2022 International Conference on Intelligent Innovations in Engineering and Technology (ICIIET)最新文献

筛选
英文 中文
Implementation of Convolutional Neural Network for Epileptic Seizure Detection 卷积神经网络在癫痫发作检测中的实现
S. Loganathan, C. Sujatha, R. Guru Nivash., R. Krish Srinivas., J. Niveddita., V. Nivedha.
{"title":"Implementation of Convolutional Neural Network for Epileptic Seizure Detection","authors":"S. Loganathan, C. Sujatha, R. Guru Nivash., R. Krish Srinivas., J. Niveddita., V. Nivedha.","doi":"10.1109/ICIIET55458.2022.9967535","DOIUrl":"https://doi.org/10.1109/ICIIET55458.2022.9967535","url":null,"abstract":"Epilepsy is a neurological disorder and disability in which the brain activity becomes abnormal causing seizures. A seizure is characterized by the unprovoked sudden alteration of the electrical activity of the brain. It is defined by a prolonged inclination to cause epileptic seizures and by the pathophysiological, psychological, cognitive, and social ramifications of this state, thus early detection of epileptic seizures is crucial. In this work, the convolutional neural network (CNN) is used to extract the important spatial information from Electroencephalogram (EEG) signals and a classification task using pre-trained networks by transfer learning is performed on the extracted features to detect the onset of a seizure. An accuracy of 95.09% is achieved using MATLAB. Pre-trained neural networks involve an enormous number of computations. Hence, a novel 30-30-10-10 neural network is devised as a feedforward fully connected neural network to reduce computational complexity. Simulation is performed in Verilog using Xilinx Vivado, achieving an accuracy of 96.6667%.","PeriodicalId":341904,"journal":{"name":"2022 International Conference on Intelligent Innovations in Engineering and Technology (ICIIET)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115750864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Early Detection and Mitigation of DoS Attacks in SDN Controller SDN控制器中DoS攻击的早期检测与缓解
Saritakumar N, A. V.
{"title":"Early Detection and Mitigation of DoS Attacks in SDN Controller","authors":"Saritakumar N, A. V.","doi":"10.1109/ICIIET55458.2022.9967650","DOIUrl":"https://doi.org/10.1109/ICIIET55458.2022.9967650","url":null,"abstract":"Software-Defined Networks (SDN), a single authority-managed network, vulnerable to various attacks, demands high security to its Controller. The Denial of Service (DoS) attack deactivates the network controller by flooding packets. Hence, two solutions are proposed for the early detection of DoS attacks: the Congestion control-based algorithm with a rate-limited queue mechanism and the Entropy-based algorithm with adaptive threshold estimation. The first proposal involves the pre-detection of DoS attacks at the early stages in SDN layers to prevent network congestion. The continuous monitoring of SDN switch ports identifies the repeated request of an IP/MAC address beyond a specified threshold, estimated through the CPU utilization factor. For the confirmed attack, the threat packets are queued separately and rate-limited. The second proposal detects low-level attacks by computing entropy and adaptive threshold estimation. The mitigation process either blocks or redirects the packets to the virtual host. The performance of the proposed algorithms in POX-SDN controllers is analyzed using Mininet.","PeriodicalId":341904,"journal":{"name":"2022 International Conference on Intelligent Innovations in Engineering and Technology (ICIIET)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124718000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Analysis of Flexible 2-Port MIMO Antenna with Reflector Ground for WLAN Applications 无线局域网用反射地柔性2端口MIMO天线的设计与分析
Elizabeth M Ribitha, M. Vadivel
{"title":"Design and Analysis of Flexible 2-Port MIMO Antenna with Reflector Ground for WLAN Applications","authors":"Elizabeth M Ribitha, M. Vadivel","doi":"10.1109/ICIIET55458.2022.9967524","DOIUrl":"https://doi.org/10.1109/ICIIET55458.2022.9967524","url":null,"abstract":"A two-port flexible MIMO antenna system suitable for WLAN networks is proposed to resonate at a resonating frequency of 2.4 GHz. The proposed antenna response over the plane is analyzed based on the gain, reflection coefficient, diversity gain, isolation parameter, and radiation pattern. The two MIMO elements are patterned in cylindrical shape over the flexible Kapton substrate. The choice of Kapton material as the substrate allows the design to have the greatest amount of physical flexibility. The typical antenna parameters for the suggested design were examined with an increased gain of 4.8 dB and the reflection coefficient S11 to be −45 dB. The proposed design using the reflector ground structure in the antenna was also observed for the radiation pattern, diversity gain, and ECC (Envelope Correlation Coefficient.","PeriodicalId":341904,"journal":{"name":"2022 International Conference on Intelligent Innovations in Engineering and Technology (ICIIET)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114083811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing IoT Chips from Hardware Trojan using Machine Learning Classifiers 使用机器学习分类器保护物联网芯片免受硬件木马攻击
T. Lavanya, K. Rajalakshmi
{"title":"Securing IoT Chips from Hardware Trojan using Machine Learning Classifiers","authors":"T. Lavanya, K. Rajalakshmi","doi":"10.1109/ICIIET55458.2022.9967617","DOIUrl":"https://doi.org/10.1109/ICIIET55458.2022.9967617","url":null,"abstract":"Recent trend shows that there is a widespread of Internet of Things (IoTs). IoTs are a network of devices that establish interconnectivity between them and communicate with each other. These IoTs had impacted every person in their daily lives through various applications such as smart homes, smart vehicles, smart medical, etc. The growing applications show the involvement of hardware devices and these devices are prone to attacks from the adversary. Hence, there is a need for securing the devices which in turn secure the IoTs. The attacks from adversaries are more in recent days to access secret information, perform Denial-of-service, performance degradation, etc. these attacks are performed as per the intention of the adversary. These types of attacks through hardware are called Hardware Trojan (HT) attacks. Hence, there is a requirement of security in a hardware device which is achieved by applying the non-destructive machine learning classifier method. This proposed methodology detects the HT present in a circuit by classifying the different parametric features of the circuit under test by differentiating the unknown and known netlists and detects the particular net as a ‘Trojan net’ or ‘normal net’, with the achievement of 94.4% of accuracy and 0.9 of f-measure.","PeriodicalId":341904,"journal":{"name":"2022 International Conference on Intelligent Innovations in Engineering and Technology (ICIIET)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114753455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the Quality of Image Captioning using CNN and LSTM Method 利用CNN和LSTM方法提高图像字幕质量
M. Pradeepan Lala, D. Kumar
{"title":"Improving the Quality of Image Captioning using CNN and LSTM Method","authors":"M. Pradeepan Lala, D. Kumar","doi":"10.1109/ICIIET55458.2022.9967570","DOIUrl":"https://doi.org/10.1109/ICIIET55458.2022.9967570","url":null,"abstract":"In image captioning improving the content of the image by describing the meaning of the picture is a challenge as it should not only be understandable to the user but also described in a short and clear sentence. The proposed solution uses CNN and LSTM as captioning models in an Encoder and the Decoder methodology is used to translate an image into a sentence. The Xception architecture is modified by adding a depth wise convolution layer. A custom activation function is created based on swish and mish. CNN is used for feature extraction, RNN is used for sequence prediction, and LSTM for framing the words into a sentence. The proposed work is validated on two-dimensional image datasets such as dog category data extracted from the flicker8k dataset and real-time images captured through a webcam. The training/testing shows improved loss value, caption prediction time, and an increase in the quality of caption in terms of the BLEU@I parameter.","PeriodicalId":341904,"journal":{"name":"2022 International Conference on Intelligent Innovations in Engineering and Technology (ICIIET)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126523136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Reinforcement Learning based Resource Allocation in NOMA 基于深度强化学习的NOMA资源分配
N. Iswarya, R. Venkateswari
{"title":"Deep Reinforcement Learning based Resource Allocation in NOMA","authors":"N. Iswarya, R. Venkateswari","doi":"10.1109/ICIIET55458.2022.9967604","DOIUrl":"https://doi.org/10.1109/ICIIET55458.2022.9967604","url":null,"abstract":"NOMA is a novel channel accessing strategy that delivers high throughput and fairness among various users by multiplexing many users across the same frequency resource. In order to guarantee the user's fairness, minimum data rate maximization, also referred to as the max-min approach is adopted. Apparently, transmission power optimization is employed to accomplish the max-min. However, the scalability of the number of users leads the optimization to a non-convex optimization problem. Consequently, the Dueling Double Deep Q Learning(Dueling DDQL) technique, a subclass of Reinforcement Learning is proposed to solve such problem. The Deep Q-Network is used by the DDQL approach in learning the actions that are best to do to maximize user power coefficients. The Markov Decision Process (MDP) model is essential to the DDQL method's effectiveness since it trains the DQN on choosing better actions. The dueling DDQL converges to the target value for 92% of the test cases. The proposed method is compared with the benchmark algorithms and it is illustrated that the proposed algorithm outperforms those comparative algorithms.","PeriodicalId":341904,"journal":{"name":"2022 International Conference on Intelligent Innovations in Engineering and Technology (ICIIET)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130924251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hybrid DC-DC Converter for DC Microgrid Applications 用于直流微电网的混合式DC-DC变换器
J. S. Sakthi Suriya Raj, P. Sivaraman
{"title":"Hybrid DC-DC Converter for DC Microgrid Applications","authors":"J. S. Sakthi Suriya Raj, P. Sivaraman","doi":"10.1109/ICIIET55458.2022.9967504","DOIUrl":"https://doi.org/10.1109/ICIIET55458.2022.9967504","url":null,"abstract":"This article, presents a hybrid converter for micro-grid application is proposed. It consists of a Solar PV as a DC source, and a storage battery to power a local DC load. The proposed converter is a simple circuit that integrated a bidirectional half-bridge DC-DC converter and a boost converter to perform charging, discharging of storage battery, and MPPT control respectively. The MPPT control for solar PV is achieved using Perturb and Observe method. A closed-loop control system is developed using PI control to charge and Discharge the battery. This DC micro-grid is integrated with the grid system and the performance of the converter is evaluated using MATLAB/Simulink software. In comparison to existing converters, the proposed converter has a lower number of power components and achieved an efficiency of 95.7%.","PeriodicalId":341904,"journal":{"name":"2022 International Conference on Intelligent Innovations in Engineering and Technology (ICIIET)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133724384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Path Finding Algorithm for Logistic Routing Problem 物流路径问题的最优寻径算法
Madhura Srinivasan, K. Sireesha
{"title":"Optimal Path Finding Algorithm for Logistic Routing Problem","authors":"Madhura Srinivasan, K. Sireesha","doi":"10.1109/ICIIET55458.2022.9967599","DOIUrl":"https://doi.org/10.1109/ICIIET55458.2022.9967599","url":null,"abstract":"The Logistic Routing Problem (LRP) is a type of Vehicle Routing Problem (VRP) that is generally about the optimal set of routes for a group of vehicles to cross over to deliver to a given set of geographical locations as customers. Cost to company plays a vital role where the economy has changed the people’s way of buying things and logistics development has also increased due to this. Determining an optimal solution in a VRP is NP-hard, so the solution to solve such problems is limited. Taking this as the challenge and finding an algorithm to get an optimal solution is the goal of this paper. The optimal solution here is to minimize the traveling cost and find the best route which is an important factor in terms of logistic transportation. The proposed method is to hybridize the existing Ant colony optimization. Firstly, clustering is done to divide the larger geographical area into smaller parts using K-means Algorithm. After the clusters are availed, ACO is used for Route optimization to obtain the shortest route. The models are estimated based on the distance. The design was programmed using Python Programming in Visual Studio Code as the software platform.","PeriodicalId":341904,"journal":{"name":"2022 International Conference on Intelligent Innovations in Engineering and Technology (ICIIET)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124119877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Brain Tumor Segmentation Using Zernike Moments in U-Net 基于U-Net的Zernike矩脑肿瘤分割
K. Manasa, V. Krishnaveni
{"title":"Brain Tumor Segmentation Using Zernike Moments in U-Net","authors":"K. Manasa, V. Krishnaveni","doi":"10.1109/ICIIET55458.2022.9967618","DOIUrl":"https://doi.org/10.1109/ICIIET55458.2022.9967618","url":null,"abstract":"The paper proposes fully automated brain tumor segmentation using Zernike moments as an initial feature in U-Net instead of a random kernel. Recent studies have shown Convolutional neural networks gained momentum in image segmentation due to an increase in computation power and availability of a large number of datasets. Among Convolutional Neural Networks, U-Net is most extensively used in medical image segmentation due to its high-resolution retaining capability. In this document, MRI images of brain tumors are segmented by varying the moment’s order in Zernike moments as initial kernels to the U-Net. Zernike moments are used to extract shape information from the brain MRI, its multi-level configuration is useful for hierarchical feature learning in U-Net. Th is model yielded a Dice score of 0.85, 0.88, and 0.81 for core, whole tumor, and enhancing tumor respectively.","PeriodicalId":341904,"journal":{"name":"2022 International Conference on Intelligent Innovations in Engineering and Technology (ICIIET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129067970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Performance Investigations of Modular Multilevel Inverter with Reduced Switch Count 减少开关数的模块化多电平逆变器性能研究
E. Parimalasundar, K. Suresh, R. Sindhuja, K. Manikandan
{"title":"A Performance Investigations of Modular Multilevel Inverter with Reduced Switch Count","authors":"E. Parimalasundar, K. Suresh, R. Sindhuja, K. Manikandan","doi":"10.1109/ICIIET55458.2022.9967595","DOIUrl":"https://doi.org/10.1109/ICIIET55458.2022.9967595","url":null,"abstract":"A multilevel inverter is a special variant of converter for dc-ac conversion in medium and high voltage and power requirements. In this paper, a novel configuration with fewer switches needed has been developed for the staircase output voltage levels. Two direct current voltage sources and eight transistors are required to synthesize five levels across the load using the conventional topology. The modular topology has two dc voltage sources, and six switches with a five-level output. Using the optimum multi-carrier pulse width modulation approach, the voltage quality is enhanced and total harmonic distortion is reduced. Furthermore, the viability of the proposed topology in contrast to the conventional cascaded H-bridged multilevel inverter with five levels is established by presenting comparable results showing reduced power losses with varied modulation indexes and increased efficiency. The simulation analysis has been carried out using the MATLAB/SIMULINK tool.","PeriodicalId":341904,"journal":{"name":"2022 International Conference on Intelligent Innovations in Engineering and Technology (ICIIET)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121793493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信