Pub Date : 2022-06-01Epub Date: 2022-04-02DOI: 10.1016/j.gltp.2022.03.014
Sudhanshu Kumar, Thoudam Doren Singh
With the increase in social networks, more number of people are creating and sharing information than ever before, many of them have no relevance to reality. Due to this, fake news for various political and commercial purposes are spreading quickly. Online newspaper has made it challenging to identify trustworthy news sources. In this work, Hindi news articles from various news sources are collected. Preprocessing, feature extraction, classification and prediction processes are discussed in detail. Different machine learning algorithms such as Naïve Bayes, logistic regression and Long Short-Term Memory (LSTM) are used to detect the fake news. The preprocessing step includes data cleaning, stop words removal, tokenizing and stemming. Term frequency inverse document frequency(TF-IDF) is used for feature extraction. Naïve Bayes, logistic regression and LSTM classifiers are used and compared for fake news detection with probability of truth. It is observed that among these three classifiers, LSTM achieved best accuracy of 92.36%.
{"title":"Fake news detection on Hindi news dataset","authors":"Sudhanshu Kumar, Thoudam Doren Singh","doi":"10.1016/j.gltp.2022.03.014","DOIUrl":"10.1016/j.gltp.2022.03.014","url":null,"abstract":"<div><p>With the increase in social networks, more number of people are creating and sharing information than ever before, many of them have no relevance to reality. Due to this, fake news for various political and commercial purposes are spreading quickly. Online newspaper has made it challenging to identify trustworthy news sources. In this work, Hindi news articles from various news sources are collected. Preprocessing, feature extraction, classification and prediction processes are discussed in detail. Different machine learning algorithms such as Naïve Bayes, logistic regression and Long Short-Term Memory (LSTM) are used to detect the fake news. The preprocessing step includes data cleaning, stop words removal, tokenizing and stemming. Term frequency inverse document frequency(TF-IDF) is used for feature extraction. Naïve Bayes, logistic regression and LSTM classifiers are used and compared for fake news detection with probability of truth. It is observed that among these three classifiers, LSTM achieved best accuracy of 92.36%.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 289-297"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X2200019X/pdfft?md5=158942440d14be3e63b882da17dba987&pid=1-s2.0-S2666285X2200019X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74498011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-03DOI: 10.1016/j.gltp.2022.03.012
N Pavitha , Vithika Pungliya , Ankur Raut , Roshita Bhonsle , Atharva Purohit , Aayushi Patel , R Shashidhar
In the modern world, where technology is at the forefront of every industry, there has been an overload of information and data. Thus, a recommendation system comes in handy to deal with this large volume of data and filter out the useful information which is fast and relevant to the user's choice. This paper describes an approach to a movie recommendation system using Cosine Similarity to recommend similar movies based on the one chosen by the user. Although the existing recommendation systems get the job done, it does not justify if the movie is worth spending time on. To enhance the user experience, this system performs sentiment analysis on the reviews of the movie chosen using machine learning. Two of the supervised machine learning algorithms Naïve Bayes (NB) Classifier and Support Vector Machine (SVM) Classifier are used to increase the accuracy and efficiency. This paper also gives a comparison between NB and SVM on the basis of parameters like Accuracy, Precision, Recall and F1 Score. The accuracy score of SVM came out to be 98.63% whereas accuracy score of NB is 97.33%. Thus, SVM outweighs NB and proves to be a better fit for Sentiment Analysis.
{"title":"Movie recommendation and sentiment analysis using machine learning","authors":"N Pavitha , Vithika Pungliya , Ankur Raut , Roshita Bhonsle , Atharva Purohit , Aayushi Patel , R Shashidhar","doi":"10.1016/j.gltp.2022.03.012","DOIUrl":"10.1016/j.gltp.2022.03.012","url":null,"abstract":"<div><p>In the modern world, where technology is at the forefront of every industry, there has been an overload of information and data. Thus, a recommendation system comes in handy to deal with this large volume of data and filter out the useful information which is fast and relevant to the user's choice. This paper describes an approach to a movie recommendation system using Cosine Similarity to recommend similar movies based on the one chosen by the user. Although the existing recommendation systems get the job done, it does not justify if the movie is worth spending time on. To enhance the user experience, this system performs sentiment analysis on the reviews of the movie chosen using machine learning. Two of the supervised machine learning algorithms Naïve Bayes (NB) Classifier and Support Vector Machine (SVM) Classifier are used to increase the accuracy and efficiency. This paper also gives a comparison between NB and SVM on the basis of parameters like Accuracy, Precision, Recall and F1 Score. The accuracy score of SVM came out to be 98.63% whereas accuracy score of NB is 97.33%. Thus, SVM outweighs NB and proves to be a better fit for Sentiment Analysis.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 279-284"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000176/pdfft?md5=91882803ca7268fd2f37aa582145099a&pid=1-s2.0-S2666285X22000176-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72597985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-02DOI: 10.1016/j.gltp.2022.04.010
Sagar K. Khairnar, Somnath S. Hadpe, Rakesh G. Shriwastava, Shridhar S. Khule
The development of HVDC transmission technology using an MMC has been promoted, by overcoming the drawbacks of traditional VSC technology. The extension of flexible transmission to overhead lines, especially the use of HVDC transmission based on an MMC, raises the issue of DC fault. So identification of fault, clearing the dc fault, and design of fast-acting protection system operating against fault becomes significant. This article provides insights on the monopolar structured MMC and operational characteristics, fault analysis, and a fault protection scheme. DC line faults on HVDC lines using MMC-VSC are major issues; isolation of complete system is not a viable option. It is observed that Pole to ground fault is the most common fault, which leads to generous overcurrent in the AC grid and results in converter valves getting damaged. This article analyzes the response of MMC-HVDC under different DC and AC faults conditions for five-level MMC HVDC systems, to better understand systems under fault. Faults also have an impact on the converter stations' performance. The voltages fluctuate in faulty situations. In comparison to the inverter station, the rectifier station has the most impact. Simulation is performed out in PSCAD software. The correctness and effectiveness of DC and AC fault analysis helps to check the capability of locating fault occurring on HVDC transmission lines quickly and accurately
{"title":"Fault detection and diagnosis of monopolar configured VSC based high voltage direct current transmission line","authors":"Sagar K. Khairnar, Somnath S. Hadpe, Rakesh G. Shriwastava, Shridhar S. Khule","doi":"10.1016/j.gltp.2022.04.010","DOIUrl":"10.1016/j.gltp.2022.04.010","url":null,"abstract":"<div><p>The development of HVDC transmission technology using an MMC has been promoted, by overcoming the drawbacks of traditional VSC technology. The extension of flexible transmission to overhead lines, especially the use of HVDC transmission based on an MMC, raises the issue of DC fault. So identification of fault, clearing the dc fault, and design of fast-acting protection system operating against fault becomes significant. This article provides insights on the monopolar structured MMC and operational characteristics, fault analysis, and a fault protection scheme. DC line faults on HVDC lines using MMC-VSC are major issues; isolation of complete system is not a viable option. It is observed that Pole to ground fault is the most common fault, which leads to generous overcurrent in the AC grid and results in converter valves getting damaged. This article analyzes the response of MMC-HVDC under different DC and AC faults conditions for five-level MMC HVDC systems, to better understand systems under fault. Faults also have an impact on the converter stations' performance. The voltages fluctuate in faulty situations. In comparison to the inverter station, the rectifier station has the most impact. Simulation is performed out in PSCAD software. The correctness and effectiveness of DC and AC fault analysis helps to check the capability of locating fault occurring on HVDC transmission lines quickly and accurately</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 43-54"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000462/pdfft?md5=20b31817812d443fd78542bce968daa5&pid=1-s2.0-S2666285X22000462-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76850132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-02DOI: 10.1016/j.gltp.2022.04.022
D. Antony Joseph Rajan, E R Naganathan
A network system called Wireless Sensor Network is made up of wireless sensor node devices that are spread at random (WSN). WSNs are a critical paradigm for the Internet of Things' evolution (IoT). Strong security measures must be done to protect the network from security threats and malicious assaults in order to make it more efficient. To identify and isolate hostile sensor nodes in a cloud-assisted WSN-IoT system, the Trusted Anonymous Lightweight Attacker Detection (TALAD) scheme is presented. The TALAD strategy creates a routing path to the cloud with highly trusted nodes, subject to a desired path length limit. Using the binomial algebraic theorem, the node identities are formed with bogus identities, and the original identity is hidden from the other nodes in the network. If only the forward key and the reverse key string are matched, the nodes' original identities are exposed. The forward and reverse keys are mapped using a context-free grammar rule. Even when a major chunk of the network drops to forward packets, TALAD successfully avoids incursions, according to the simulation results.
{"title":"Trust based anonymous intrusion detection for cloud assisted WSN-IOT","authors":"D. Antony Joseph Rajan, E R Naganathan","doi":"10.1016/j.gltp.2022.04.022","DOIUrl":"10.1016/j.gltp.2022.04.022","url":null,"abstract":"<div><p>A network system called Wireless Sensor Network is made up of wireless sensor node devices that are spread at random (WSN). WSNs are a critical paradigm for the Internet of Things' evolution (IoT). Strong security measures must be done to protect the network from security threats and malicious assaults in order to make it more efficient. To identify and isolate hostile sensor nodes in a cloud-assisted WSN-IoT system, the Trusted Anonymous Lightweight Attacker Detection (TALAD) scheme is presented. The TALAD strategy creates a routing path to the cloud with highly trusted nodes, subject to a desired path length limit. Using the binomial algebraic theorem, the node identities are formed with bogus identities, and the original identity is hidden from the other nodes in the network. If only the forward key and the reverse key string are matched, the nodes' original identities are exposed. The forward and reverse keys are mapped using a context-free grammar rule. Even when a major chunk of the network drops to forward packets, TALAD successfully avoids incursions, according to the simulation results.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 104-108"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000589/pdfft?md5=6abb579bbed9bd916ac17c28162f719f&pid=1-s2.0-S2666285X22000589-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84503212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-03DOI: 10.1016/j.gltp.2022.04.007
Mahantesh Mattada , Saba Fatima , V Viswanatha , Kalyani Rasika , P. Vishwanath
Power saving is the need of the day and in India it is a major issue to be looked into. To get uninterrupted supply nowadays power backups such as inverters and UPS are used commonly. If it is a traditional UPS it is difficult to know remaining power and time till it can supply energy in terms of power. In order to overcome this issue, a design is proposed in the following paper. Working model of microcontroller based intelligent Uninterrupted Power Supply (UPS) system for power management in laboratory is worked upon. The appliances of lab viz. computers, fans, lights are automatically controlled during power failure according to their priority to ensure optimal utilization of UPS power. This work mainly concentrates on two key points. Firstly, calculating possible time of battery run-away and displaying it on user screen; secondly, prioritizing and operating different appliances according user requirement. The results are far satisfactory and can be implemented in real time analysis.
{"title":"Smart power management system for uninterrupted power supplies (UPS) with priorities","authors":"Mahantesh Mattada , Saba Fatima , V Viswanatha , Kalyani Rasika , P. Vishwanath","doi":"10.1016/j.gltp.2022.04.007","DOIUrl":"10.1016/j.gltp.2022.04.007","url":null,"abstract":"<div><p>Power saving is the need of the day and in India it is a major issue to be looked into. To get uninterrupted supply nowadays power backups such as inverters and UPS are used commonly. If it is a traditional UPS it is difficult to know remaining power and time till it can supply energy in terms of power. In order to overcome this issue, a design is proposed in the following paper. Working model of microcontroller based intelligent Uninterrupted Power Supply (UPS) system for power management in laboratory is worked upon. The appliances of lab viz. computers, fans, lights are automatically controlled during power failure according to their priority to ensure optimal utilization of UPS power. This work mainly concentrates on two key points. Firstly, calculating possible time of battery run-away and displaying it on user screen; secondly, prioritizing and operating different appliances according user requirement. The results are far satisfactory and can be implemented in real time analysis.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 38-42"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000437/pdfft?md5=60d8b43f277eebc80fc5a0f52c4fbf09&pid=1-s2.0-S2666285X22000437-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91018755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-03DOI: 10.1016/j.gltp.2022.03.009
Plasin Francis Dias , R.M. Banakar
Synthetic aperture radar is an advanced remote sensing and imaging radar. It plays vital role in acquiring high resolution images of earth surface. The capturing of images by synthetic aperture radar is done in any season immaterial of weather conditions. This paper gives the details of the basic feature extraction for the snow images. The two sample images are analyzed to know the feature details of the object under consideration. Analytical details of variation in entropy and the polarization were considered. The scattering mechanism involved in the snow area is analyzed. The details of snow classification based on its layered structure along with its physical nature like moisture involved are presented. The results indicate a high value of entropy of 0.94 for the snow image. The reason for high entropy is because of more surface uniformity in the snow images. The flat surface structured snow basically exhibits the surface scattering mechanism.
{"title":"Quantitative approach for snowy feature detection using polarimetric analysis","authors":"Plasin Francis Dias , R.M. Banakar","doi":"10.1016/j.gltp.2022.03.009","DOIUrl":"10.1016/j.gltp.2022.03.009","url":null,"abstract":"<div><p>Synthetic aperture radar is an advanced remote sensing and imaging radar. It plays vital role in acquiring high resolution images of earth surface. The capturing of images by synthetic aperture radar is done in any season immaterial of weather conditions. This paper gives the details of the basic feature extraction for the snow images. The two sample images are analyzed to know the feature details of the object under consideration. Analytical details of variation in entropy and the polarization were considered. The scattering mechanism involved in the snow area is analyzed. The details of snow classification based on its layered structure along with its physical nature like moisture involved are presented. The results indicate a high value of entropy of 0.94 for the snow image. The reason for high entropy is because of more surface uniformity in the snow images. The flat surface structured snow basically exhibits the surface scattering mechanism.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 195-201"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000140/pdfft?md5=80bdd469b7082017cdbb725f8facee24&pid=1-s2.0-S2666285X22000140-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77592369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-02DOI: 10.1016/j.gltp.2022.03.003
Abdullah Y. Muaad , G. Hemantha Kumar , J. Hanumanthappa , J.V. Bibal Benifa , M. Naveen Mourya , Channabasava Chola , M. Pramodha , R. Bhairava
Arabic text classification is one application of Natural Language Processing (NLP). It has been used to analyze and categorize Arabic text. Analyzing text has become an essential part of our lives because of the increasing number of text data which makes text classification a big data problem. Arabic text classification systems become significant to maintain vital information in many domains such as education, and health sector, and public services. In the presented research work, the Arabic text classification model is developed using various algorithms namely Multinomial Naïve Bayesian (MNB), Bernoulli Naïve Bayesian (BNB), Stochastic Gradient Descent (SGD), Logistic Regression (LR), Support vector classifier (SVC), Linear SVC, and convolutional neural networks (CNN). These algorithms have been implemented utilizing the Al-Khaleej dataset. The experiments are carried out with various representation models and it is observed that CNN with character level model outperforms others. The result of CNN exceeds the state-of-the-art machine learning method with an accuracy equal to 98. The presented methods will be useful in different domains, particularly on social media.
{"title":"An effective approach for Arabic document classification using machine learning","authors":"Abdullah Y. Muaad , G. Hemantha Kumar , J. Hanumanthappa , J.V. Bibal Benifa , M. Naveen Mourya , Channabasava Chola , M. Pramodha , R. Bhairava","doi":"10.1016/j.gltp.2022.03.003","DOIUrl":"10.1016/j.gltp.2022.03.003","url":null,"abstract":"<div><p>Arabic text classification is one application of Natural Language Processing (NLP). It has been used to analyze and categorize Arabic text. Analyzing text has become an essential part of our lives because of the increasing number of text data which makes text classification a big data problem. Arabic text classification systems become significant to maintain vital information in many domains such as education, and health sector, and public services. In the presented research work, the Arabic text classification model is developed using various algorithms namely Multinomial Naïve Bayesian (MNB), Bernoulli Naïve Bayesian (BNB), Stochastic Gradient Descent (SGD), Logistic Regression (LR), Support vector classifier (SVC), Linear SVC, and convolutional neural networks (CNN). These algorithms have been implemented utilizing the Al-Khaleej dataset. The experiments are carried out with various representation models and it is observed that CNN with character level model outperforms others. The result of CNN exceeds the state-of-the-art machine learning method with an accuracy equal to 98. The presented methods will be useful in different domains, particularly on social media.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 267-271"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000036/pdfft?md5=36c739d798dd1fd9e54e70d8ff68307f&pid=1-s2.0-S2666285X22000036-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79032613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-03DOI: 10.1016/j.gltp.2022.03.002
Shaila Shirke, Shridhar S. Khule
A DVR is being used to minimize the power quality problem. The SPWM method has been popularly used in DVR but use of the DC bus is restricted in SPWM, which is critical due to economical as well as power packaging density improvements. The proposed THIPWM scheme has been deduced from SPWM by adding one-sixth of the third harmonic signal in the fundamental signal. Repetitive Controller (RC) with Third Harmonic Injection (THI) technique is applied to achieve better dc-link utilization for medium-low voltage distribution. As an outcome, it's indeed evident that 15% reflects an increment in dc bus utilization as well as the potential to create high voltage AC. The control system comprises a feed-forward as well as feedback run to enhance the transient response & confirm the steady zero error. THD results improve when the THIPWM methodology is being used. PSCAD software is being used for the computation, which generated accurate findings for the THIPWM and Repetitive Control systems approach.
{"title":"Improved DC bus utilization of DVR based on repetitive controller with THIPWM technique","authors":"Shaila Shirke, Shridhar S. Khule","doi":"10.1016/j.gltp.2022.03.002","DOIUrl":"10.1016/j.gltp.2022.03.002","url":null,"abstract":"<div><p>A DVR is being used to minimize the power quality problem. The SPWM method has been popularly used in DVR but use of the DC bus is restricted in SPWM, which is critical due to economical as well as power packaging density improvements. The proposed THIPWM scheme has been deduced from SPWM by adding one-sixth of the third harmonic signal in the fundamental signal. Repetitive Controller (RC) with Third Harmonic Injection (THI) technique is applied to achieve better dc-link utilization for medium-low voltage distribution. As an outcome, it's indeed evident that 15% reflects an increment in dc bus utilization as well as the potential to create high voltage AC. The control system comprises a feed-forward as well as feedback run to enhance the transient response & confirm the steady zero error. THD results improve when the THIPWM methodology is being used. PSCAD software is being used for the computation, which generated accurate findings for the THIPWM and Repetitive Control systems approach.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 257-266"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000024/pdfft?md5=f6d13907c690d48950f2c2f496eb5b16&pid=1-s2.0-S2666285X22000024-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87186964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This review paper provides an overview of data pre-processing in Machine learning, focusing on all types of problems while building the machine learning problems. It deals with two significant issues in the pre-processing process (i). issues with data and (ii). Steps to follow to do data analysis with its best approach. As raw data are vulnerable to noise, corruption, missing, and inconsistent data, it is necessary to perform pre-processing steps, which is done using classification, clustering, and association and many other pre-processing techniques available. Poor data can primarily affect the accuracy and lead to false prediction, so it is necessary to improve the dataset's quality. So, data pre-processing is the best way to deal with such problems. It makes the knowledge extraction from the data set much easier with cleaning, Integration, transformation, and reduction methods. The issue with Data missing and significant differences in the variety of data always exists as the information is collected through multiple sources and from a real-world application. So, the data augmentation approach generates data for machine learning models. To decrease the dependency on training data and to improve the performance of the machine learning model. This paper discusses flipping, rotating with slight degrees and others to augment the image data and shows how to perform data augmentation methods without distorting the original data.
{"title":"A review: Data pre-processing and data augmentation techniques","authors":"Kiran Maharana, Surajit Mondal, Bhushankumar Nemade","doi":"10.1016/j.gltp.2022.04.020","DOIUrl":"10.1016/j.gltp.2022.04.020","url":null,"abstract":"<div><p>This review paper provides an overview of data pre-processing in Machine learning, focusing on all types of problems while building the machine learning problems. It deals with two significant issues in the pre-processing process (i). issues with data and (ii). Steps to follow to do data analysis with its best approach. As raw data are vulnerable to noise, corruption, missing, and inconsistent data, it is necessary to perform pre-processing steps, which is done using classification, clustering, and association and many other pre-processing techniques available. Poor data can primarily affect the accuracy and lead to false prediction, so it is necessary to improve the dataset's quality. So, data pre-processing is the best way to deal with such problems. It makes the knowledge extraction from the data set much easier with cleaning, Integration, transformation, and reduction methods. The issue with Data missing and significant differences in the variety of data always exists as the information is collected through multiple sources and from a real-world application. So, the data augmentation approach generates data for machine learning models. To decrease the dependency on training data and to improve the performance of the machine learning model. This paper discusses flipping, rotating with slight degrees and others to augment the image data and shows how to perform data augmentation methods without distorting the original data.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 91-99"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000565/pdfft?md5=07f57d79f211d64cad95eb9307a68218&pid=1-s2.0-S2666285X22000565-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73812039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-03DOI: 10.1016/j.gltp.2022.03.023
Jaymala D. Pradhan , Somnath S. Hadpe , Rakesh G. Shriwastava
This paper aimed to demonstrate the reliability of the Over Current protection (OCP) scheme in protecting microgrids with inverter interfaced RES for low voltage distribution networks. To prove this reliability, the PSCAD/EMTDC simulation software was used to conduct simulations for the OCP scheme, while comparing throughout grid-connected mode with and without PV generation, as well as in island mode. The computations are carried out using a model of a CIGRE low voltage distribution system. The OCP average relay tripping time for SLG faults through grid mode without PV has been 0.131 s, & 0.121 s for LLL faults. With regards to PV generators, the average relay tripping time increased to 0.199 s & 0.135 s, including both. This is due to the fault current contributed by PV generation inclusion, which restricts the current seen by the predefined OC relays. The findings revealed that some OC relays failed to trip in island mode causing a loss of coordination and a decrease in fault currents. The system was further tested for different generation levels (15%, 57%, and 81%) in island mode and gave a negligible difference in average tripping time for different generation levels.
本文旨在证明过流保护(OCP)方案在保护低压配电网中具有逆变器接口的微电网中的可靠性。为了证明这种可靠性,使用PSCAD/EMTDC仿真软件对OCP方案进行了仿真,同时比较了整个并网模式下有和没有光伏发电以及孤岛模式下的情况。利用CIGRE低压配电系统模型进行了计算。无PV电网模式下SLG故障的OCP平均继电器脱扣时间为0.131 s;LLL故障为0.121 s。光伏发电机组的平均继电器脱扣时间增加到0.199 s &0.135秒,包括两者。这是由于光伏发电产生的故障电流,它限制了预定义的OC继电器看到的电流。研究结果表明,一些OC继电器在孤岛模式下未能跳闸,导致协调损失和故障电流减少。在孤岛模式下,对系统进行了不同发电水平(15%、57%和81%)的进一步测试,不同发电水平的平均跳闸时间差异可以忽略不计。
{"title":"Analysis and design of overcurrent protection for grid-connected microgrid with PV generation","authors":"Jaymala D. Pradhan , Somnath S. Hadpe , Rakesh G. Shriwastava","doi":"10.1016/j.gltp.2022.03.023","DOIUrl":"10.1016/j.gltp.2022.03.023","url":null,"abstract":"<div><p>This paper aimed to demonstrate the reliability of the Over Current protection (OCP) scheme in protecting microgrids with inverter interfaced RES for low voltage distribution networks. To prove this reliability, the PSCAD/EMTDC simulation software was used to conduct simulations for the OCP scheme, while comparing throughout grid-connected mode with and without PV generation, as well as in island mode. The computations are carried out using a model of a CIGRE low voltage distribution system. The OCP average relay tripping time for SLG faults through grid mode without PV has been 0.131 s, & 0.121 s for LLL faults. With regards to PV generators, the average relay tripping time increased to 0.199 s & 0.135 s, including both. This is due to the fault current contributed by PV generation inclusion, which restricts the current seen by the predefined OC relays. The findings revealed that some OC relays failed to trip in island mode causing a loss of coordination and a decrease in fault currents. The system was further tested for different generation levels (15%, 57%, and 81%) in island mode and gave a negligible difference in average tripping time for different generation levels.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 349-358"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000292/pdfft?md5=62cd1d590c4e97d34fafbd62240ee9b1&pid=1-s2.0-S2666285X22000292-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75828996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}