Faculty Publications
Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736
Publications by NITK Faculty
Browse
46 results
Search Results
Item In the present study, various ocean wave parameters are estimated from theoretical Pierson-Moskowitz spectra as well as measured ocean wave spectra using backpropagation neural networks (BNN). Ocean wave parameters estimation by BNN shows that the correlations are very close to one. This substantiates the use of neural networks (NN). For Indian coast, Scott spectra are used as it reasonably represents the measured spectra. The correlations of NN and Scott spectra are also compared. Once the network is trained, the ocean wave parameters can be estimated for unknown measured spectra, whereas significant wave height and spectral peak period are required to first generate the Scott spectra and then estimate other ocean wave parameters. © 2005 Elsevier Ltd. All rights reserved.(Ocean wave parameters estimation using backpropagation neural networks) Mandal, S.; Rao, S.; Raju, D.H.2005Item A novel sentiment analysis of social networks using supervised learning(Springer-Verlag Wien michaela.bolli@springer.at, 2014) Anjaria, M.; Guddeti, R.M.R.Online microblog-based social networks have been used for expressing public opinions through short messages. Among popular microblogs, Twitter has attracted the attention of several researchers in areas like predicting the consumer brands, democratic electoral events, movie box office, popularity of celebrities, the stock market, etc. Sentiment analysis over a Twitter-based social network offers a fast and efficient way of monitoring the public sentiment. This paper studies the sentiment prediction task over Twitter using machine-learning techniques, with the consideration of Twitter-specific social network structure such as retweet. We also concentrate on finding both direct and extended terms related to the event and thereby understanding its effect. We employed supervised machine-learning techniques such as support vector machines (SVM), Naive Bayes, maximum entropy and artificial neural networks to classify the Twitter data using unigram, bigram and unigram + bigram (hybrid) feature extraction model for the case study of US Presidential Elections 2012 and Karnataka State Assembly Elections (India) 2013. Further, we combined the results of sentiment analysis with the influence factor generated from the retweet count to improve the prediction accuracy of the task. Experimental results demonstrate that SVM outperforms all other classifiers with maximum accuracy of 88 % in predicting the outcome of US Elections 2012, and 68 % for Indian State Assembly Elections 2013. © 2014, Springer-Verlag Wien.Item Time delay approach for PSS and SSSC based coordinated controller design using hybrid PSO-GSA algorithm(Elsevier Ltd, 2015) Khadanga, R.K.; Satapathy, J.K.In this work we present a novel approach in order to improve the power system stability, by designing a coordinated structure composed of a power system stabilizer and static synchronous series compensator (SSSC)-based damping controller. In the design approach various time delays and signal transmission delays owing to sensors are included. This is a coordinated design problem which is treated as an optimization problem. A new hybrid particle swarm optimization and gravitational search algorithm (hPSO-GSA) algorithm is used in order to find the controller parameters. The performance of single-machine infinite-bus power system as well as the multi-machine power systems are evaluated by applying the proposed hPSO-GSA based controllers (PSS and damping controller). Various results are shown here with different loading condition and system configuration over a wide range which will prove the robustness and effectiveness of the above design approach. From the results it can be observed that, the proposed hPSO-GSA based controller provides superior damping to the power system oscillation on a wide range of disturbances. Again from the simulation based results it can be concluded that, for a multi-machine power system, the modal oscillation which is very dangerous can be easily damped out with the above proposed approach. © 2015 Elsevier Ltd. All rights reserved.Item An extreme learning machine approach for modeling evapotranspiration using extrinsic inputs(Elsevier B.V., 2016) Patil, A.P.; Deka, P.C.Precise estimation of evapotranspiration is crucial for accurate crop-water estimation. Recently machine learning (ML) techniques like artificial neural network (ANN) are being widely used for modeling the process of evapotranspiration. However, ANN faces issues like trapping in local minima, slow learning and tuning of meta-parameters. In this study an improved extreme learning machine (ELM) algorithm was used to estimate weekly reference crop evapotranspiration (ETo). The study was carried out for Jodhpur and Pali meteorological weather stations located in the Thar Desert, India. The study evaluated the performance of three different input combinations. The first input combination used locally available maximum and minimum air temperature data while the second and third combination used ETo values from another station (extrinsic inputs) along with the locally available temperature data as inputs. The performance of ELM models was compared with the empirical Hargreaves equation, ANN and least-square support vector machine (LS-SVM) models. Root mean squared error (RMSE), Nash-Sutcliffe model efficiency coefficient (NSE) and threshold statistics (TS) were used for comparing the performance of the models. The performance of ELM model was found to be better than the Hargreaves and ANN model. The LS-SVM and ELM displayed similar performance. ELM3 models, with 36 and 33 neurons in hidden layer were found to be the best models (RMSE of 0.43 for Jodhpur and 0.33 for Pali station) for estimating weekly ETo at Jodhpur and Pali stations respectively. The results showed that ELM is a simple yet efficient algorithm which exhibited good performance; hence, can be recommended for estimating weekly ETo. Furthermore, it was also found that use of ETo values from another station can help in improving the efficiency of ML models in limited data scenario. © 2016 Elsevier B.V.Item Application and Evaluation of Random Forest Classifier Technique for Fault Detection in Bioreactor Operation(Taylor and Francis Ltd. michael.wagreich@univie.ac.at, 2017) Shrivastava, R.; Mahalingam, H.; Dutta, N.N.Bioreactors and associated bioprocesses are quite complex and nonlinear in nature. A small change in initial condition can greatly alter the output product quality. It is pretty difficult at times to model the system mathematically. In this work, the fault detection problem is studied in the context of bioreactors, mainly, a reactor from the penicillin production process. It is very important to identify the faults in a live process to avoid product quality deterioration. We have focused on the process history-based methods to identify the faults in a bioreactor. We want to introduce random forest (RF), a powerful machine learning algorithm, to identify several types of faults in a bioreactor. The algorithm is simple, easy to use, shows very good generalization ability without compromising much on the classification accuracies, and also has an ability to give variable importance as a part of the algorithm output. We compared its performance with two popular methods, namely support vector machines (SVM) and artificial neural networks (ANN), and found that the overall performance is superior in terms of classification accuracies and generalization ability. © 2017, Copyright © Taylor & Francis Group, LLC.Item Modified differential evolution algorithm for contrast and brightness enhancement of satellite images(Elsevier Ltd, 2017) Suresh, S.; Lal, S.Satellite images normally possess relatively narrow brightness value ranges necessitating the requirement for contrast stretching, preserving the relevant details before further image analysis. Image enhancement algorithms focus on improving the human image perception. More specifically, contrast and brightness enhancement is considered as a key processing step prior to any further image analysis like segmentation, feature extraction, etc. Metaheuristic optimization algorithms are used effectively for the past few decades, for solving such complex image processing problems. In this paper, a modified differential Modified Differential Evolution (MDE) algorithm for contrast and brightness enhancement of satellite images is proposed. The proposed algorithm is developed with exploration phase by differential evolution algorithm and exploitation phase by cuckoo search algorithm. The proposed algorithm is used to maximize a defined fitness function so as to enhance the entropy, standard deviation and edge details of an image by adjusting a set of parameters to remodel a global transformation function subjective to each of the image being processed. The performance of the proposed algorithm is compared with ten recent state-of-the-art enhancement algorithms. Experimental results demonstrate the efficiency and robustness of the proposed algorithm in enhancing satellite images and natural scenes effectively. Objective evaluation of the compared methods was done using several full-reference and no-reference performance metrics. Qualitative and quantitative evaluation results proves that the proposed MDE algorithm outperforms others to a greater extend. © 2017 Elsevier B.V.Item Leveraging virtual machine introspection with memory forensics to detect and characterize unknown malware using machine learning techniques at hypervisor(Elsevier Ltd, 2017) M.a, M.A.; Jaidhar, C.D.The Virtual Machine Introspection (VMI) has emerged as a fine-grained, out-of-VM security solution that detects malware by introspecting and reconstructing the volatile memory state of the live guest Operating System (OS). Specifically, it functions by the Virtual Machine Monitor (VMM), or hypervisor. The reconstructed semantic details obtained by the VMI are available in a combination of benign and malicious states at the hypervisor. In order to distinguish between these two states, the existing out-of-VM security solutions require extensive manual analysis. In this paper, we propose an advanced VMM-based, guest-assisted Automated Internal-and-External (A-IntExt) introspection system by leveraging VMI, Memory Forensics Analysis (MFA), and machine learning techniques at the hypervisor. Further, we use the VMI-based technique to introspect digital artifacts of the live guest OS to obtain a semantic view of the processes details. We implemented an Intelligent Cross View Analyzer (ICVA) and implanted it into our proposed A-IntExt system, which examines the data supplied by the VMI to detect hidden, dead, and dubious processes, while also predicting early symptoms of malware execution on the introspected guest OS in a timely manner. Machine learning techniques are used to analyze the executables that are mined and extracted using MFA-based techniques and ascertain the malicious executables. The practicality of the A-IntExt system is evaluated by executing large real-world malware and benign executables onto the live guest OSs. The evaluation results achieved 99.55% accuracy and 0.004 False Positive Rate (FPR) on the 10-fold cross-validation to detect unknown malware on the generated dataset. Additionally, the proposed system was validated against other benchmarked malware datasets and the A-IntExt system outperforms the detection of real-world malware at the VMM with performance exceeding 6.3%. © 2017 Elsevier LtdItem Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM(Elsevier B.V., 2018) M.a, A.K.; Jaidhar, C.D.In order to fulfill the requirements like stringent timing restraints and demand on resources, Cyber–Physical System (CPS) must deploy on the virtualized environment such as cloud computing. To protect Virtual Machines (VMs) in which CPSs are functioning against malware-based attacks, malware detection and mitigation technique is emerging as a highly crucial concern. The traditional VM-based anti-malware software themselves a potential target for malware-based attack since they are easily subverted by sophisticated malware. Thus, a reliable and robust malware monitoring and detection systems are needed to detect and mitigate rapidly the malware based cyber-attacks in real time particularly for virtualized environment. The Virtual Machine Introspection (VMI) has emerged as a fine-grained out-of-VM security solution to detect malware by introspecting and reconstructing the volatile memory state of the live guest Operating System (OS) by functioning at the Virtual Machine Monitor (VMM) or hypervisor. However, the reconstructed semantic details by the VMI are available in a combination of benign and malicious states at the hypervisor. In order to distinguish between these two states, extensive manual analysis is required by the existing out-of-VM security solutions. To address the foremost issue, in this paper, we propose an advanced VMM-based guest-assisted Automated Multilevel Malware Detection System (AMMDS) that leverages both VMI and Memory Forensic Analysis (MFA) techniques to predict early symptoms of malware execution by detecting stealthy hidden processes on a live guest OS. More specifically, the AMMDS system detects and classifies the actual running malicious executables from the semantically reconstructed process view of the guest OS. The two sub-components of the AMMDS are: Online Malware Detector (OMD) and Offline Malware Classifier (OFMC). The OMD recognizes whether the running processes are benign or malicious using its Local Malware Signature Database (LMSD) and online malware scanner and the OFMC classify unknown malware by adopting machine learning techniques at the hypervisor. The AMMDS has been evaluated by executing large real-world malware and benign executables on to the live guest OSs. The evaluation results achieved 100% of accuracy and zero False Positive Rate (FPR) on the 10-fold cross-validation in classifying unknown malware with maximum performance overhead of 5.8%. © 2017 Elsevier B.V.Item Detection of phishing websites using an efficient feature-based machine learning framework(Springer London, 2019) Rao, R.S.; Pais, A.R.Phishing is a cyber-attack which targets naive online users tricking into revealing sensitive information such as username, password, social security number or credit card number etc. Attackers fool the Internet users by masking webpage as a trustworthy or legitimate page to retrieve personal information. There are many anti-phishing solutions such as blacklist or whitelist, heuristic and visual similarity-based methods proposed to date, but online users are still getting trapped into revealing sensitive information in phishing websites. In this paper, we propose a novel classification model, based on heuristic features that are extracted from URL, source code, and third-party services to overcome the disadvantages of existing anti-phishing techniques. Our model has been evaluated using eight different machine learning algorithms and out of which, the Random Forest (RF) algorithm performed the best with an accuracy of 99.31%. The experiments were repeated with different (orthogonal and oblique) random forest classifiers to find the best classifier for the phishing website detection. Principal component analysis Random Forest (PCA-RF) performed the best out of all oblique Random Forests (oRFs) with an accuracy of 99.55%. We have also tested our model with the third-party-based features and without third-party-based features to determine the effectiveness of third-party services in the classification of suspicious websites. We also compared our results with the baseline models (CANTINA and CANTINA+). Our proposed technique outperformed these methods and also detected zero-day phishing attacks. © 2018, The Natural Computing Applications Forum.Item Fault diagnosis of single-point cutting tool using vibration signal by rotation forest algorithm(Springer Nature, 2019) Aralikatti, S.S.; Ravikumar, K.N.; Kumar, H.In various machining operations, the tool condition monitoring (TCM) is highly necessary to avoid uncertain downtime in production. TCM provides continuously the condition of cutting tool by noticing various parameters such as temperature, acoustic emission and vibration. One of the best ways to monitor the condition of cutting tools for unmanned machining is by observing tool vibration signature. In the present work, vibration signals are acquired from the cutting tool. One healthy state and three faulty conditions of tools are considered for the study. The faulty tools considered in the current study are worn flank, broken tool and extended overhang. The vibration signals of these faulty tool conditions are used to train the machine learning algorithm. Statistical features are extracted from the vibration signal to feed as input to the J48 decision tree. The classifier algorithm used in the current study is rotation forest algorithm. The algorithm uses only significant features which are selected from a decision tree. The algorithm is validated with test dataset to recognize the faulty or healthy state of the tool. It was found that the algorithm could classify the tool condition with 95.00% classification accuracy. © 2019, Springer Nature Switzerland AG.
