{"title":"Autoencoders Learning Sparse Representation","authors":"Abhinav Sharma, Ruchir Gupta","doi":"10.1109/OCIT56763.2022.00017","DOIUrl":"https://doi.org/10.1109/OCIT56763.2022.00017","url":null,"abstract":"Many regularized autoencoders learn a sparse rep-resentation of data. This type of representation enhances robust-ness against noise and computational efficiencies. Our objective in this paper is to provide the conditions under which sparsity is encouraged by AE under a little less restrictive view of data. We have shown a relaxed observed representation of input data and given the conditions on AE to promote sparsity.","PeriodicalId":425541,"journal":{"name":"2022 OITS International Conference on Information Technology (OCIT)","volume":"117 23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126414732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Roshan Kumar Chatei, Rudrashish Das, P. S. Chatterjee
{"title":"Systematic Survey on security issues in Cognitive Wireless Sensor Networks (CWSN)","authors":"Roshan Kumar Chatei, Rudrashish Das, P. S. Chatterjee","doi":"10.1109/OCIT56763.2022.00088","DOIUrl":"https://doi.org/10.1109/OCIT56763.2022.00088","url":null,"abstract":"Cognitive wireless sensor networks, also known as CWSN, are a cutting-edge technology that could one day provide a solution to the issues that have plagued wireless networks in the past. These issues have plagued conventional wireless networks for a number of years. Today, CWSNs are faced with a whole new and significant task, which is to ensure network safety. A conventional wireless network is not the same as a CWSN since it does not have the same capabilities and does have additional constraints. In this article, we go over the many different attacks that may be made against CWSNs, how they are categorised, and the many different security measures that can be put in place to prevent these attacks from happening. The difficulties that lie ahead in the future are also discussed.","PeriodicalId":425541,"journal":{"name":"2022 OITS International Conference on Information Technology (OCIT)","volume":"7 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131753856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HybridSSCN: Analysis Of Hierarchical Feature Learning Architecture Using Blended Conv3D And DepthwiseConv2D For Hyperspectral Image Classification","authors":"Pradeep Kumar Ladi, Murali Gopal Kakita, Ratnakar Dash, Sandeep Kumar Ladi","doi":"10.1109/OCIT56763.2022.00019","DOIUrl":"https://doi.org/10.1109/OCIT56763.2022.00019","url":null,"abstract":"Convolutional neural networks (CNNs) have made it possible to conduct various Hyperspectral Image (HSI) feature extraction and classification tasks at the forefront of technological innovation and development. This paper proposes a PHL framework where P, H, and L, denote PCA (Principal Component Analysis), HybridSSCN (Hybrid Spectral-Spatial ConvNet), and LinearSVC (Linear Support Vector Classifier). The HybridSSCN model is a novel deep learning (DL) architecture that incorporates a Conv3D for spectral-spatial feature learning followed by a DepthwiseConv2D layer for spatial feature learning. HybridSSCN helps in learning efficient complex and hierarchical features and aids in lowering computational costs. The features derived from HybridSSCN are classified using the LinearSVC classifier, which achieves 100% accuracy for all three benchmark datasets with 30% and 10% limited training and uneven data compared to the existing contemporary models.","PeriodicalId":425541,"journal":{"name":"2022 OITS International Conference on Information Technology (OCIT)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127572394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of Agriculture Crops Using Transfer Learning","authors":"Silky Goel, Snigdha Markanday, Shlok Mohanty","doi":"10.1109/OCIT56763.2022.00058","DOIUrl":"https://doi.org/10.1109/OCIT56763.2022.00058","url":null,"abstract":"Deep learning is a relatively new, cutting-edge method of image processing and data analysis with a lot of potential. Deep learning has lately entered the field of agriculture as a result of its success in other fields. In this study, we do an assessment of various research projects that apply deep learning techniques, applied to various agricultural and food production difficulties. We look at the specific agricultural issues being studied, the models and frameworks used, sources, types, and pre-processing of the data used, as well as the overall success attained according to the metrics employed at each study effort. In addition, we investigate the performance differences between different deep learning techniques and classifiers in classification. Our results show that deep learning gives great accuracy, exceeding previous extensively used image processing approaches. The result obtained was from VGG19 that is 98.5% with Logistic regression classifier.","PeriodicalId":425541,"journal":{"name":"2022 OITS International Conference on Information Technology (OCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129033389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khatsuria Yash Vijaybhai, K. Venkateswararao, Tejas M. Modi, Pravati Swain
{"title":"A Novel Optimization Strategy For Computation Offloading in the UAV-assisted Edge Computing","authors":"Khatsuria Yash Vijaybhai, K. Venkateswararao, Tejas M. Modi, Pravati Swain","doi":"10.1109/OCIT56763.2022.00092","DOIUrl":"https://doi.org/10.1109/OCIT56763.2022.00092","url":null,"abstract":"Unmanned aerial vehicles (UAVs) capture real-time aerial data. However, onboard computational resources and battery life in a UAV device is limited. In both academic and industrial sectors, solutions based on the mobile edge computing paradigm have been extensively discussed. In this paper, a group of small UAVs are exposed to a range of computing tasks. Some of these tasks call for the execution of difficult computations and complicated algorithms which are computationally-heavy task, and offloading to a powerful computational device is required. In contrary, some tasks are data-heavy, and offloading these tasks lead to a considerable transmission delay. Thus, the performance of the system depends on whether a task is offloaded or computed locally. The UAVs are having three options for a given task, i.e., locally complete the computation task, transfer the task to a surrogate UAV (medium/Iarge UAV) through the wireless local access network, or transfer to a edge server through the cellular network. To solve this optimization problem, a heuristic approach is purposed where each UAV device takes a decentralized offloading decision based on the nature of the task (computationally-heavy or data-heavy) for minimizing the total overhead, i.e., computation delay, transmission delay and monetary cost. The performance of the proposed approach is compared with three models, i.e., local computation, offloading all the tasks to the surrogate UAV, and offloading all the tasks to the edge server. It is observed that the proposed model achieved on average 25–30% less global overhead.","PeriodicalId":425541,"journal":{"name":"2022 OITS International Conference on Information Technology (OCIT)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127675121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. K. Behera, J. P. Mohanty, C. S. K. Dash, S. Dehuri
{"title":"Radial Basis Neural Networks for Class Discovery","authors":"A. K. Behera, J. P. Mohanty, C. S. K. Dash, S. Dehuri","doi":"10.1109/OCIT56763.2022.00069","DOIUrl":"https://doi.org/10.1109/OCIT56763.2022.00069","url":null,"abstract":"The non-iterative structure of radial basis function neural networks makes them more appealing for classification tasks decade after decade. In line with the growth of the training data set, the pattern layer also grows. The unprecedented growth of data with no class labels is becoming a challenge for researchers who are working in data science, big data analysis, etc. Although there is literature witnessed for many algorithms to handle data with no class label. However, neural network-based algorithms with a special characteristic of radial basis neural networks for uncovering class labels are very rare. In this paper, we propose a novel class discovery algorithm that combines the best features of radial basis function neural networks (RBFN) and self-organizing feature map (SOFM). We have taken a few datasets with class label for our experimental work. In the training phase of the network, the training instances are used without class labels. In the test phase, they are validated by combining the predicted class labels with their actual class label. The result shows that the proposed algorithm can be treated as an alternative method for class discovery.","PeriodicalId":425541,"journal":{"name":"2022 OITS International Conference on Information Technology (OCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131513836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using of Machine Learning Techniques to detect Credit Card Frauds","authors":"Yogesh Gupta","doi":"10.1109/OCIT56763.2022.00033","DOIUrl":"https://doi.org/10.1109/OCIT56763.2022.00033","url":null,"abstract":"Today is the era of digital money and the government is also promoting it to reduce corruption. People tend to use ATM cards and various credit cards for completing their transactions, but they are unaware of the fraudulent risks associated with them. A fraudulent transaction is conducted by an attacker using other's information and it causes Billions of dollars loss every year. Efficient fraud detection algorithms can be used to reduce the losses. These algorithms depend on advanced machine learning techniques, which can be helpful for fraud investigators. This paper is in two folds. First is to explore the various techniques proposed by various researchers to detect credit card frauds and second is to implement machine learning models to find frauds in credit card transactions. The aim is to identify all fraudulent transactions while reducing the number of incorrect fraud classifications. The types of credit card frauds and issues with credit card fraud detection techniques are also discussed in this paper.","PeriodicalId":425541,"journal":{"name":"2022 OITS International Conference on Information Technology (OCIT)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124775844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Self Intermittent Fault outlier identification technique for WSN s","authors":"B. S. Gouda, Sudhakar Das, T. Panigrahi","doi":"10.1109/OCIT56763.2022.00064","DOIUrl":"https://doi.org/10.1109/OCIT56763.2022.00064","url":null,"abstract":"In this research paper, we provide a distributed K-mean strategy based on distributed Self Intermittent fault outer identification (DISF) algorithm for identifying the fault due to outlier. It deals with locating problematic nodes by using intermittent faults and clustering mechanisms in the sensor network. The described model, sensor node, takes into account the average of all the cluster regions by using the median-based K-mean approach to gather the data from nearby sensors within the specified environment. The proposed method is rigorously tested, with the cluster head presumed to be the trustworthy node that reliably supplies the right data. The correctness is determined after taking into account the data from the dispersed cluster heads. With regard to the different parameters are to use for predicting the accuracy of data, fault positive rate and fault alarm ratio over the data transmission. This proposed model is contrasted with other ones already in use. The outcomes of the statistical analysis show that the proposed methodology produces an accurate result as compared to the traditional or existing approaches.","PeriodicalId":425541,"journal":{"name":"2022 OITS International Conference on Information Technology (OCIT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114148744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework of Customer Review Analysis Using the Aspect-Based Opinion Mining Approach","authors":"S. Dasgupta, Jaydip Sen","doi":"10.1109/OCIT56763.2022.00052","DOIUrl":"https://doi.org/10.1109/OCIT56763.2022.00052","url":null,"abstract":"Opinion mining is the branch of computation that deals with opinions, appraisals, attitudes, and emotions of people and their different aspects. This field has attracted substantial research interest in recent years. Aspect-level (called aspect-based opinion mining) is often desired in practical applications as it provides detailed opinions or sentiments about different aspects of entities and entities themselves, which are usually required for action. Aspect extraction and entity extraction are thus two core tasks of aspect-based opinion mining. his paper has presented a framework of aspect-based opinion mining based on the concept of transfer learning. on real-world customer reviews available on the Amazon website. The model has yielded quite satisfactory results in its task of aspect-based opinion mining.","PeriodicalId":425541,"journal":{"name":"2022 OITS International Conference on Information Technology (OCIT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125066436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Device Fingerprinting in Wireless Networks using Deep Learning","authors":"A. K. Dalai, B. Sahoo","doi":"10.1109/OCIT56763.2022.00081","DOIUrl":"https://doi.org/10.1109/OCIT56763.2022.00081","url":null,"abstract":"Device fingerprinting involves identifying devices based on attributes provided by their configuration and usage. In this work a Deep Neural Network (DNN) architecture is designed for device fingerprinting. DNN is fed Inter Arrival Time (IAT) and Transmission Time (TT) of preprocessed wireless network traffic. The DNN consists of multiple Convolution Neural Networks (CNN), Rectified Linear Units (ReLU), and maximum pooling layers. As a final step, two fully connected layers, a softmax layer and a classification layer, are applied to classify devices. To evaluate the proposed model, two benchmark datasets, SIGCOMM-2004 and SIGCOMM-2008, were used. Using only 200 frames, it can accurately fingerprint 74 devices in SIGCOMM-2004 and 48 devices in SIGCOMM-2008 with accuracy of 97.04% and 97.70% respectively. The experimental results indicate that the proposed method is more efficient, since it requires fewer frames and produces a higher level of accuracy.","PeriodicalId":425541,"journal":{"name":"2022 OITS International Conference on Information Technology (OCIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127260333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}