首页 > 最新文献

2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT)最新文献

英文 中文
Pica-A Hybrid Feature Extraction Technique Based on Principal Component Analysis and Independent Component Analysis 基于主成分分析和独立成分分析的混合特征提取技术
Pub Date : 2022-10-07 DOI: 10.1109/GCAT55367.2022.9971838
Vineeta Gulati, Neeraj Raheja, Rajneesh Gujral
Feature Extraction (EF) is considered the effective process among all the data processing steps of the classification system. In real-life applications, the reliability of a classifier is highly affected by high-dimensional irrelevant and redundant information. Hence extraction of appropriate data plays an imperative role to reduce the dimensionality and increase the performance of the classification system. Herein paper, a hybrid Principal Independent Component Analysis (PICA) technique is presented by the combination of the two most popular Principal Component Analysis (PCA) and Singular Value Decomposition (SVD) feature extraction techniques. The authors execute the proposed PICA technique with the SGD classifier of machine learning (ML) and analyze the performance by comparing the results with existing PCA, LDA, SVD, and ICA feature extraction techniques. Furthermore, to evaluate the PICA's performance, results are compared without applying any feature extraction techniques or with existing ICA, PCA, LDA, and SVD methods. The effectiveness of the presented work is better than existing work found in the literature and is considered on an improved scale of accomplished 3.94% accuracy, 1.35% Sensitivity, 7.70% Specificity, and 5.27% precision. Moreover, decrease the 42.60% RMSE and 15% dimensionality.
特征提取(EF)被认为是分类系统所有数据处理步骤中最有效的步骤。在实际应用中,分类器的可靠性受到高维不相关和冗余信息的高度影响。因此,提取合适的数据对于降低分类系统的维数,提高分类系统的性能至关重要。本文将两种最流行的主成分分析(PCA)和奇异值分解(SVD)特征提取技术相结合,提出了一种混合主独立成分分析(PICA)技术。作者使用机器学习(ML)的SGD分类器执行了所提出的PICA技术,并通过将结果与现有的PCA, LDA, SVD和ICA特征提取技术进行比较来分析性能。此外,为了评估PICA的性能,在不使用任何特征提取技术或与现有的ICA、PCA、LDA和SVD方法进行比较的情况下,对结果进行了比较。本文工作的有效性优于文献中已有的工作,并以完成3.94%的准确度,1.35%的灵敏度,7.70%的特异性和5.27%的精度的改进量表来考虑。降低了42.60%的均方根误差和15%的维数。
{"title":"Pica-A Hybrid Feature Extraction Technique Based on Principal Component Analysis and Independent Component Analysis","authors":"Vineeta Gulati, Neeraj Raheja, Rajneesh Gujral","doi":"10.1109/GCAT55367.2022.9971838","DOIUrl":"https://doi.org/10.1109/GCAT55367.2022.9971838","url":null,"abstract":"Feature Extraction (EF) is considered the effective process among all the data processing steps of the classification system. In real-life applications, the reliability of a classifier is highly affected by high-dimensional irrelevant and redundant information. Hence extraction of appropriate data plays an imperative role to reduce the dimensionality and increase the performance of the classification system. Herein paper, a hybrid Principal Independent Component Analysis (PICA) technique is presented by the combination of the two most popular Principal Component Analysis (PCA) and Singular Value Decomposition (SVD) feature extraction techniques. The authors execute the proposed PICA technique with the SGD classifier of machine learning (ML) and analyze the performance by comparing the results with existing PCA, LDA, SVD, and ICA feature extraction techniques. Furthermore, to evaluate the PICA's performance, results are compared without applying any feature extraction techniques or with existing ICA, PCA, LDA, and SVD methods. The effectiveness of the presented work is better than existing work found in the literature and is considered on an improved scale of accomplished 3.94% accuracy, 1.35% Sensitivity, 7.70% Specificity, and 5.27% precision. Moreover, decrease the 42.60% RMSE and 15% dimensionality.","PeriodicalId":133597,"journal":{"name":"2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT)","volume":"1993 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128624107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Automated approach to detect & diagnosis the type of Cosmetic Skin & its Disease using Machine Learning 一种使用机器学习自动检测和诊断美容皮肤及其疾病类型的方法
Pub Date : 2022-10-07 DOI: 10.1109/GCAT55367.2022.9972205
Shwetambari Borade, D. Kalbande, Hemangi Jakaria, Linesh Patil
Dermatological illnesses are the most serious problem in the twenty-first century, owing to a lack of awareness and the high cost of diagnosis. To address the issue, we believe that automated methods-based applications will be extremely beneficial in the early stages of diagnosis. As a result, in this research, we describe an automated approach for identifying the kind of cosmetic skin and cosmetic skin condition from photographs. Our model is created utilizing machine learning methods. The model consists of three phases: data gathering and data augmentation, features extraction, and prediction.
由于缺乏认识和高昂的诊断费用,皮肤病是21世纪最严重的问题。为了解决这个问题,我们相信基于自动化方法的应用将在早期诊断阶段非常有益。因此,在本研究中,我们描述了一种从照片中识别美容皮肤类型和美容皮肤状况的自动化方法。我们的模型是利用机器学习方法创建的。该模型包括三个阶段:数据收集和数据增强、特征提取和预测。
{"title":"An Automated approach to detect & diagnosis the type of Cosmetic Skin & its Disease using Machine Learning","authors":"Shwetambari Borade, D. Kalbande, Hemangi Jakaria, Linesh Patil","doi":"10.1109/GCAT55367.2022.9972205","DOIUrl":"https://doi.org/10.1109/GCAT55367.2022.9972205","url":null,"abstract":"Dermatological illnesses are the most serious problem in the twenty-first century, owing to a lack of awareness and the high cost of diagnosis. To address the issue, we believe that automated methods-based applications will be extremely beneficial in the early stages of diagnosis. As a result, in this research, we describe an automated approach for identifying the kind of cosmetic skin and cosmetic skin condition from photographs. Our model is created utilizing machine learning methods. The model consists of three phases: data gathering and data augmentation, features extraction, and prediction.","PeriodicalId":133597,"journal":{"name":"2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129645169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Approach for Designing Network Intrusion Detection Systems Based on Hybrid Deep Learning Model CB-GRU 基于混合深度学习模型CB-GRU的网络入侵检测系统设计新方法
Pub Date : 2022-10-07 DOI: 10.1109/GCAT55367.2022.9972047
Sheily Verma
The widespread usage of computer networks has created new dangers, making it essential that security systems be made faster and more precise. In spite of the development of new security solutions, the rapid expansion of malicious activity poses a serious danger to network security. As an initial layer of protection, firewalls and other traditional security solutions are used. The use of firewalls, on the other hand, does not guarantee complete security against invasions. Such intrusion detection systems (IDSs) are highly relied upon by network managers. With machine learning (ML), it is possible to train an intrusion detection system to distinguish between normal and anomalous traffic based on historical data. It's still simpler for cybercriminals to infiltrate networks unnoticed to steal or damage information assets because of the tremendous traffic in current network infrastructures. In a real-time processing situation, classic network intrusion detection systems fail to match expectations in terms of speed and efficiency. These constraints in mind, we set out to develop new methods for designing as well as architecting network intrusion detection systems that make use of deep learning methods. Deep learning methods are the focus of this research. An intrusion detection system that uses the 1DCNN-Bi-GRU architecture as well as a KDD99 dataset will be developed based on these models' strengths in data collecting, preprocessing, extraction and classification. Model performance can be measured against the KDD99 dataset. When compared to current algorithms, the suggested 1DCNN-Bi-GRU algorithm's accuracy was 97 percent raised by roughly 15 percent, according to the testing data.
计算机网络的广泛使用带来了新的危险,使安全系统变得更快、更精确变得至关重要。尽管新的安全解决方案不断发展,但恶意活动的迅速扩张对网络安全构成了严重威胁。防火墙和其他传统安全解决方案被用作初始保护层。另一方面,防火墙的使用并不能保证对入侵的完全安全。这种入侵检测系统是网络管理人员高度依赖的。通过机器学习(ML),可以训练入侵检测系统根据历史数据区分正常和异常流量。由于当前网络基础设施的巨大流量,网络犯罪分子更容易悄无声息地渗透到网络中窃取或破坏信息资产。在实时处理的情况下,传统的网络入侵检测系统在速度和效率上都无法达到预期的效果。考虑到这些限制,我们开始开发新的方法来设计和构建利用深度学习方法的网络入侵检测系统。深度学习方法是本研究的重点。基于这些模型在数据采集、预处理、提取和分类方面的优势,将开发一个使用1DCNN-Bi-GRU架构和KDD99数据集的入侵检测系统。可以根据KDD99数据集测量模型性能。根据测试数据,与目前的算法相比,建议的1DCNN-Bi-GRU算法的准确率提高了97%,提高了大约15%。
{"title":"A Novel Approach for Designing Network Intrusion Detection Systems Based on Hybrid Deep Learning Model CB-GRU","authors":"Sheily Verma","doi":"10.1109/GCAT55367.2022.9972047","DOIUrl":"https://doi.org/10.1109/GCAT55367.2022.9972047","url":null,"abstract":"The widespread usage of computer networks has created new dangers, making it essential that security systems be made faster and more precise. In spite of the development of new security solutions, the rapid expansion of malicious activity poses a serious danger to network security. As an initial layer of protection, firewalls and other traditional security solutions are used. The use of firewalls, on the other hand, does not guarantee complete security against invasions. Such intrusion detection systems (IDSs) are highly relied upon by network managers. With machine learning (ML), it is possible to train an intrusion detection system to distinguish between normal and anomalous traffic based on historical data. It's still simpler for cybercriminals to infiltrate networks unnoticed to steal or damage information assets because of the tremendous traffic in current network infrastructures. In a real-time processing situation, classic network intrusion detection systems fail to match expectations in terms of speed and efficiency. These constraints in mind, we set out to develop new methods for designing as well as architecting network intrusion detection systems that make use of deep learning methods. Deep learning methods are the focus of this research. An intrusion detection system that uses the 1DCNN-Bi-GRU architecture as well as a KDD99 dataset will be developed based on these models' strengths in data collecting, preprocessing, extraction and classification. Model performance can be measured against the KDD99 dataset. When compared to current algorithms, the suggested 1DCNN-Bi-GRU algorithm's accuracy was 97 percent raised by roughly 15 percent, according to the testing data.","PeriodicalId":133597,"journal":{"name":"2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127418355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Processing for Facial Expression using Machine Learning Algorithm 基于机器学习算法的面部表情图像处理
Pub Date : 2022-10-07 DOI: 10.1109/GCAT55367.2022.9972184
H. N. Rakshitha, H. M. Kalpana
Visual detections of face expression have become much difficult job and yields in reduced preciseness against the automated face expression identification making use of image processing for emotion identification and take lesser time and less efforts with increased accurate outcomes. Effective identification and classification of face-based expressions are found to be beneficial in people's behavioral monitoring system. This paper presents detailed texture bound analyzes architecture framework and codebook generation for face expression detection and classification method. The proposed system acquires Local threshold-texture Patterns (LT - TP) from input face images of unique classes. The features from LT - TP were effective and the method was able to acquire discriminant data and indicate every class containing less dimensions in it. Then, unique codebooks are generated for each class of images. Finally, Classification is done by making use of multiclass typed SVM-Support Vector Machines. Experimentations are performed on Matlab on face dataset that contains minimum two unique classes namely normal and happy faces.
面部表情的视觉检测已经成为一项非常困难的工作,并且与使用图像处理进行情绪识别的自动面部表情识别相比,准确性降低了,并且花费的时间和精力更少,结果更准确。基于面部表情的有效识别和分类有助于人们的行为监测系统。本文详细介绍了纹理绑定分析的结构框架和编码本生成方法,用于人脸表情检测和分类。该系统从不同类别的输入人脸图像中获取局部阈值纹理模式(LT - TP)。从LT - TP中提取的特征是有效的,该方法能够获得判别数据,并指出其中包含较少维数的每个类。然后,为每一类图像生成唯一的码本。最后,利用多类支持向量机进行分类。在Matlab上对人脸数据集进行实验,该数据集包含至少两个独特的类别,即正常面孔和快乐面孔。
{"title":"Image Processing for Facial Expression using Machine Learning Algorithm","authors":"H. N. Rakshitha, H. M. Kalpana","doi":"10.1109/GCAT55367.2022.9972184","DOIUrl":"https://doi.org/10.1109/GCAT55367.2022.9972184","url":null,"abstract":"Visual detections of face expression have become much difficult job and yields in reduced preciseness against the automated face expression identification making use of image processing for emotion identification and take lesser time and less efforts with increased accurate outcomes. Effective identification and classification of face-based expressions are found to be beneficial in people's behavioral monitoring system. This paper presents detailed texture bound analyzes architecture framework and codebook generation for face expression detection and classification method. The proposed system acquires Local threshold-texture Patterns (LT - TP) from input face images of unique classes. The features from LT - TP were effective and the method was able to acquire discriminant data and indicate every class containing less dimensions in it. Then, unique codebooks are generated for each class of images. Finally, Classification is done by making use of multiclass typed SVM-Support Vector Machines. Experimentations are performed on Matlab on face dataset that contains minimum two unique classes namely normal and happy faces.","PeriodicalId":133597,"journal":{"name":"2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127538909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Sparse Code Multiple Access Transceiver System for Massive Machine - Type Communication 大规模机型通信稀疏码多址收发系统性能分析
Pub Date : 2022-10-07 DOI: 10.1109/GCAT55367.2022.9971840
S. Shruthi, K. Saraswathi
The Sparse Code Multiple Access (SCMA) is one of the code-domain non-orthogonal multiple access schemes (CD-NOMA) employed in wireless communication systems. The SCMA is a multi-dimensional codebook based spreading procedure where the incoming bits of several users are mapped directly to multi-dimensional code words that are selected from sparse codebooks. The SCMA increases the spectral efficiency by allowing a large number of users to share the time and frequency resources which improves overall system performance. This has gained attention in the field of massive-machine type communication (mMtc) in 5G to satisfy huge demand on massive connectivity and data traffic. In this paper, the design and simulation of the SCMA system for the uplink scenario is carried out for 6 and 8 UEs. The Turbo coder is used for forward error correction and the Log-message passing algorithm (Log-MPA) is used as a detection scheme. The performance analysis of SCMA system is carrier out using block error rate (BLER) for 6 and 8 UEs.
稀疏码多址(SCMA)是一种用于无线通信系统的码域非正交多址(CD-NOMA)方案。SCMA是一种基于多维码本的扩展过程,它将多个用户的输入比特直接映射到从稀疏码本中选择的多维码字上。SCMA通过允许大量用户共享时间和频率资源来提高频谱效率,从而提高系统的整体性能。这在5G的大机器通信(mMtc)领域受到了关注,以满足对海量连接和数据流量的巨大需求。本文对上行场景下的SCMA系统进行了6台和8台终端的设计和仿真。采用Turbo码进行前向纠错,采用日志消息传递算法(Log-message passing algorithm, Log-MPA)作为检测方案。采用分组误码率(BLER)对SCMA系统进行了6和8个ue的性能分析。
{"title":"Performance Analysis of Sparse Code Multiple Access Transceiver System for Massive Machine - Type Communication","authors":"S. Shruthi, K. Saraswathi","doi":"10.1109/GCAT55367.2022.9971840","DOIUrl":"https://doi.org/10.1109/GCAT55367.2022.9971840","url":null,"abstract":"The Sparse Code Multiple Access (SCMA) is one of the code-domain non-orthogonal multiple access schemes (CD-NOMA) employed in wireless communication systems. The SCMA is a multi-dimensional codebook based spreading procedure where the incoming bits of several users are mapped directly to multi-dimensional code words that are selected from sparse codebooks. The SCMA increases the spectral efficiency by allowing a large number of users to share the time and frequency resources which improves overall system performance. This has gained attention in the field of massive-machine type communication (mMtc) in 5G to satisfy huge demand on massive connectivity and data traffic. In this paper, the design and simulation of the SCMA system for the uplink scenario is carried out for 6 and 8 UEs. The Turbo coder is used for forward error correction and the Log-message passing algorithm (Log-MPA) is used as a detection scheme. The performance analysis of SCMA system is carrier out using block error rate (BLER) for 6 and 8 UEs.","PeriodicalId":133597,"journal":{"name":"2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131080710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and implementation of access monitoring system for banks using OpenCV and Django 基于OpenCV和Django的银行访问监控系统的设计与实现
Pub Date : 2022-10-07 DOI: 10.1109/GCAT55367.2022.9972199
R. K. Madhusudhana, G. Kiranmayi
This paper presents a system which configures a web- based access monitoring system for banks. The banking system plays a very significant role in society. There is a need for monitoring the people entering the bank as a part of the procedure for providing security. The traditional monitoring system only records the video, it does not recognize the people entering. This work implements a system for recognizing the people entering the bank using a computer vision technology. With the ongoing development of image processing algorithms, the computer vision discipline of artificial intelligence launching a new era by teaching computers to comprehend and interpret the visual environment. This project proposes an efficient way to keep track of the people entering the banks using face detection. Feature extraction of the images of the employees and the customers is done. The database of the face images of employees of the bank and customers is created and stored in the system. Viola jones algorithm which uses HAAR feature extraction and cascade classifiers is used for the face detection. The face features detected is compared with the existing database and classified as employee, customer and unknown. After the face recognition the information is displayed in a webpage with date and time of entry. This webpage can be very useful in case of Security breach in banks. The face detection algorithm is implemented using OpenCV on a Raspberry pi processor with Linux operating system.
本文介绍了一种基于web的银行门禁监控系统。银行系统在社会中扮演着非常重要的角色。作为提供安全程序的一部分,有必要对进入银行的人员进行监控。传统的监控系统只记录视频,对进入的人员不进行识别。本文利用计算机视觉技术实现了一个识别进入银行的人员的系统。随着图像处理算法的不断发展,人工智能的计算机视觉学科通过教计算机理解和解释视觉环境,开启了一个新的时代。本项目提出了一种利用人脸检测来跟踪进入银行的人员的有效方法。对员工和客户的图像进行特征提取。系统中创建并存储了银行员工和客户的人脸图像数据库。采用HAAR特征提取和级联分类器的Viola jones算法进行人脸检测。将检测到的人脸特征与现有数据库进行比较,并将其分类为员工、客户和未知。人脸识别后,信息显示在网页上,并注明输入日期和时间。此网页在银行出现保安漏洞时非常有用。人脸检测算法是在Linux操作系统的树莓派处理器上使用OpenCV实现的。
{"title":"Design and implementation of access monitoring system for banks using OpenCV and Django","authors":"R. K. Madhusudhana, G. Kiranmayi","doi":"10.1109/GCAT55367.2022.9972199","DOIUrl":"https://doi.org/10.1109/GCAT55367.2022.9972199","url":null,"abstract":"This paper presents a system which configures a web- based access monitoring system for banks. The banking system plays a very significant role in society. There is a need for monitoring the people entering the bank as a part of the procedure for providing security. The traditional monitoring system only records the video, it does not recognize the people entering. This work implements a system for recognizing the people entering the bank using a computer vision technology. With the ongoing development of image processing algorithms, the computer vision discipline of artificial intelligence launching a new era by teaching computers to comprehend and interpret the visual environment. This project proposes an efficient way to keep track of the people entering the banks using face detection. Feature extraction of the images of the employees and the customers is done. The database of the face images of employees of the bank and customers is created and stored in the system. Viola jones algorithm which uses HAAR feature extraction and cascade classifiers is used for the face detection. The face features detected is compared with the existing database and classified as employee, customer and unknown. After the face recognition the information is displayed in a webpage with date and time of entry. This webpage can be very useful in case of Security breach in banks. The face detection algorithm is implemented using OpenCV on a Raspberry pi processor with Linux operating system.","PeriodicalId":133597,"journal":{"name":"2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132073016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation and Performance Analysis of Speed Control Strategy for Induction Motor using a Novel PLL and Discrete Fourier Transform 基于新型锁相环和离散傅里叶变换的异步电机速度控制策略的实现及性能分析
Pub Date : 2022-10-07 DOI: 10.1109/GCAT55367.2022.9971994
Sushil Karvekar, P. Joshi
The paper presents implementation of speed control strategies for Induction motor using field oriented control and adaptive notch filters. The adaptive notch filters used for developing filed oriented control include EPLL and discrete Fourier transform. Co-simulation technique is employed by using Matlab/Simulink and PSIM softwares for implementing the speed control algorithm. The simulation results of these adaptive notch filters demonstrate the computation of torque and flux components in rotating reference frame. The practicability and reliability of these algorithms are validated by changing the reference speed and torque conditions. The simulation results demonstrate the performance of field oriented control algorithm using the discrete Fourier and EPLL for tracking the given reference speed. The results show that the modified control algorithm is efficient in reference tracking with improved computational efficiency.
本文介绍了利用磁场定向控制和自适应陷波滤波器实现感应电机速度控制策略。用于发展面向场控制的自适应陷波滤波器包括EPLL和离散傅里叶变换。采用Matlab/Simulink和PSIM软件联合仿真技术实现速度控制算法。自适应陷波滤波器的仿真结果验证了旋转参照系中转矩和磁通分量的计算。通过改变参考转速和转矩条件,验证了算法的实用性和可靠性。仿真结果表明,采用离散傅里叶和EPLL相结合的磁场定向控制算法对给定参考速度的跟踪效果良好。结果表明,改进后的控制算法具有较好的参考跟踪效果,计算效率有所提高。
{"title":"Implementation and Performance Analysis of Speed Control Strategy for Induction Motor using a Novel PLL and Discrete Fourier Transform","authors":"Sushil Karvekar, P. Joshi","doi":"10.1109/GCAT55367.2022.9971994","DOIUrl":"https://doi.org/10.1109/GCAT55367.2022.9971994","url":null,"abstract":"The paper presents implementation of speed control strategies for Induction motor using field oriented control and adaptive notch filters. The adaptive notch filters used for developing filed oriented control include EPLL and discrete Fourier transform. Co-simulation technique is employed by using Matlab/Simulink and PSIM softwares for implementing the speed control algorithm. The simulation results of these adaptive notch filters demonstrate the computation of torque and flux components in rotating reference frame. The practicability and reliability of these algorithms are validated by changing the reference speed and torque conditions. The simulation results demonstrate the performance of field oriented control algorithm using the discrete Fourier and EPLL for tracking the given reference speed. The results show that the modified control algorithm is efficient in reference tracking with improved computational efficiency.","PeriodicalId":133597,"journal":{"name":"2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131345686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimisation of Source Selection and Design of High Frequency LCL Based Wireless Power Transmission Array 基于高频LCL的无线电力传输阵列源选择优化与设计
Pub Date : 2022-10-07 DOI: 10.1109/GCAT55367.2022.10059266
Harshavardhan Yadav Gangadhara, R. J, A. R
Electric vehicles are exponentially rising in the real world, due to the rise in concern about environmental degradation. Shortly, E-mobility will overtake internal combustion engine mobility. Wireless power transfer (WPT) is a rapidly growing technology, but there is development concerning in development of technology such as high frequency signals, transmission range, size, and efficiency. WPT is a convenient topology for charging Electric Vehicles (EV). A parking lot with fewer charging stations would be inconvenient to charge vehicles. Using WPT there is no need to connect the vehicle to the charging station making it user-friendly and accessible. As the number of vehicles is being connected to the grid to charge there is a great load on the grid. In this paper, the design of a wireless battery charging station with Inductive Wireless Power Transfer (IWPT) topology using renewable energies such as solar energy farm, wind energy farm, and AC grid as sources by choosing the source energy optimally which are subjected to environmental condition for charging EVs in the parking lot with the varying number of vehicles is proposed.
由于人们对环境恶化的担忧日益加剧,电动汽车在现实世界中呈指数级增长。不久,电动汽车将取代内燃机汽车。无线电力传输技术是一项快速发展的技术,但在信号的高频率、传输范围、传输尺寸、传输效率等方面的技术发展都存在一些问题。WPT是一种方便的电动汽车充电拓扑结构。充电站较少的停车场会给车辆充电带来不便。使用WPT无需将车辆连接到充电站,使其用户友好且易于访问。随着越来越多的车辆接入电网充电,电网的负荷也越来越大。本文提出了一种基于感应式无线电力传输(IWPT)拓扑的无线电池充电站的设计方法,该充电站采用太阳能、风能和交流电网等可再生能源作为充电源,通过对环境条件的优化选择,为停车场中不同数量的电动汽车充电。
{"title":"Optimisation of Source Selection and Design of High Frequency LCL Based Wireless Power Transmission Array","authors":"Harshavardhan Yadav Gangadhara, R. J, A. R","doi":"10.1109/GCAT55367.2022.10059266","DOIUrl":"https://doi.org/10.1109/GCAT55367.2022.10059266","url":null,"abstract":"Electric vehicles are exponentially rising in the real world, due to the rise in concern about environmental degradation. Shortly, E-mobility will overtake internal combustion engine mobility. Wireless power transfer (WPT) is a rapidly growing technology, but there is development concerning in development of technology such as high frequency signals, transmission range, size, and efficiency. WPT is a convenient topology for charging Electric Vehicles (EV). A parking lot with fewer charging stations would be inconvenient to charge vehicles. Using WPT there is no need to connect the vehicle to the charging station making it user-friendly and accessible. As the number of vehicles is being connected to the grid to charge there is a great load on the grid. In this paper, the design of a wireless battery charging station with Inductive Wireless Power Transfer (IWPT) topology using renewable energies such as solar energy farm, wind energy farm, and AC grid as sources by choosing the source energy optimally which are subjected to environmental condition for charging EVs in the parking lot with the varying number of vehicles is proposed.","PeriodicalId":133597,"journal":{"name":"2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125389569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Document Clustering Using Keyword Extraction 使用关键字提取的文档聚类
Pub Date : 2022-10-07 DOI: 10.1109/GCAT55367.2022.9972238
R. Ramachandran, Manjusha K Mohan, Subin K Sara
Increase in the number of research documents on a daily basis, we find difficulty in identifying proper documents as per our requirements. This paper discusses an effective method in document clustering using automatic keyword extraction. Keyword is the smallest unit that can convey the meaning of an entire page, it helps a user in deciding whether or not to read or skip an article. In this work, we compare different methods of keyword extraction and choose the best method of keyword extraction based on accuracy and precision. The proposed approach takes extracted keywords as input and constructs a variety of different clusters using Euclidean distance measure to group the document together. As a result, a user can conduct a keyword search and obtain the results within seconds. The use of keyword clusters reduces noise in data and consequently enhances cluster quality.
研究文件的数量每天都在增加,我们发现很难根据我们的要求确定适当的文件。本文讨论了一种有效的基于自动关键字提取的文档聚类方法。关键词是传达整个页面含义的最小单位,它帮助用户决定是否阅读或跳过一篇文章。在本工作中,我们比较了不同的关键字提取方法,并根据准确度和精密度选择了最佳的关键字提取方法。该方法以提取的关键词为输入,利用欧几里得距离度量构造各种不同的聚类,对文档进行分组。因此,用户可以进行关键字搜索,并在几秒钟内获得结果。关键词聚类的使用减少了数据中的噪声,从而提高了聚类的质量。
{"title":"Document Clustering Using Keyword Extraction","authors":"R. Ramachandran, Manjusha K Mohan, Subin K Sara","doi":"10.1109/GCAT55367.2022.9972238","DOIUrl":"https://doi.org/10.1109/GCAT55367.2022.9972238","url":null,"abstract":"Increase in the number of research documents on a daily basis, we find difficulty in identifying proper documents as per our requirements. This paper discusses an effective method in document clustering using automatic keyword extraction. Keyword is the smallest unit that can convey the meaning of an entire page, it helps a user in deciding whether or not to read or skip an article. In this work, we compare different methods of keyword extraction and choose the best method of keyword extraction based on accuracy and precision. The proposed approach takes extracted keywords as input and constructs a variety of different clusters using Euclidean distance measure to group the document together. As a result, a user can conduct a keyword search and obtain the results within seconds. The use of keyword clusters reduces noise in data and consequently enhances cluster quality.","PeriodicalId":133597,"journal":{"name":"2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126258771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Consumer Grievance Handler 消费者投诉处理机构
Pub Date : 2022-10-07 DOI: 10.1109/GCAT55367.2022.9971905
G. Shobana, S. Sanjay, V. Saran, G. K. Vardan
Myriad of consumer complaints has subjected to the difficulty in classifying consumer's grievances. Grievances usually comprises of lengthy texts which takes lots of manpower and time. Complaints can be filed into wrong categories. Difficulty in going through every sole grievance and directing them to relevant departments is to be dealt. To solve these issues, we have an idea of using machine learning algorithms to learn and classify the complaints into their respective categories and perform sentimental analysis on the customer complaints to obtain the priority of each complaint. Python FLASK API is used to enable application interaction. The user should enter the consumer complaint in the application, and the sentimental analysis and categorization of consumer complaints is done and the accuracy of the complaint classified is displayed.
无数的消费者投诉面临着难以对消费者的不满进行分类的问题。申诉通常由冗长的文本组成,需要花费大量的人力和时间。投诉可能会被划入错误的类别。要解决难于处理每一项投诉并将其引向有关部门的问题。为了解决这些问题,我们有一个想法,使用机器学习算法来学习并将投诉分类到各自的类别中,并对客户投诉进行情感分析,以获得每个投诉的优先级。Python FLASK API用于启用应用程序交互。用户在应用程序中输入消费者投诉,对消费者投诉进行情感分析和分类,并显示分类投诉的准确性。
{"title":"Consumer Grievance Handler","authors":"G. Shobana, S. Sanjay, V. Saran, G. K. Vardan","doi":"10.1109/GCAT55367.2022.9971905","DOIUrl":"https://doi.org/10.1109/GCAT55367.2022.9971905","url":null,"abstract":"Myriad of consumer complaints has subjected to the difficulty in classifying consumer's grievances. Grievances usually comprises of lengthy texts which takes lots of manpower and time. Complaints can be filed into wrong categories. Difficulty in going through every sole grievance and directing them to relevant departments is to be dealt. To solve these issues, we have an idea of using machine learning algorithms to learn and classify the complaints into their respective categories and perform sentimental analysis on the customer complaints to obtain the priority of each complaint. Python FLASK API is used to enable application interaction. The user should enter the consumer complaint in the application, and the sentimental analysis and categorization of consumer complaints is done and the accuracy of the complaint classified is displayed.","PeriodicalId":133597,"journal":{"name":"2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122566490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1