49 research outputs found

    Detecting and Extracting Illegal Signs from Video

    Get PDF
    This project focuses on developing an automated system to detect illegal signs in urban environments from videos. The system utilizes computer vision and machine learning techniques, specifically the YOLOv5 object detection framework, to accurately identify and locate illegal signs in video frames. It incorporates a verification process using Optical Character Recognition (OCR) to differentiate between legal and illegal signs based on the extracted text information. The system is designed as a user-friendly web application, allowing users to upload videos or images for analysis and receive comprehensive results. The system can achieve a detection accuracy of up to 78.6%. With this system, authorities can effectively manage and regulate illegal signs in urban areas, contributing to better urban landscapes

    Modified recurrent equation-based cubic spline interpolation for missing data recovery in phasor measurement unit (PMU) [version 3; peer review: 2 approved, 1 not approved]

    Get PDF
    Background Smart grid systems require high-quality Phasor Measurement Unit (PMU) data for proper operation, control, and decision-making. Missing PMU data may lead to improper actions or even blackouts. While the conventional cubic interpolation methods based on the solution of a set of linear equations to solve for the cubic spline coefficients have been applied by many researchers for interpolation of missing data, the computational complexity increases non-linearly with increasing data size. Methods In this work, a modified recurrent equation-based cubic spline interpolation procedure for recovering missing PMU data is proposed. The recurrent equation-based method makes the computations of spline constants simpler. Using PMU data from the State Load Despatch Center (SLDC) in Madhya Pradesh, India, a comparison of the root mean square error (RMSE) values and time of calculation (ToC) is calculated for both methods. Results The modified recurrent relation method could retrieve missing values 10 times faster when compared to the conventional cubic interpolation method based on the solution of a set of linear equations. The RMSE values have shown the proposed method is effective even for special cases of missing values (edges, continuous missing values). Conclusions The proposed method can retrieve any number of missing values at any location using observed data with a minimal number of calculations

    Driving event recognition using machine learning and smartphones [version 2; peer review: 2 approved]

    Get PDF
    Background: The lack of real-time monitoring is one of the reasons for the lack of awareness among drivers of their dangerous driving behavior. This work aims to develop a driver profiling system where a smartphone’s built-in sensors are used alongside machine learning algorithms to classify different driving behaviors. Methods: We attempt to determine the optimal combination of smartphone sensors such as accelerometer, gyroscope, and GPS in order to develop an accurate machine learning algorithm capable of identifying different driving events (e.g. turning, accelerating, or braking). Results: In our preliminary studies, we encountered some difficulties in obtaining consistent driving events, which had the potential to add “noise” to the observations, thus reducing the accuracy of the classification. However, after some pre-processing, which included manual elimination of extraneous and erroneous events, and with the use of the Convolutional Neural Networks (CNN), we have been able to distinguish different driving events with an accuracy of about 95%. Conclusions: Based on the results of preliminary studies, we have determined that the proposed approach is effective in classifying different driving events, which in turn will allow us to determine driver’s driving behavior

    Intrusion detection framework for encrypted networks

    Get PDF
    Network-based Intrusion Detection Systems (NIDSs) monitor network traffic for signs of malicious activities that have the potential to disrupt entire network infrastructures and services. NIDS can only operate when the network traffic is available and can be extracted for analysis. However, with the growing use of encrypted networks such as Virtual Private Networks (VPNs) that encrypt and conceal network traffic, a traditional NIDS can no longer access network traffic for analysis. The goal of this research is to address this problem by proposing a detection framework that allows a commercial off-the-shelf NIDS to function normally in a VPN without any modification. One of the features of the proposed framework is that it does not compromise on the confidentiality afforded by the VPN. Our work uses a combination of Shamir’s secret-sharing scheme and randomised network proxies to securely route network traffic to the NIDS for analysis. The detection framework is effective against two general classes of attacks – attacks targeted at the network hosts or attacks targeted at framework itself. We implement the detection framework as a prototype program and evaluate it. Our evaluation shows that the framework does indeed detect these classes of attacks and does not introduce any additional false positives. Despite the increase in network overhead in doing so, the proposed detection framework is able to consistently detect intrusions through encrypted networks

    Robust Watermarking Scheme Using Chinese Remainder Theorem-Based Error Correcting Codes

    No full text
    One of the more promising technologies that can be used to curtail the illegal usage of copyrighted contents is digital watermarking. A robust watermarking scheme using error correcting codes is proposed. In this block-based scheme for greyscale images, relationships between blocks of pixels are exploited to inconspicuously embed the watermark. Furthermore, watermark recovery is performed without the need of the original image watermark. The robustness of the watermarking scheme is tested for various image manipulation techniques

    Multiple error detection and correction based on redundant residue number systems

    No full text
    This paper presents some results on multiple error detection and correction based on the Redundant Residue Number System (RRNS). RRNS is often used in parallel processing environments because of its ability to increase the robustness of information passing between the processors. The proposed multiple error correction scheme utilizes the Chinese Remainder Theorem (CRT) together with a novel algorithm that significantly simplifies the error correcting process for integers. An extension of the scheme further reduces the computational complexity without compromising its error correcting capability. Proofs and examples are provided for the coding technique

    Anonymous Multi-Party Identification Without Certificates

    No full text
    Security and Privacy concerns are a growing problem in our internet world today in which privacy is not given enough concern when compared to security. For example, in building security systems depend upon identification schemes which is secure but offers no privacy to end users. There needs to be a way to guarantee the privacy of the people entering the building while maintaining building security. We design two schemes that can be used in cases like this where the privacy of the end user is guaranteed while maintaining the security of the scheme

    Detecting attacks in encrypted networks using secret-sharing schemes\ud

    No full text
    Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides being used to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted Networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor such encrypted traffic. We therefore describe how our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment.\u

    Towards intrusion detection for encrypted networks

    Get PDF
    Traditionally, network-based Intrusion Detection Systems (NIDS) monitor network traffic for signs of malicious activities. However, with the growing use of Virtual Private Networks (VPNs) that encrypt network traffic, the NIDS can no longer analyse the encrypted data. This essentially negates any protection offered by the NIDS. Although the encrypted traffic can be decrypted at a network gateway for analysis, this compromises on data confidentiality. In this paper, we propose a detection framework which allows a traditional NIDS to continue functioning, without compromising the confidentiality afforded by the VPN. Our approach uses Shamir's secret-sharing scheme and randomised network proxies to enable detection of malicious activities in encrypted channels. Additionally, this approach is able to detect any malicious attempts to forge network traffic with the intention of evading detection. Our experiments show that the probability of a successful evasion is low, at about 0.98\% in the worst case. We implement our approach in a prototype and present some preliminary results. Overall, the proposed approach is able to consistently detect intrusions and does not introduce any additional false positives

    Chicken Disease Detection by Identifying Chicken Droppings

    No full text
    Taking care of chicken by manually for a big farm is not that easy. Chicken can be affected by many kinds of disease. To find out the disease before it spread among all chickens and give proper medical treatment is very important and also very sensitive. Disease also affects chicken’s digestive system which results in changing color of chicken droppings. By detecting chicken droppings using deep learning, it can easily identify chicken disease. In this study, we propose a solution based on the best real-time object detection algorithm You only look once version 7 (YOLOv7) to detect chicken disease by identifying chicken droppings so that farmers can aware of about disease affected chicken
    corecore