IoT Malware Detection using Machine Learning Ensemble Algorithms

  • Santhadevi D, Janet B

Abstract

This paper exhibits an outline of Discrete Wavelet Transform (DWT) designs and techniques. Two principle strategies; conventional convolution technique and lifting strategy have been examined. The lifting-method gives numerous advantages over conventional convolution strategy. The convolution-method processes double the number of wanted coefficients and discards half of them toward the end. This outcomes in twofold the number of desired computations. The lifting-method gives integer-to-integer and in-place wavelet transform. In this paper, a hardware, speed and throughput efficient architecture for two-dimensional DWT has been proposed. The architecture has been improved by the application of enhancement procedures like row-column, parallelism, pipelining, unfolding and folding. The 2D-DWT is yielded by either utilizing distinct 1D-DWT models over and over again. Different DWT designs have been compared with the proposed architecture based on resources used, throughput and computational speed.

Published
2020-06-01
How to Cite
Santhadevi D, Janet B. (2020). IoT Malware Detection using Machine Learning Ensemble Algorithms. International Journal of Advanced Science and Technology, 29(10s), 8006-8016. Retrieved from http://sersc.org/journals/index.php/IJAST/article/view/24250
Section
Articles