Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 10 of 51
  • Item
    UPM-NoC: Learning based framework to predict performance parameters of mesh architecture in on-chip networks
    (Springer, 2020) Kumar, A.; Talawar, B.
    Conventional Bus-based On-Chips are replaced by Packet-switched Network-on-Chip (NoC) as a large number of cores are contained on a single chip. Cycle accurate NoC simulators are essential tools in the earlier stages of design. Simulators which are cycle accurate performs gradually as the architecture size of NoC increases. NoC architectures need to be validated against discrete synthetic traffic patterns. The overall performance of NoC architecture depends on performance parameters like network latency, packet latency, flit latency, and hop count. Hence we propose a Unified Performance Model (UPM) to deliver precise measurements of NoC performance parameters. This framework is modeled using distinct Machine Learning (ML) regression algorithms to predict performance parameters of NoCs considering different synthetic traffic patterns. The UPM framework can be used to analyze the performance parameters of Mesh NoC architecture. Results obtained were compared against the widely used cycle accurate Booksim simulator. Experiments were conducted by varying topology size from 2×2 to 50×50 with different virtual channels, traffic patterns, and injection rates. The framework showed an approximate prediction error of 5% to 6% and overall minimum speedup of 3000× to 3500×. © Springer Nature Singapore Pte Ltd 2020.
  • Item
    Machine Learning Models with Optimization for Clothing Recommendation from Personal Wardrobe
    (Institute of Electrical and Electronics Engineers Inc., 2020) Jain, M.; Singh, S.; Chandrasekaran, K.; Rathnamma, M.V.; Ramana, V.
    In the present-day scenario, several clothing recommender systems have been developed for the online e-commerce industry. However, when it comes to recommending clothes that a person already possesses, i.e, from their personal wardrobe, there are very few systems that have been proposed to perform the task. In this paper, we tackle the latter issue, and perform experimental analysis of the various Machine Learning techniques that can be used for carrying out the task. Since the recommendations must be made from a user's personal wardrobe, the recommender system doesn't follow a traditional approach. This is explained in detail in the following sections. Further, the paper contains a complete description of the results obtained from the experiments conducted, and the best approach is specified, with appropriate justification for the same. © 2020 IEEE.
  • Item
    A Deep Learning Model for the Automatic Detection of Malignancy in Effusion Cytology
    (Institute of Electrical and Electronics Engineers Inc., 2020) Aboobacker, S.; Vijayasenan, D.; Sumam David, S.; Suresh, P.K.; Sreeram, S.
    The excessive accumulation of fluid between layers of pleura covering lungs is known as pleural effusion. Pleural effusion may be due to various infections, inflammations or malignancy. The cytologists visually examine the microscopic slide to detect the malignant cells. The process is time-consuming, and interpretation of reactive cells and cells with ambiguous levels of atypia may differ between pathologists. Considerable research is happening towards the automation of fluid cytology reporting. We propose an integrated approach based on deep learning, where the network learns directly to detect the malignant cells in effusion cytology images. Architecture U-Net is used to learn the malignant and benign cells from the images and to detect the images that contain malignant cells. The model gives a precision of 0.96, recall of 0.96, and specificity of 0.97. The AUC of the ROC curve is 0.97. The model can be used as a screening tool and has a malignant cell detection rate of 0.96 with a low false alarm rate of 0.03. © 2020 IEEE.
  • Item
    Predictive analytics and data mining in healthcare
    (Institute of Electrical and Electronics Engineers Inc., 2021) Arjun, A.; Srinath, A.; Chandavarkar, B.R.
    Machine Learning and Data Mining for healthcare. There has been an enormous growth in the field of HIT (health information technology) in the recent years. Be it detection of certain diseases, scanning of organs, finding tumors, these machine oriented operations without human intervention, have certainly increased the quality of medical attention one can get, and the technology required has come a long way. Health data tends to be inherently complex with exceptions in almost all cases. Data mining is the technique of converting raw data into a meaningful format. Analysis and prediction on such data, although computationally and algorithmically complex, is an emerging technology that is a small step to more proactive and preventive automated treatment options.There are various data mining techniques such as classification, clustering, association, regression,prediction, pattern recognition etc [I]. Even the efficiency of certain medicines can be found using machine learning techniques, which is a life saving and cost effective method. In this paper, we are going to use machine learning as a tool for predictive analysis to predict chronic kidney diseases based on the Chronic disease dataset taken from VCI M L repository. We will be applying machine learning algorithms, specifically decision trees, to build a classifier to predict if a person has the disease or not. This paper shows the issue that specific machine learning algorithms need to be tailor-made to specific nature of medical data. © 2021 IEEE.
  • Item
    Conversational Hate-Offensive detection in Code-Mixed Hindi-English Tweets
    (CEUR-WS, 2021) Rajalakshmi, R.; Srivarshan, S.; Mattins, F.; Kaarthik, E.; Seshadri, P.; Anand Kumar, M.
    Hate speech in social media has increased due to the increased use of online forums for sharing the opinion among the people. Especially, people prefer expressing the views in their native language while posting such objectionable contents in many social media platforms. It is a challenging task to have an automated system to identify such hate and offensive tweets in many regional languages due to the rich linguistics nature. Recently, this problem has become too complicated, due to the use of multi-lingual and code-mixed tweets. The code-mixed data includes the mixing of two languages on the granular level. A word that might not be a part of either language may be found in the data. To address the above challenges in Hindi-English tweets, we propose an efficient method by combining the IndicBERT with an effective ensemble based method. We have applied different methodologies to find a way to accurately classify whether the given tweet is considered to be Hate Speech or Not in code-mixed Hinglish dataset. Three different models namely, IndicBERT, XLM Roberta and Masked LM were used to embed the tweet data. Then various classification methods such as Logistic Regression, Support Vector Machine, Ensembling and Neural Networks based method were applied to perform classification. From extensive experiments on the data set, embedding the code-mixed data with IndicBERT and Ensembling was found to be the best method, which resulted in an macro F1-score of 62.53%. This work was submitted to the shared task of the HASOC 2021 [1] [2] Hate Speech and Offensive Content Identification in English and Indo-Aryan Languages Competition by team TNLP. © 2021 Copyright for this paper by its authors.
  • Item
    DNS tunneling detection using machine learning and cache miss properties
    (Institute of Electrical and Electronics Engineers Inc., 2021) Chowdhary, A.; Bhowmik, M.; Rudra, B.
    In a DNS Tunneling attack, data or other useful information is embedded within a DNS query and exfiltrated. Such attacks are difficult to detect because DNS is a fundamental protocol and blocking legitimate domain names can lead to an unpleasant experience for the users. Thus, detecting whether the DNS query is exfiltrating data or not is a challenging task. Mimicking genuine queries by the attacker makes this even more difficult. This research work presents two different methods for detecting the DNS Tunneling query and later they are combined to build a DNS Tunneling Attack Detector that can inform the client about a potential attack going on in real time. The first method uses cache misses in a DNS cache server and the second method utilizes machine learning techniques to classify a given DNS query. Overall, with around 93% accuracy of certain Machine Learning classifiers on classifying on a per packet basis along with extra validation from the cache-miss approach, a detector has been developed to accurately report DNS tunneling traffic © 2021 IEEE.
  • Item
    ML based QSAR Models for Prediction of Pharmacological Permeability of Caco-2 Cell
    (Institute of Electrical and Electronics Engineers Inc., 2021) Likitha, S.; Kamath S․, S.
    In the initial stages of de novo drug discovery, numerous drug components need to be considered, in order to determine those candidates which bind to a particular disease protease. The greater the binding effect the better the drug efficacy. However, mapping every potentially relevant drug and its effect on the protein is a time consuming task. To discard the drugs at the initial stage we can know how much permeable a drug is through a particular layer or cell membrane. A potential approach to determine this by measuring the permeability of a compound through a specific layer. In this paper, an approach for QSAR regression for predicting pharmacological permeability of the Caco-2 cell is proposed. The compounds are represented by chemical descriptors calculated from their construction properties and structural properties sets of descriptors were derived from the chemical compounds structures. Linear regression, nonlinear regression and nonlinear artificial neural network models were experimented with to correlate their reported permeability value. Two different sets of chemical descriptors were derived and each set was used for training different machine learning and neural network models. The results were evaluated using standard metrics like mean square error and R-squared error, during which it was observed that boosting based ML models achieved the lowest values when compared to other regression models. © 2021 IEEE.
  • Item
    An Intelligent Decision Support System for Bid Prediction of Undervalued Football Players
    (Institute of Electrical and Electronics Engineers Inc., 2022) Datta, M.; Rudra, B.
    The process of selecting football team players will determines a team's performance. An effective team is made up of a successful group of individual talented players. In general, a football team player selection is a decision made by the club based on the best available information. Club managers and scouts travel to different countries to watch matches and hire the best talent that can help their club to perform better. But for the lower leagues, it becomes difficult to hire the same talents because of strict budget. Here we devise a method so that we can leverage the undervalued players to get selected by the clubs. Clearly the benefit will be in two fold. First, the smaller clubs can get better players at an affordable cost. Second, the bigger clubs can get same performance players at a lower price helping them in cost cutting. We employ novelty detection methods to find out the undervalued players from our data and investigate our method by using five machine learning models. For performance evaluation, the five machine learning models used are support vector machine, Random Forest, Decision Tree, Linear Regression and XGBoost. Here XGboost performed best both for 10 fold cross-validation and external testing with a RMSE of 0.0122 and 0.0107 respectively. © 2022 IEEE.
  • Item
    Comparative Analysis of Machine Learning Algorithms for Disease Detection in Apple Leaves
    (Institute of Electrical and Electronics Engineers Inc., 2022) Sai, A.M.; Patil, N.
    Leaves serve as unique indicators to distinguish the diseased leaves because the image information of the leaf changes when it is suffering from some disease. To detect these diseases, we need to recognize the patterns formed by the diseases in the leaves. Generally, plants are observed with a naked eye by either experts or farmers to detect and identify the plants. But this method can be expensive and time processing; therefore, it is essential to automate crop disease diagnosis in regions with few experts. This work revolves around an approach to developing a plant disease detection model based on apple leaves. The proposed methodology uses the following three feature extraction techniques: Hu Moments, Haralick Texture, and Color Histogram. The research work provides a comparative analysis of machine learning models for detecting diseases in apple leaves, namely: Black Rot, Cedar Apple Rust, and Apple Scab. The model is evaluated on a subset of the 'Plant Village Dataset' dealing with apple leaves. Out of all the machine learning models fitted, Random Forest has obtained the highest test accuracy of 98.125 percent. © 2022 IEEE.
  • Item
    Machine Learning Ensemble Model for Flood Susceptibility Mapping
    (Institute of Electrical and Electronics Engineers Inc., 2022) Kundapura, S.; Soman, A.; Kuruvilla, E.
    Floods can be considered the most dangerous natural disaster, given their unpredictability and capacity to wipe out valuable life and property. The timely and efficient prediction of floods and flood susceptible or risk zones has been of utmost importance and can help with risk assessment, long-term management, and future preparedness. Over the years, Machine Learning (ML) has evolved as a powerful tool to build accurate flood models, inundation maps, and warning systems. This study uses the Support Vector Machine (SVM) and Random Forest (RF) algorithms and a Bagging Ensemble Model for Flood Susceptibility Mapping of Ernakulam, Kerala, India using multi-source geospatial data and the WEKA software. A total of twelve Flood Conditioning Factors (FCFs) are considered as variables, namely elevation, slope, curvature, Topographic Roughness Index (TRI), Topographic Wetness Index (TWI), Stream Power Index (SPI), rainfall, Land Use Land Cover (LULC), distance to the river, drainage density, and geology. The contribution of factors is assessed using the OneR Feature Selection method. The models are compared using the Receiver Operating Characteristics (ROC) curve and the Area Under the Curve (AUC) method. The Flood Susceptibility Map provides an opportunity for planners and authorities to flood preparation and long-term planning against flood impacts. © 2022 IEEE.