{"title":"SMD Defect Classification by Convolution Neural Network and PCB Image Transform","authors":"Young-Gyu Kim, Dae-ui Lim, Jong-Hyun Ryu, T. Park","doi":"10.1109/CCCS.2018.8586818","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586818","url":null,"abstract":"Surface Mount Technology (SMT) is a manufacturing process in which chips are mounted on the surface of a printed circuit board (PCB). The automatic optical inspection system (AOI) has mainly used the learning-based method for the defect classification of the SMT process, and recently the CNN-based classification method has appeared. However, existing techniques do not consider the area margin of the part and uneven color distribution according to the position of the chip, so the classification accuracy decreases. In this paper, we propose a system that can extract the chip region and improve the color distribution by the input image transformation. We extract the correct chip area through vertical and horizontal projection, and the color improvement enhance the brightness value distribution of the chip image through local histogram stretching. By experimental result, we prove the performance of the proposed classification method.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"48 1","pages":"180-183"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85454519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abhishek Divekar, Meet Parekh, Vaibhav Savla, Rudra Mishra, M. Shirole
{"title":"Benchmarking datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 alternatives","authors":"Abhishek Divekar, Meet Parekh, Vaibhav Savla, Rudra Mishra, M. Shirole","doi":"10.1109/CCCS.2018.8586840","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586840","url":null,"abstract":"Machine Learning has been steadily gaining traction for its use in Anomaly-based Network Intrusion Detection Systems (A-NIDS). Research into this domain is frequently performed using the KDD CUP 99 dataset as a benchmark. Several studies question its usability while constructing a contemporary NIDS, due to the skewed response distribution, non-stationarity, and failure to incorporate modern attacks. In this paper, we compare the performance for KDD-99 alternatives when trained using classification models commonly found in literature: Neural Network, Support Vector Machine, Decision Tree, Random Forest, Naive Bayes and K-Means. Applying the SMOTE oversampling technique and random undersampling, we create a balanced version of NSL-KDD and prove that skewed target classes in KDD-99 and NSL-KDD hamper the efficacy of classifiers on minority classes (U2R and R2L), leading to possible security risks. We explore UNSW-NB15, a modern substitute to KDD-99 with greater uniformity of pattern distribution. We benchmark this dataset before and after SMOTE oversampling to observe the effect on minority performance. Our results indicate that classifiers trained on UNSW-NB15 match or better the Weighted F1-Score of those trained on NSL-KDD and KDD-99 in the binary case, thus advocating UNSW-NB15 as a modern substitute to these datasets.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"20 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81890080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Industrial Control Systems - Legacy System Documentation and Augmentation","authors":"S. Sudarsan, Devina Mohan, S. Rohit","doi":"10.1109/CCCS.2018.8586843","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586843","url":null,"abstract":"Industrial control systems are used to automate process industries. Over 50 billion USD worth such systems are more than 20 years old resulting in their hardware having become outdated. Yet the process remains very little altered. These legacy systems need to be migrated to newer hardware and software platforms to ensure support and compliance to current standards. The time elapsed has resulted in shortage of subject matter and system experts available to understand the nitty gritties of the process functionality implementation in the legacy system using control language of that era. Documentation, if at all existing, is as built and not as running. Hence there is a need to generate documentation that could be understood by current generation automation and process engineers from the back-up of the running legacy system. This paper proposes a novel software tool to generate documents from the legacy industrial control system back-up. We test it with a real legacy system and verify the documents with actual back up. This helps in brownfield engineering migration projects.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"103 1","pages":"167-170"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76869627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prediction of Churning Behavior of Customers in Telecom Sector Using Supervised Learning Techniques","authors":"Muhammad Ishtiaq Ali, A. Rehman, Shamaz Hafeez","doi":"10.1109/cccs.2018.8586836","DOIUrl":"https://doi.org/10.1109/cccs.2018.8586836","url":null,"abstract":"Data mining is vast area that co-relates diverse branches i.e Statistics, Data Base, Machine learning and Artificial intelligence. Various applications are accessible in various areas. Churning of the Customer is the behavior when client never again needs to stay with his association with the company. Customer Churn Management is assuming essential job in client management. Nowadays different telecommunication companies are concentrating on distinguishing high esteemed and potential churning clients to expand benefit and share market. It is comprehended that making new clients are costlier than to holding existing client. There is a current issue that customer leave the organization because of obscure reasons. In our investigation, we predict churn behavior of the client by utilizing diverse data mining methods. It will in the long run help in breaking down client's behavior and characterize whether it is a churning client or not. We utilize online accessible data set available at Kaggle repository and for forecasting of Customer behavior we utilized different algorithms while we achieved 99.8% accuracy level using Bagging Algorithms.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"7 1","pages":"143-147"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74399714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EEG based Directional Signal Classification using RNN Variants","authors":"Bikram Adhikari, Ankit Shrestha, Shailesh Mishra, Suyog Singh, Arun K. Timalsina","doi":"10.1109/CCCS.2018.8586823","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586823","url":null,"abstract":"EEG(Electroencephalogram) signals generated within the brain can be extracted using sensors. Thus generated signals can be classified based on the feature that are embedded within it. The signals once recognized can act as alternative inputs for users suffering from severe motor impairment. The inputs can be used for motion signal i.e directions left, right, up and down. In this paper, the raw EEG signals and power signals generated from NeuroSky Mindwave device have been classified using deep neural networks. Bi-directional Long Short Term Network architecture(Bi-LSTM) and a model which uses Long Short Term Memory(LSTM) with Attention layer have been implemented for the purpose. An accuracy of 56% was obtained using bi-directional LSTM network with raw signals, 44.75% accuracy with power signals, and with attention network using raw signals an accuracy of 63% was obtained.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"309 1","pages":"218-223"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78363504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Title page]","authors":"","doi":"10.1109/cccs.2018.8586806","DOIUrl":"https://doi.org/10.1109/cccs.2018.8586806","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"80 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88591047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Memcached DDoS Exploits: Operations, Vulnerabilities, Preventions and Mitigations","authors":"Kulvinder Singh, Ajit Singh","doi":"10.1109/CCCS.2018.8586810","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586810","url":null,"abstract":"This paper focuses on Memcached security from DDoS attacks during all stages of attack life cycle. It identifies Memcached architecture flaws on the one hand (which are long been ignored by developers of Memcached) and preventions/mitigation of DDoS attacks through several techniques depending on the type of vulnerability being exploited by the attacker on the other hand. In this paper we have explained the Memcached operations and architecture to identify and show the possible flaws in both of them. We have also taken reference of largest DDoS attacks ever recorded in the history of computer networks and as a follow up to recent attacks on Memcached this paper presents a fresh and strong list of simple commands and configuration security steps that are capable to avoid or mitigate Memcached DDoS attacks.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"06 1","pages":"171-179"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81899111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lyla B. Das, J. G., J. E.P., V. K, K. Chandra, M. N. Reddy, B. Yaswant, A. Vivek
{"title":"Multipurpose Unmanned Rover in WiFi Wireless Sensor Network","authors":"Lyla B. Das, J. G., J. E.P., V. K, K. Chandra, M. N. Reddy, B. Yaswant, A. Vivek","doi":"10.1109/CCCS.2018.8586820","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586820","url":null,"abstract":"The project aims to build a multipurpose autonomous rover that could move by itself or by a remote controlled mechanism. It can be sent to hostile and hazardous places where it is unsafe for humans, like mines, radioactive prone areas, etc. thereby reducing human risk. The rover is provided with various sensors that monitors parameter like temperature and smoke. The sensors continuously monitors the environment and update the value to the cloud server, enabling the user to view the values in a website, in real time. The rover could be controlled from smartphone with the help of a Bluetooth app. In addition to this, the webpage has buttons to control the rover. Also, a camera mounted on the rover live streams the video to the webpage, assisting in controlling the movement. The rover can also be used for surveillance, with the help of camera and motion detection algorithms. There is also an automatic mode in which the rover moves on its own in a predefined path.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"44 1","pages":"20-24"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80263351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Traffic Light Control with Statistical Multiplexing Technique and Particle Swarm Optimization in Smart Cities","authors":"B. Manandhar, B. Joshi","doi":"10.1109/CCCS.2018.8586845","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586845","url":null,"abstract":"Vehicular traffic in Urban areas of the globe is continuously increasing and the resulting congestion has become a major concern for transportation management. The traffic signal controls are the major way to manage vehicular flow at the intersections in these urban areas. However, traditional systems fail to adjust the timing pattern based on traffic which demands for need of developing adaptive systems. The focus is this study is to develop an intelligent system that is adaptive to the traffic flow at an intersection point of the real scenarios. A hybrid system comprising of Statistical Multiplexing and Particle Swarm Optimization(PSO) has been developed to control the flow of traffic. The performance of the developed algorithm was tested with both simulated and real traffic count of some major traffic congestion intersection of Kathmandu valley. It was observed that the average waiting time of vehicles on a junction has been reduced.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"87 1","pages":"210-217"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79378288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sparse Regularization based Fusion Technique for Hyperspectral and Multispectral Images using Non-linear Mixing Model","authors":"Nishanth Augustine, S. N. George","doi":"10.1109/CCCS.2018.8586817","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586817","url":null,"abstract":"In this paper, an image fusion technique for fusing hyper spectral and multispectral images based on sparse regularization and subspace modeling is proposed. Here, the problem of fusion is modeled as a linear inverse problem and is solved in a lower dimensional subspace. Non Linear Mixing Model (NLMM) of hyper spectral image is used for the subspace identification and it gives better results than Linear Mixing Model (LMM). A sparse regularization term is generated through adaptive dictionary learning and the fusion task is solved by using alternating optimization technique. Subspace modeling reduces computational complexity considerably. Experimental results show that this method offers significant improvement in fusion performance when compared to that of existing methods.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"64 1","pages":"56-63"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86664240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}