraging and punishing such user behavior. In this paper, we propose that “Instead of punishing, we may focus more on rewarding the honest peers”. This approach could be presented as an alternative to other mechanisms of rewarding the peers like tit-for-tat [10], reciprocity based etc., built for the BitTorrent platform. The prime objective of BitTrusty is: providing incentives to the cooperative peers by rewarding in terms of cryptocoins based on blockchain. We have anticipated three ways of achieving the above defined objective. We are further investigating on how to integrate these two technologies of distributed systems viz. P2P file sharing systems and blockchain, and with this new paradigm, interesting research areas can be further developed, both in the field of P2P cryptocurrency networks and also when these networks are combined with other distributed scenarios.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"1 1","pages":"148-155"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78577254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IT-OT Integration Challenges in Utilities 公用事业中的IT-OT集成挑战
Phani Kumar Garimella
Emerging industrial IoT presupposes integration of operational technology (OT) networks with information technology (IT) networks which hitherto were isolated. IT networks focus primarily on PAIN (Privacy/Confidentiality, Authentication, Integrity and Non-repudiation) OT networks focus primarily on AIC (Availability, Integrity and Confidentiality). The conflicting requirements of availability and confidentiality is a challenge that needs to be overcome in a balanced way to reap the benefits of IT-OT integration. This balancing act requires understanding of the OT domain. This paper considers electrical utility as the use case and brings out the considerations in achieving an acceptable IT-OT framework.
新兴的工业物联网以运营技术(OT)网络与信息技术(IT)网络的集成为前提,这些网络迄今为止是孤立的。IT网络主要关注PAIN(隐私/机密性、身份验证、完整性和不可否认性),OT网络主要关注AIC(可用性、完整性和机密性)。可用性和保密性的相互冲突的需求是一个挑战,需要以平衡的方式克服,以获得IT-OT集成的好处。这种平衡需要对OT领域的理解。本文将电力公用事业作为用例,并提出了实现可接受的IT-OT框架的考虑因素。
{"title":"IT-OT Integration Challenges in Utilities","authors":"Phani Kumar Garimella","doi":"10.1109/cccs.2018.8586807","DOIUrl":"https://doi.org/10.1109/cccs.2018.8586807","url":null,"abstract":"Emerging industrial IoT presupposes integration of operational technology (OT) networks with information technology (IT) networks which hitherto were isolated. IT networks focus primarily on PAIN (Privacy/Confidentiality, Authentication, Integrity and Non-repudiation) OT networks focus primarily on AIC (Availability, Integrity and Confidentiality). The conflicting requirements of availability and confidentiality is a challenge that needs to be overcome in a balanced way to reap the benefits of IT-OT integration. This balancing act requires understanding of the OT domain. This paper considers electrical utility as the use case and brings out the considerations in achieving an acceptable IT-OT framework.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"95 1","pages":"199-204"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78098769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Improving Nepali News Recommendation Using Classification Based on LSTM Recurrent Neural Networks 基于LSTM递归神经网络分类改进尼泊尔新闻推荐
A. Basnet, Arun K. Timalsina
News classification is the process of grouping news documents into some predefined categories. Due to the increasing volume of the Nepali news content being generated every day by thousands of online news portals, appropriate classification of these news items has become a necessity for the news readers. This research was targeted to improve the Nepali news classification based on Recurrent Neural Networks, that uses deep layers of neural networks to classify the news to an appropriate category. In this research paper, five popular news portals website across eight different categories was used for the purpose of data gathering and their classification accuracies were compared among these websites as well as overall accuracy was measured. The model was compared with the Support Vector Machine based on the parameters Accuracy, Precision, Recall and F1 Score. The use of Long Short Term Memory Recurrent Neural Network has improved the precision with the use of word2vec model. The presented model in the research has achieved a good accuracy of 84.63% and precision of 89% in compared to the SVM where the accuracy was 81.41% and precision 85%. Based on the categories of the news, sports news was classified more accurately by the model and economy was least accurately classified.
新闻分类是将新闻文档分组到一些预定义的类别中的过程。由于成千上万的在线新闻门户网站每天产生的尼泊尔新闻内容越来越多,对这些新闻项目进行适当的分类已经成为新闻读者的必要条件。本研究旨在改进基于递归神经网络的尼泊尔新闻分类,该分类使用深层神经网络将新闻分类到适当的类别。在本研究中,我们使用了8个不同类别的5个热门新闻门户网站进行数据收集,并比较了这些网站的分类准确率,并测量了总体准确率。基于准确率、精密度、召回率和F1分数等参数,将该模型与支持向量机进行比较。长短期记忆递归神经网络的使用提高了word2vec模型的准确率。与支持向量机的准确率81.41%,准确率85%相比,本研究中提出的模型的准确率为84.63%,精密度为89%。从新闻的类别来看,模型对体育新闻的分类更准确,对经济新闻的分类最不准确。
{"title":"Improving Nepali News Recommendation Using Classification Based on LSTM Recurrent Neural Networks","authors":"A. Basnet, Arun K. Timalsina","doi":"10.1109/CCCS.2018.8586815","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586815","url":null,"abstract":"News classification is the process of grouping news documents into some predefined categories. Due to the increasing volume of the Nepali news content being generated every day by thousands of online news portals, appropriate classification of these news items has become a necessity for the news readers. This research was targeted to improve the Nepali news classification based on Recurrent Neural Networks, that uses deep layers of neural networks to classify the news to an appropriate category. In this research paper, five popular news portals website across eight different categories was used for the purpose of data gathering and their classification accuracies were compared among these websites as well as overall accuracy was measured. The model was compared with the Support Vector Machine based on the parameters Accuracy, Precision, Recall and F1 Score. The use of Long Short Term Memory Recurrent Neural Network has improved the precision with the use of word2vec model. The presented model in the research has achieved a good accuracy of 84.63% and precision of 89% in compared to the SVM where the accuracy was 81.41% and precision 85%. Based on the categories of the news, sports news was classified more accurately by the model and economy was least accurately classified.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"29 1","pages":"138-142"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78190035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Li-Fi Technology: Bridging The Radio Frequency Communication Gap Li-Fi技术:弥合无线电频率通信的鸿沟
Ug Singh, M. Shorunke
Communication in the modern day era is predominantly dependent on Information and Communication Technology (ICT). The rise in cybercrime, digital espionage and other cyber-related disturbances is one of great concerns to cyberspace users, both corporate and individual. Radio Frequency technologies and solutions been adopted for in-building, and outdoor wireless coverage solutions for the supply-chains market, including turnkey solutions for optimized communications, are been faced with security issues. This paper suggests a secure network communications route (Li-Fi Technology) alternative for users of radio frequency identification (RFID) technologies and solutions. A communication path that is resilient and resistant to disruptions by mitigating sophisticated network communication attacks such as spoofing and TCP/IP attacks (Man-In-the-middle attacks, Denial of Service attacks). This paper proposes the use of Li-Fi network for a safe and secure cyberspace communication exchange path.
当今时代的通信主要依赖于信息通信技术(ICT)。网络犯罪、数字间谍活动和其他与网络有关的干扰日益增多,这是企业和个人网络用户非常关注的问题之一。射频技术和解决方案被用于建筑内,以及供应链市场的户外无线覆盖解决方案,包括优化通信的交钥匙解决方案,都面临着安全问题。本文提出了一种安全的网络通信路由(Li-Fi技术)替代方案,为用户提供射频识别(RFID)技术和解决方案。通过减轻复杂的网络通信攻击,如欺骗和TCP/IP攻击(中间人攻击,拒绝服务攻击),具有弹性和抗中断的通信路径。本文提出利用Li-Fi网络提供安全可靠的网络空间通信交换路径。
{"title":"Li-Fi Technology: Bridging The Radio Frequency Communication Gap","authors":"Ug Singh, M. Shorunke","doi":"10.1109/CCCS.2018.8586803","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586803","url":null,"abstract":"Communication in the modern day era is predominantly dependent on Information and Communication Technology (ICT). The rise in cybercrime, digital espionage and other cyber-related disturbances is one of great concerns to cyberspace users, both corporate and individual. Radio Frequency technologies and solutions been adopted for in-building, and outdoor wireless coverage solutions for the supply-chains market, including turnkey solutions for optimized communications, are been faced with security issues. This paper suggests a secure network communications route (Li-Fi Technology) alternative for users of radio frequency identification (RFID) technologies and solutions. A communication path that is resilient and resistant to disruptions by mitigating sophisticated network communication attacks such as spoofing and TCP/IP attacks (Man-In-the-middle attacks, Denial of Service attacks). This paper proposes the use of Li-Fi network for a safe and secure cyberspace communication exchange path.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"15 1","pages":"30-34"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73756062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wireless Sensor networks with Zigbee and WiFi for Environment Monitoring, Traffic Management and Vehicle Monitoring in Smart Cities 基于Zigbee和WiFi的无线传感器网络,用于智能城市的环境监测、交通管理和车辆监控
D. Naik, Lyla B. Das, T. Bindiya
In this paper, the use of sensor networks in environmental monitoring, vehicle monitoring and traffic management, which are important in a smart city are discussed. Sensors in Zigbee and Wi Fi networks form the back bone of this work. Low power networks like Zigbee and connectivity provided by WiFi are needed to realize the concept of Internet of Things (IoT). The main cause of environmental pollution in most cities are industries and automobiles emitting poisonous gases. This paper discusses the implementation of a unit which senses the presence of such gases and uploads the information to a website, and also sends messages to the concerned people. The second part of this work is a vehicle monitoring unit, that can be fixed in vehicles. This system tracks the location of the vehicle, detects accidents to the vehicle and monitors its engine temperature and the presence of poisonous gases from its exhaust. In the case of the vehicle is stolen, it also has the feature to locate the vehicle and prevent it from moving until a message is sent by the owner. The third part of the work, in which, vehicles which do signal jumping are detected and penalised. This feature is very relevant to the countries like India where traffic rules are regularly violated. The density of the traffic around traffic junctions is measured and information updated in the website. An Android app is developed so that all the required information is easily available. The paper describes the hardware and software implementation of the prototype system.
本文讨论了传感器网络在智慧城市中重要的环境监测、车辆监测和交通管理中的应用。Zigbee和Wi - Fi网络中的传感器构成了这项工作的骨干。实现物联网(IoT)的概念需要Zigbee等低功耗网络和WiFi提供的连接。大多数城市环境污染的主要原因是工业和汽车排放的有毒气体。本文讨论了一种装置的实现,该装置可以感知这些气体的存在,并将信息上传到网站,并向有关人员发送消息。本工作的第二部分是车载监控单元,可以固定在车内。该系统跟踪车辆的位置,检测车辆的事故,并监测其发动机温度和排气中有毒气体的存在。在车辆被盗的情况下,它还具有定位车辆并阻止其移动的功能,直到车主发送消息为止。工作的第三部分,对跳号的车辆进行检测和处罚。这一功能与印度等经常违反交通规则的国家非常相关。该网站测量交通路口周围的交通密度,并更新相关信息。开发了一款Android应用程序,以便轻松获取所需的所有信息。本文介绍了原型系统的硬件和软件实现。
{"title":"Wireless Sensor networks with Zigbee and WiFi for Environment Monitoring, Traffic Management and Vehicle Monitoring in Smart Cities","authors":"D. Naik, Lyla B. Das, T. Bindiya","doi":"10.1109/CCCS.2018.8586819","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586819","url":null,"abstract":"In this paper, the use of sensor networks in environmental monitoring, vehicle monitoring and traffic management, which are important in a smart city are discussed. Sensors in Zigbee and Wi Fi networks form the back bone of this work. Low power networks like Zigbee and connectivity provided by WiFi are needed to realize the concept of Internet of Things (IoT). The main cause of environmental pollution in most cities are industries and automobiles emitting poisonous gases. This paper discusses the implementation of a unit which senses the presence of such gases and uploads the information to a website, and also sends messages to the concerned people. The second part of this work is a vehicle monitoring unit, that can be fixed in vehicles. This system tracks the location of the vehicle, detects accidents to the vehicle and monitors its engine temperature and the presence of poisonous gases from its exhaust. In the case of the vehicle is stolen, it also has the feature to locate the vehicle and prevent it from moving until a message is sent by the owner. The third part of the work, in which, vehicles which do signal jumping are detected and penalised. This feature is very relevant to the countries like India where traffic rules are regularly violated. The density of the traffic around traffic junctions is measured and information updated in the website. An Android app is developed so that all the required information is easily available. The paper describes the hardware and software implementation of the prototype system.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"51 1","pages":"46-50"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81550346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Comparison of algorithms in Foreign Exchange Rate Prediction 汇率预测算法的比较
Swagat Ranjit, S. Shrestha, S. Subedi, S. Shakya
Foreign currency exchange plays a vital role for trading of currency in the financial market. Due to its volatile nature, prediction of foreign currency exchange is a challenging task. This paper presents different machine learning techniques like Artificial Neural Network (ANN), Recurrent Neural Network (RNN) to develop prediction model between Nepalese Rupees against three major currencies Euro, Pound Sterling and US dollar. Recurrent Neural Network is a type of neural network that have feedback connections. In this paper, prediction model were based on different RNN architectures, feed forward ANN with back propagation algorithm and then compared the accuracy of each model. Different ANN architecture models like Feed forward neural network, Simple Recurrent Neural Network (SRNN), Gated Recurrent Unit (GRU) and Long Short Term Memory (LSTM) were used. Input parameters were open, low, high and closing prices for each currency. From this study, we have found that LSTM networks provided better results than SRNN and GRU networks.
外汇兑换在金融市场的货币交易中起着至关重要的作用。由于外汇波动的性质,预测外汇汇率是一项具有挑战性的任务。本文介绍了不同的机器学习技术,如人工神经网络(ANN),循环神经网络(RNN),以开发尼泊尔卢比对欧元,英镑和美元三种主要货币之间的预测模型。递归神经网络是一种具有反馈连接的神经网络。本文建立了基于不同RNN结构的预测模型,前馈神经网络与反向传播算法,并比较了各模型的预测精度。采用了前馈神经网络、简单递归神经网络(SRNN)、门控递归单元(GRU)和长短期记忆(LSTM)等不同的神经网络结构模型。输入参数是每种货币的开盘价、最低价、最高价和收盘价。从这项研究中,我们发现LSTM网络比SRNN和GRU网络提供了更好的结果。
{"title":"Comparison of algorithms in Foreign Exchange Rate Prediction","authors":"Swagat Ranjit, S. Shrestha, S. Subedi, S. Shakya","doi":"10.1109/CCCS.2018.8586826","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586826","url":null,"abstract":"Foreign currency exchange plays a vital role for trading of currency in the financial market. Due to its volatile nature, prediction of foreign currency exchange is a challenging task. This paper presents different machine learning techniques like Artificial Neural Network (ANN), Recurrent Neural Network (RNN) to develop prediction model between Nepalese Rupees against three major currencies Euro, Pound Sterling and US dollar. Recurrent Neural Network is a type of neural network that have feedback connections. In this paper, prediction model were based on different RNN architectures, feed forward ANN with back propagation algorithm and then compared the accuracy of each model. Different ANN architecture models like Feed forward neural network, Simple Recurrent Neural Network (SRNN), Gated Recurrent Unit (GRU) and Long Short Term Memory (LSTM) were used. Input parameters were open, low, high and closing prices for each currency. From this study, we have found that LSTM networks provided better results than SRNN and GRU networks.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"1 1","pages":"9-13"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89953213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Machine learning based software fault prediction utilizing source code metrics 基于机器学习的软件故障预测,利用源代码度量
G. Bhandari, Ratneshwer Gupta
In the conventional techniques, it requires prior knowledge of faults or a special structure, which may not be realistic in practice while detecting the software faults. To deal with this problem, in this work, the proposed approach aims to predict the faults of the software utilizing the source code metrics. In addition, the purpose of this paper is to measure the capability of the software fault predictability in terms of accuracy, f-measure, precision, recall, Area Under ROC (Receiver Operating Characteristic) Curve (AUC). The study investigates the effect of the feature selection techniques for software fault prediction. As an experimental analysis, our proposed approach is validated from four publicly available datasets. The result predicted from Random Forest technique outperforms the other machine learning techniques in most of the cases. The effect of the feature selection techniques has increased the performance in few cases, however, in the maximum cases it is negligible or even the worse.
在传统的故障检测技术中,需要预先了解故障或特定的结构,这在实际的软件故障检测中是不现实的。为了解决这个问题,本文提出的方法旨在利用源代码度量来预测软件的错误。此外,本文的目的是从准确度、f-measure、精密度、召回率、ROC曲线下面积(Area Under ROC, Receiver Operating Characteristic Curve, AUC)等方面衡量软件故障可预测性的能力。研究了特征选择技术在软件故障预测中的作用。作为实验分析,我们提出的方法从四个公开可用的数据集进行了验证。在大多数情况下,随机森林技术预测的结果优于其他机器学习技术。特征选择技术的效果在少数情况下提高了性能,但在大多数情况下,它可以忽略不计甚至更糟。
{"title":"Machine learning based software fault prediction utilizing source code metrics","authors":"G. Bhandari, Ratneshwer Gupta","doi":"10.1109/CCCS.2018.8586805","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586805","url":null,"abstract":"In the conventional techniques, it requires prior knowledge of faults or a special structure, which may not be realistic in practice while detecting the software faults. To deal with this problem, in this work, the proposed approach aims to predict the faults of the software utilizing the source code metrics. In addition, the purpose of this paper is to measure the capability of the software fault predictability in terms of accuracy, f-measure, precision, recall, Area Under ROC (Receiver Operating Characteristic) Curve (AUC). The study investigates the effect of the feature selection techniques for software fault prediction. As an experimental analysis, our proposed approach is validated from four publicly available datasets. The result predicted from Random Forest technique outperforms the other machine learning techniques in most of the cases. The effect of the feature selection techniques has increased the performance in few cases, however, in the maximum cases it is negligible or even the worse.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"13 1","pages":"40-45"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89427833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Approving Psycho-Neuro-Computer Systems to prevent (Systemic Vs Individualistic Perspective) Cybercrimes in Information Highway 批准心理-神经-计算机系统预防信息高速公路中的网络犯罪(系统Vs个人观点)
K. Mohan, K. Chandra Sekharaiah, P. Premchand, Gopal Upakaram Pullaiah, B. Malathi
In this paper the authors described the importance of Schizophrenia in Medical Systems versus Computer Systems. Dissimilar Schizophrenias were identified. The schizophrenia is thoughtful, consequently it could be discovered in future. But there is no Intelligence Quotient (IQ). The author contrasting this perception with present research work i.e., Cybercrimes in Higher Educations. This encouraging Psycho-Neuro-Computer Systems are very essential things to control and prevent the Cybercrimes in Cyber space. On each successive day the thoughts, feelings, behavior of humans are going in destructive manner. Especially in internet by using this Communication Technologies and facilities the Cybercrimes are ever-increasing very quickly. The Online Networking Systems are anguish, the people who have Schizophrenia is a serious psychological disorder in which people understand reality abnormally. Schizophrenia may result in some combination of illusions and tremendously disordered thinking and behavior that damages daily functioning, and can be disabling. The author developing positive psychology between the higher education students and faculties to reduce the Online Cybercrimes. In our research Cognitive Systems are showing main role which is interrelated with computer science and psychology. It provides us with a systematic foundation in the principles, ethics, morals, values and techniques used by intelligent systems (both natural and artificial) to interact with the web world. My research required Emotional Intelligence (or) Knowledge (or) Emotional Quotient (EQ) use emotions to enhance positive thoughts. People with high emotions can control, evaluate towards negative thoughts and perceive others emotions and thoughts, uniform estimation calculated of cleverness.
在本文中,作者描述了精神分裂症在医疗系统与计算机系统中的重要性。鉴定出不同类型的精神分裂症。精神分裂症是深思熟虑的,因此它可能在未来被发现。但是没有智商(IQ)。作者将这种看法与目前的研究工作,即高等教育中的网络犯罪进行了对比。这种令人鼓舞的心理-神经-计算机系统对于控制和预防网络空间中的网络犯罪是至关重要的。每一天,人类的思想、感情和行为都在以破坏性的方式发展。特别是在互联网上,通过使用这种通信技术和设施,网络犯罪正在迅速增加。精神分裂症是一种严重的心理障碍,患者对现实的理解异常。精神分裂症可能会导致幻觉和严重的思维和行为紊乱的结合,损害日常功能,并可能导致残疾。在高校师生之间培养积极心理,减少网络犯罪。认知系统在我们的研究中发挥着重要的作用,它与计算机科学和心理学密切相关。它为我们提供了智能系统(自然的和人工的)与网络世界互动所使用的原则、伦理、道德、价值观和技术的系统基础。我的研究需要情商(或)知识(或)情商(EQ)利用情绪来增强积极的想法。情绪高的人能够控制、评价消极的思想,感知他人的情绪和思想,对聪明度进行统一的估计。
{"title":"Approving Psycho-Neuro-Computer Systems to prevent (Systemic Vs Individualistic Perspective) Cybercrimes in Information Highway","authors":"K. Mohan, K. Chandra Sekharaiah, P. Premchand, Gopal Upakaram Pullaiah, B. Malathi","doi":"10.1109/CCCS.2018.8586801","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586801","url":null,"abstract":"In this paper the authors described the importance of Schizophrenia in Medical Systems versus Computer Systems. Dissimilar Schizophrenias were identified. The schizophrenia is thoughtful, consequently it could be discovered in future. But there is no Intelligence Quotient (IQ). The author contrasting this perception with present research work i.e., Cybercrimes in Higher Educations. This encouraging Psycho-Neuro-Computer Systems are very essential things to control and prevent the Cybercrimes in Cyber space. On each successive day the thoughts, feelings, behavior of humans are going in destructive manner. Especially in internet by using this Communication Technologies and facilities the Cybercrimes are ever-increasing very quickly. The Online Networking Systems are anguish, the people who have Schizophrenia is a serious psychological disorder in which people understand reality abnormally. Schizophrenia may result in some combination of illusions and tremendously disordered thinking and behavior that damages daily functioning, and can be disabling. The author developing positive psychology between the higher education students and faculties to reduce the Online Cybercrimes. In our research Cognitive Systems are showing main role which is interrelated with computer science and psychology. It provides us with a systematic foundation in the principles, ethics, morals, values and techniques used by intelligent systems (both natural and artificial) to interact with the web world. My research required Emotional Intelligence (or) Knowledge (or) Emotional Quotient (EQ) use emotions to enhance positive thoughts. People with high emotions can control, evaluate towards negative thoughts and perceive others emotions and thoughts, uniform estimation calculated of cleverness.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"35 1","pages":"205-209"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87960618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fusion Of Multi-Modality Medical Images: A Fuzzy Approach 多模态医学图像融合:一种模糊方法
Harmeet Kaur, Satish Kumar
The advancements in technology have touched many domains and Medical Domain is one such beneficiary with advancements like Radiation Oncology, Real time imaging, 4-D respiratory gating etc. This paper deals with the Multi-Modality images and its fusion so that efficient, accurate and especially low cost high-end treatment is available to all. For Diagnostic and Treatment Planning, Medical images are the vital source of information. In this study we have employed the Harvard Database. The Medical images come with different modalities like CT, PET, MRI are medical images with different modality. These modalities are fused such that the best information is available in the fused image and to fulfill that, this paper puts forward Fuzzy Logic Inference system based image fusion. The proposed technique uses CT and MRI as input and the fusion is applied using Fuzzy Logic. The evaluation of output is done by the metrics: PSNR, SNR and MSE. The fused image attained through fuzzy logic is more informative when compared with the wavelet based fusion method.
技术的进步已经触及了许多领域,医学领域就是这样一个受益者,如放射肿瘤学,实时成像,4-D呼吸门控等。本文对多模态图像及其融合进行了研究,以期为所有人提供高效、准确、特别是低成本的高端治疗。对于诊断和治疗计划,医学图像是重要的信息来源。在这项研究中,我们使用了哈佛数据库。医学图像有不同的模态,如CT、PET、MRI是不同模态的医学图像。将这些模式进行融合,使融合后的图像能获得最佳的信息,为实现这一目标,本文提出了基于模糊逻辑推理的图像融合系统。该方法以CT和MRI为输入,采用模糊逻辑进行融合。输出的评价是由指标完成:PSNR, SNR和MSE。与基于小波的融合方法相比,模糊逻辑得到的融合图像信息量更大。
{"title":"Fusion Of Multi-Modality Medical Images: A Fuzzy Approach","authors":"Harmeet Kaur, Satish Kumar","doi":"10.1109/CCCS.2018.8586829","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586829","url":null,"abstract":"The advancements in technology have touched many domains and Medical Domain is one such beneficiary with advancements like Radiation Oncology, Real time imaging, 4-D respiratory gating etc. This paper deals with the Multi-Modality images and its fusion so that efficient, accurate and especially low cost high-end treatment is available to all. For Diagnostic and Treatment Planning, Medical images are the vital source of information. In this study we have employed the Harvard Database. The Medical images come with different modalities like CT, PET, MRI are medical images with different modality. These modalities are fused such that the best information is available in the fused image and to fulfill that, this paper puts forward Fuzzy Logic Inference system based image fusion. The proposed technique uses CT and MRI as input and the fusion is applied using Fuzzy Logic. The evaluation of output is done by the metrics: PSNR, SNR and MSE. The fused image attained through fuzzy logic is more informative when compared with the wavelet based fusion method.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"70 1","pages":"112-115"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77166659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1