首页 > 最新文献

2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)最新文献

英文 中文
Optimal Feedback Loop Algorithm for Automatic Control of Ultrasonic Gas Flowmeter 超声气体流量计自动控制的最优反馈回路算法
Pub Date : 2023-02-02 DOI: 10.1109/ICAIS56108.2023.10073731
Huijie Liu
At present, the signal detection principle of the ultrasonic flowmeter can be roughly divided into propagation velocity difference method, the beam shift method, the Doppler method, correlation method, spatial filtering method and noise method, and hence, the proper selection of the methods will be essential for the success of the modelling. This paper then studies the optimal feedback loop algorithm for the automatic control of ultrasonic gas flowmeter. Firstly, the ultrasonic gas flow measurement principle is introduced, considering that the time difference measurement principle will use the movement time difference of ultrasonic waves in the case of forward flow and reverse flow to measure gas flow. Secondly, realization of the intelligent ultrasonic gas flow measuring system is studied. Here, the Butterworth filters are considered to maintain the useful ultrasonic signal in a proper frequency range by removing high and low frequency noise. Finally, the optimal feedback loop is considered to finalize the model. The proposed experiment will provide the high-speed comparison of signal waveform simulation to show the visualized performance and then, the error comparison analysis in conducted to test the performance under different flow rate.
目前,超声波流量计的信号检测原理大致可分为传播速度差法、波束移法、多普勒法、相关法、空间滤波法和噪声法,因此,正确选择这些方法对建模的成功至关重要。然后研究了超声波气体流量计自动控制的最优反馈回路算法。首先,介绍了超声波气体流量测量原理,考虑到时差测量原理将利用超声波在正向流动和反向流动情况下的运动时差来测量气体流量。其次,研究了智能超声波气体流量测量系统的实现。在这里,巴特沃斯滤波器被认为是通过去除高频和低频噪声来保持有用的超声信号在适当的频率范围内。最后,考虑最优反馈回路,最终确定模型。本实验将提供信号波形仿真的高速对比,以显示可视化的性能,然后进行误差对比分析,以测试不同流量下的性能。
{"title":"Optimal Feedback Loop Algorithm for Automatic Control of Ultrasonic Gas Flowmeter","authors":"Huijie Liu","doi":"10.1109/ICAIS56108.2023.10073731","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073731","url":null,"abstract":"At present, the signal detection principle of the ultrasonic flowmeter can be roughly divided into propagation velocity difference method, the beam shift method, the Doppler method, correlation method, spatial filtering method and noise method, and hence, the proper selection of the methods will be essential for the success of the modelling. This paper then studies the optimal feedback loop algorithm for the automatic control of ultrasonic gas flowmeter. Firstly, the ultrasonic gas flow measurement principle is introduced, considering that the time difference measurement principle will use the movement time difference of ultrasonic waves in the case of forward flow and reverse flow to measure gas flow. Secondly, realization of the intelligent ultrasonic gas flow measuring system is studied. Here, the Butterworth filters are considered to maintain the useful ultrasonic signal in a proper frequency range by removing high and low frequency noise. Finally, the optimal feedback loop is considered to finalize the model. The proposed experiment will provide the high-speed comparison of signal waveform simulation to show the visualized performance and then, the error comparison analysis in conducted to test the performance under different flow rate.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129025874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Two -Wheeler Hybrid Electric Vehicle using Series Parallel Configuration 采用串并联结构的两轮混合动力汽车设计
Pub Date : 2023-02-02 DOI: 10.1109/ICAIS56108.2023.10073870
Sandip Shankar Yeole, Sandeep Vasant Kolhe, R. Bibave, Vijay Shivaji Chavan, Bhushan Bhaurao Kadam, Vaibhav Sakharam Bodhe
In India two wheelers are most common mode of transport to a majority of people because of its’s affordability. Though they are also a major cause of pollution almost 20% of total pollution (which is 10% more than the pollution by cars) and increase in demand and supply gap of oil, which was 6 million barrel per day back in 2020 which is estimated to increase by 14.4 million barrels. All of this can be minimized by simply replacing IC engine vehicles by pure electric or Hybrid electric vehicles for two wheelers. This paper discusses the idea of simulation of HEV two-wheeler using power split to interchange power between the IC engine and motor and provide a balanced output to the
在印度,由于价格实惠,两轮车是大多数人最常用的交通工具。尽管它们也是污染的主要原因,几乎占总污染的20%(比汽车污染多10%),并增加了石油的供需缺口,2020年每天为600万桶,估计将增加1440万桶。所有这些都可以通过简单地用纯电动或混合动力两轮车取代IC发动机车辆来最小化。本文讨论了混合动力两轮车仿真的思想,利用功率分流在内燃机和电动机之间进行功率交换,为混合动力发动机和电动机提供平衡的输出
{"title":"Design of Two -Wheeler Hybrid Electric Vehicle using Series Parallel Configuration","authors":"Sandip Shankar Yeole, Sandeep Vasant Kolhe, R. Bibave, Vijay Shivaji Chavan, Bhushan Bhaurao Kadam, Vaibhav Sakharam Bodhe","doi":"10.1109/ICAIS56108.2023.10073870","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073870","url":null,"abstract":"In India two wheelers are most common mode of transport to a majority of people because of its’s affordability. Though they are also a major cause of pollution almost 20% of total pollution (which is 10% more than the pollution by cars) and increase in demand and supply gap of oil, which was 6 million barrel per day back in 2020 which is estimated to increase by 14.4 million barrels. All of this can be minimized by simply replacing IC engine vehicles by pure electric or Hybrid electric vehicles for two wheelers. This paper discusses the idea of simulation of HEV two-wheeler using power split to interchange power between the IC engine and motor and provide a balanced output to the","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130369875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proving Ownership of Privacy-Protected Cloud Storage Devices 证明受隐私保护的云存储设备的所有权
Pub Date : 2023-02-02 DOI: 10.1109/ICAIS56108.2023.10073830
Sri Teja Chadalawada, Keerthana Mandadi, Jahnavi Machupally, Vippala Indra Sena Reddy, B. T. Reddy, A. V. Praveen Krishna
Systems for cloud storage is growing in popularity. Deduplication, a promising procedure collects only a single replica of recurring data there by reduces cost of cloud storages. Client-side deduplication makes an effort to locate existing deduplication opportunities prior to uploading at the client and avoid using server capacity to upload duplicates of already-existing data. This work, provides mechanism to overcome vulnerabilities and take advantage of client-side deduplication, giving an attacker access to other users' files of any size based on relatively weak hash signatures. More specifically, an attacker who is aware of a file's hash signature can persuade a storage service that it is the rightful owner of the file, at which point the intruder is allowed to acquire the entire file by the server. Proofs-of-ownership (PoWs), that allow a user to effectively prove to a host that the user genuinely owns a file instead of only giving a short summary of it. This work defines the principle of proof-of-ownership under strong security standards and strict efficiency constraints. Then, relying on popular encryption techniques and hash function, this study provides and assess security-related methodologies.
云存储系统越来越受欢迎。重复数据删除是一种很有前途的方法,通过减少云存储的成本,只收集重复数据的单个副本。客户端重复数据删除会在客户端上传之前找到现有的重复数据删除机会,并避免使用服务器容量上传已有数据的副本。这项工作提供了克服漏洞和利用客户端重复数据删除的机制,使攻击者能够基于相对较弱的散列签名访问任何大小的其他用户文件。更具体地说,知道文件散列签名的攻击者可以说服存储服务它是文件的合法所有者,此时入侵者可以通过服务器获取整个文件。所有权证明(pow),允许用户有效地向主机证明用户真正拥有文件,而不仅仅是给出简短的摘要。这项工作定义了在强大的安全标准和严格的效率约束下的所有权证明原则。然后,依靠流行的加密技术和哈希函数,本研究提供并评估了与安全相关的方法。
{"title":"Proving Ownership of Privacy-Protected Cloud Storage Devices","authors":"Sri Teja Chadalawada, Keerthana Mandadi, Jahnavi Machupally, Vippala Indra Sena Reddy, B. T. Reddy, A. V. Praveen Krishna","doi":"10.1109/ICAIS56108.2023.10073830","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073830","url":null,"abstract":"Systems for cloud storage is growing in popularity. Deduplication, a promising procedure collects only a single replica of recurring data there by reduces cost of cloud storages. Client-side deduplication makes an effort to locate existing deduplication opportunities prior to uploading at the client and avoid using server capacity to upload duplicates of already-existing data. This work, provides mechanism to overcome vulnerabilities and take advantage of client-side deduplication, giving an attacker access to other users' files of any size based on relatively weak hash signatures. More specifically, an attacker who is aware of a file's hash signature can persuade a storage service that it is the rightful owner of the file, at which point the intruder is allowed to acquire the entire file by the server. Proofs-of-ownership (PoWs), that allow a user to effectively prove to a host that the user genuinely owns a file instead of only giving a short summary of it. This work defines the principle of proof-of-ownership under strong security standards and strict efficiency constraints. Then, relying on popular encryption techniques and hash function, this study provides and assess security-related methodologies.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127027002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convergence Analysis of Music Technology: From Audio Digital Watermarking to Denoising Algorithm 音乐技术的收敛性分析:从音频数字水印到去噪算法
Pub Date : 2023-02-02 DOI: 10.1109/ICAIS56108.2023.10073797
Liu Zhan
In the recent time, the efficient processing of music (or audio) signal considering the safety and performance has been the research hotspot. This study performs a convergence analysis of music technology from the audio digital watermarking to the denoising algorithm. Traditional music information processing methods are more focused on a single processing perspective, that is, improve the signal quality or signal security guarantee, respectively. The comprehensive tool for the analysis is lacking. Hence, this paper firstly proposes a novel audio digital watermarking algorithm considering the QR decomposition and DWT to construct the efficient scenario. Then, the novel denoising algorithm is studied. The reconstructed signal after hard threshold processing has disadvantages such as the discontinuity, oscillation and distortion. Then, the wavelet analysis model is applied into the algorithm to find the optimal value of threshold. After these 2 major innovations, the whole system is then constructed and implemented with experiment. The experimental data of the stereo modulator calibration method is scientific, and the overall experiment has certain robustness.
在兼顾安全性和性能的前提下对音乐(或音频)信号进行高效处理一直是近年来的研究热点。本文对音乐技术从音频数字水印到去噪算法的收敛性进行了分析。传统的音乐信息处理方法多侧重于单一的处理角度,即分别提高信号质量或保证信号安全。缺乏全面的分析工具。为此,本文首先提出了一种考虑QR分解和DWT的音频数字水印算法来构建高效场景。然后,研究了一种新的去噪算法。硬阈值处理后的重构信号存在不连续、振荡和失真等缺点。然后,将小波分析模型应用到算法中,寻找最优阈值。在完成这两项重大创新后,对整个系统进行了构建和实验实施。立体调制器标定方法的实验数据是科学的,整体实验具有一定的鲁棒性。
{"title":"Convergence Analysis of Music Technology: From Audio Digital Watermarking to Denoising Algorithm","authors":"Liu Zhan","doi":"10.1109/ICAIS56108.2023.10073797","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073797","url":null,"abstract":"In the recent time, the efficient processing of music (or audio) signal considering the safety and performance has been the research hotspot. This study performs a convergence analysis of music technology from the audio digital watermarking to the denoising algorithm. Traditional music information processing methods are more focused on a single processing perspective, that is, improve the signal quality or signal security guarantee, respectively. The comprehensive tool for the analysis is lacking. Hence, this paper firstly proposes a novel audio digital watermarking algorithm considering the QR decomposition and DWT to construct the efficient scenario. Then, the novel denoising algorithm is studied. The reconstructed signal after hard threshold processing has disadvantages such as the discontinuity, oscillation and distortion. Then, the wavelet analysis model is applied into the algorithm to find the optimal value of threshold. After these 2 major innovations, the whole system is then constructed and implemented with experiment. The experimental data of the stereo modulator calibration method is scientific, and the overall experiment has certain robustness.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127032002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of DDoS Attacks using Artificial Gorilla Troops Optimizer based Deep Learning Model 基于深度学习模型的人工大猩猩部队优化器DDoS攻击检测
Pub Date : 2023-02-02 DOI: 10.1109/ICAIS56108.2023.10073935
S. Govindaraju, Rajrupa Metia, P. Girija, K. Baranitharan, M. Indirani, M. R.
The importance of security has skyrocketed alongside the adoption of Internet of Things (IoT) services. Software-defined networking (S DN) provides a means of securely managing IoT devices, which were exposed in a current distributed denial-of-service (DDoS) attack. Many IoT devices unwittingly contributed to the DDoS attack. DDoS attacks, one of the most common types of cyberattack, are particularly pernicious since they can cripple a network’s ability to function and render many of its services inaccessible to users. This research used optimised deep learning-based models to detect DDoS in SDN. At first, the dataset’s normal and DDoS attack traffic characteristics were gathered from the SDN. The models are recommended to be simpler, easier to read, and to have a shorter training period when using an NSL-KDD dataset for feature selection approaches. Real-time DDoS attack detection in SDN is proposed in this research using an Long Short-Term Memory (LS TM) models. High accuracy in classification is achieved by utilising an artificial gorilla troop optimizer to pick the features of NSL-KDD. Using less time and material, the proposed IDS was able to achieve a detection accuracy of 97.59%. These findings provide encouraging evidence that DDoS attack detection in SDN could benefit from the use of deep learning and feature selection techniques, which could significantly reduce processing loads and runtimes.
随着物联网(IoT)服务的采用,安全的重要性急剧上升。软件定义网络(sdn)提供了一种安全管理物联网设备的方法,这些设备暴露在当前的分布式拒绝服务(DDoS)攻击中。许多物联网设备在不知不觉中促成了DDoS攻击。DDoS攻击是最常见的网络攻击类型之一,尤其有害,因为它们可以削弱网络的功能,并使用户无法访问其许多服务。本研究使用优化的基于深度学习的模型来检测SDN中的DDoS。首先,从SDN采集数据集的正常和DDoS攻击流量特征。在使用NSL-KDD数据集进行特征选择方法时,建议模型更简单,更易于阅读,并且具有更短的训练周期。本研究提出了一种基于长短期记忆(LS TM)模型的SDN实时DDoS攻击检测方法。利用人工大猩猩群体优化器来选择NSL-KDD的特征,实现了较高的分类精度。使用较少的时间和材料,所提出的IDS能够达到97.59%的检测精度。这些发现提供了令人鼓舞的证据,表明SDN中的DDoS攻击检测可以从使用深度学习和特征选择技术中受益,这可以显着减少处理负载和运行时间。
{"title":"Detection of DDoS Attacks using Artificial Gorilla Troops Optimizer based Deep Learning Model","authors":"S. Govindaraju, Rajrupa Metia, P. Girija, K. Baranitharan, M. Indirani, M. R.","doi":"10.1109/ICAIS56108.2023.10073935","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073935","url":null,"abstract":"The importance of security has skyrocketed alongside the adoption of Internet of Things (IoT) services. Software-defined networking (S DN) provides a means of securely managing IoT devices, which were exposed in a current distributed denial-of-service (DDoS) attack. Many IoT devices unwittingly contributed to the DDoS attack. DDoS attacks, one of the most common types of cyberattack, are particularly pernicious since they can cripple a network’s ability to function and render many of its services inaccessible to users. This research used optimised deep learning-based models to detect DDoS in SDN. At first, the dataset’s normal and DDoS attack traffic characteristics were gathered from the SDN. The models are recommended to be simpler, easier to read, and to have a shorter training period when using an NSL-KDD dataset for feature selection approaches. Real-time DDoS attack detection in SDN is proposed in this research using an Long Short-Term Memory (LS TM) models. High accuracy in classification is achieved by utilising an artificial gorilla troop optimizer to pick the features of NSL-KDD. Using less time and material, the proposed IDS was able to achieve a detection accuracy of 97.59%. These findings provide encouraging evidence that DDoS attack detection in SDN could benefit from the use of deep learning and feature selection techniques, which could significantly reduce processing loads and runtimes.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121294514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Combined Architecture of Image Processing Techniques and Deep Neural Network for the Classification of Corn Plant Diseases 图像处理技术与深度神经网络相结合的玉米病害分类体系结构
Pub Date : 2023-02-02 DOI: 10.1109/ICAIS56108.2023.10073762
Rahul Kumar Vh, Thamizhamuthu R
Agriculture is the economic backbone of a number of countries. The agriculture sector considerably contributes to the overall GDP of a growing nation like India. Corn (Zea Mays) is one of the principal crops farmed in the nation. It is a significant food source and a critical raw element for several businesses. Plant diseases are a severe setback that all farmers endure. These illnesses lead to a drop in yield, a serious concern since the gap between demand and supply keeps rising. This research describes an architecture that utilizes Image Processing Techniques and Deep Learning. The suggested architecture employs the Non-Local Means method for noise reduction, Unsupervised Wiener filter, and Entropy to accomplish picture pre-processing. It uses Otsu’s Morphology and Canny Edge detection Method for picture segmentation. A histogram of Oriented Gradients is utilized for feature extraction, and Deep Convolutional Neural Network categorizes the illness.
农业是许多国家的经济支柱。农业部门对印度这样一个发展中国家的总体GDP做出了相当大的贡献。玉米(Zea Mays)是美国种植的主要作物之一。它是一种重要的食物来源,也是许多企业的关键原料。植物病害是所有农民都要忍受的严重挫折。这些疾病导致产量下降,这是一个严重的问题,因为供需之间的差距不断扩大。本研究描述了一种利用图像处理技术和深度学习的架构。该架构采用非局部均值方法进行降噪,无监督维纳滤波和熵来完成图像预处理。它使用Otsu的形态学和Canny边缘检测方法进行图像分割。利用定向梯度直方图进行特征提取,并利用深度卷积神经网络对疾病进行分类。
{"title":"A Combined Architecture of Image Processing Techniques and Deep Neural Network for the Classification of Corn Plant Diseases","authors":"Rahul Kumar Vh, Thamizhamuthu R","doi":"10.1109/ICAIS56108.2023.10073762","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073762","url":null,"abstract":"Agriculture is the economic backbone of a number of countries. The agriculture sector considerably contributes to the overall GDP of a growing nation like India. Corn (Zea Mays) is one of the principal crops farmed in the nation. It is a significant food source and a critical raw element for several businesses. Plant diseases are a severe setback that all farmers endure. These illnesses lead to a drop in yield, a serious concern since the gap between demand and supply keeps rising. This research describes an architecture that utilizes Image Processing Techniques and Deep Learning. The suggested architecture employs the Non-Local Means method for noise reduction, Unsupervised Wiener filter, and Entropy to accomplish picture pre-processing. It uses Otsu’s Morphology and Canny Edge detection Method for picture segmentation. A histogram of Oriented Gradients is utilized for feature extraction, and Deep Convolutional Neural Network categorizes the illness.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116273822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Prototype for PV based Water Pumping Solutions 基于光伏的高效抽水解决方案原型
Pub Date : 2023-02-02 DOI: 10.1109/ICAIS56108.2023.10073705
Kalaiarasi N, Akshaya Ravichandran, Swathipurna Sahoo
This paper discusses the Cuk and Zeta converter-fed BLDC motors based on power factor correction. The comparative study is based on parameters like torque, stator current, power factor, and rotor speed of both converter-fed BLDC drives. The DC link voltage of the Voltage Source Inverter (VSI) is maintained constant in traditional PFC converter designs. This PFC converter’s primary drawback was complicated control, which necessitates a significant number of sensors. The proposed DC-DC converter follows the voltage follower approach in continuous conduction mode (CCM) to improve the power factor. Also, it helps to reduce switching losses and the stress on power devices. Low-frequency switching is utilized in the VSI to control the speed of the motor by changing the dc bus voltage. The switching loss of VSI is reduced by adopting fundamental frequency switching. This improves the efficiency of the system. Electronic commutation of the BLDC motor helps to eliminate the sensors required for the measurement of DC link voltage and phase currents. The proposed system with proportional-integral (PI) control provides a profitable solution for low-power applications. The performance of converters fed by BLDC motors is studied using MATLAB simulation. The results from Simulink show that the Cuk converter’s performance is better than the Zeta converter. So, the prototype hardware of the suggested model, i.e., the Cuk converter-fed BLDC motor, is implemented.
本文讨论了基于功率因数校正的Cuk和Zeta变频无刷直流电机。对比研究基于转矩、定子电流、功率因数和转子转速等参数。在传统的PFC变换器设计中,电压源逆变器(VSI)的直流链路电压保持恒定。这种PFC转换器的主要缺点是控制复杂,需要大量的传感器。该DC-DC变换器采用连续导通(CCM)模式下的电压跟随器方法,以提高功率因数。此外,它还有助于减少开关损耗和对功率器件的压力。变频器采用低频开关,通过改变直流母线电压来控制电机的转速。采用基频开关降低了VSI的开关损耗。这提高了系统的效率。无刷直流电机的电子换向有助于消除测量直流链路电压和相电流所需的传感器。该系统采用比例积分(PI)控制,为低功耗应用提供了有利的解决方案。利用MATLAB仿真研究了无刷直流电机驱动变换器的性能。仿真结果表明,Cuk变换器的性能优于Zeta变换器。因此,实现了所建议模型的原型硬件,即Cuk变换器馈电无刷直流电机。
{"title":"An Efficient Prototype for PV based Water Pumping Solutions","authors":"Kalaiarasi N, Akshaya Ravichandran, Swathipurna Sahoo","doi":"10.1109/ICAIS56108.2023.10073705","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073705","url":null,"abstract":"This paper discusses the Cuk and Zeta converter-fed BLDC motors based on power factor correction. The comparative study is based on parameters like torque, stator current, power factor, and rotor speed of both converter-fed BLDC drives. The DC link voltage of the Voltage Source Inverter (VSI) is maintained constant in traditional PFC converter designs. This PFC converter’s primary drawback was complicated control, which necessitates a significant number of sensors. The proposed DC-DC converter follows the voltage follower approach in continuous conduction mode (CCM) to improve the power factor. Also, it helps to reduce switching losses and the stress on power devices. Low-frequency switching is utilized in the VSI to control the speed of the motor by changing the dc bus voltage. The switching loss of VSI is reduced by adopting fundamental frequency switching. This improves the efficiency of the system. Electronic commutation of the BLDC motor helps to eliminate the sensors required for the measurement of DC link voltage and phase currents. The proposed system with proportional-integral (PI) control provides a profitable solution for low-power applications. The performance of converters fed by BLDC motors is studied using MATLAB simulation. The results from Simulink show that the Cuk converter’s performance is better than the Zeta converter. So, the prototype hardware of the suggested model, i.e., the Cuk converter-fed BLDC motor, is implemented.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121509963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systematic Review on on-Air Hand Doodle System for the Purpose of Authentication 以认证为目的的无线手写涂鸦系统综述
Pub Date : 2023-02-02 DOI: 10.1109/ICAIS56108.2023.10073858
Sathya D, Chaithra V, Srividya Adiga, Srujana G, P. M
Air-drawing for authentication or gesture recognition is vastly studied such that new methods for the character drawn can be identified with better accuracy and be independent of any hardware components such as gloves to detect the fingertip movement or any wearable sensor or using any external pen. This article surveys how air-writing is done. Some of them include using fingertips as a pen and having the trained CNN model against it using the techniques DNST and Bi-LSTM for the regression and hand gesture identification and classification. This system had an overall accuracy of 88 percentage. Another system solves the air-writing issue by using deep learning architecture, by executing it on 3D space where the next evolution is numerical digits structured into multiple dimensions time-series extracted from a sensor called LMC. In another system, wi-write recognizes hand writing mainly to overcome blurred vision and neurological diseases in people, this will use COTS WiFi but is a device-free handwriting recognition system. In many other systems deep learning models are used and those parameters can be used to achieve higher recognition rate for example 98 percentage above.
用于身份验证或手势识别的空气绘图得到了广泛的研究,因此绘制字符的新方法可以更准确地识别,并且独立于任何硬件组件,例如检测指尖运动的手套或任何可穿戴传感器或使用任何外部笔。这篇文章调查了空中书写是如何完成的。其中一些方法包括使用指尖作为笔,并使用DNST和Bi-LSTM技术对训练好的CNN模型进行回归和手势识别和分类。该系统的总体准确率为88%。另一个系统通过使用深度学习架构来解决空中书写问题,通过在3D空间上执行它,下一个进化是从LMC传感器提取的多维时间序列中提取的数字结构。在另一个系统中,wi-write识别手写主要是为了克服人们的视力模糊和神经系统疾病,这将使用COTS WiFi,但这是一个无设备的手写识别系统。在许多其他系统中使用深度学习模型,这些参数可以用来实现更高的识别率,例如98%以上。
{"title":"Systematic Review on on-Air Hand Doodle System for the Purpose of Authentication","authors":"Sathya D, Chaithra V, Srividya Adiga, Srujana G, P. M","doi":"10.1109/ICAIS56108.2023.10073858","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073858","url":null,"abstract":"Air-drawing for authentication or gesture recognition is vastly studied such that new methods for the character drawn can be identified with better accuracy and be independent of any hardware components such as gloves to detect the fingertip movement or any wearable sensor or using any external pen. This article surveys how air-writing is done. Some of them include using fingertips as a pen and having the trained CNN model against it using the techniques DNST and Bi-LSTM for the regression and hand gesture identification and classification. This system had an overall accuracy of 88 percentage. Another system solves the air-writing issue by using deep learning architecture, by executing it on 3D space where the next evolution is numerical digits structured into multiple dimensions time-series extracted from a sensor called LMC. In another system, wi-write recognizes hand writing mainly to overcome blurred vision and neurological diseases in people, this will use COTS WiFi but is a device-free handwriting recognition system. In many other systems deep learning models are used and those parameters can be used to achieve higher recognition rate for example 98 percentage above.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121568755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANN Based Static Var Compensator For Improved Power System Security 基于神经网络的静态无功补偿提高电力系统安全性
Pub Date : 2023-02-02 DOI: 10.1109/ICAIS56108.2023.10073700
Rushali L. Kapse, V. Chandrakar
The main aim of this article is to determine the effective control signal for the function of damping oscillation by using Multilayer Feed Forward Network(MLFN) based SVC. MLFN based SVC is designed to achieve reduce settling time of response of different parameters during large and sudden disturbance in multimachine power system. The comparative analysis of proposed ANN based SVC with PI based SVC using MATLAB environment for testing and validation.
本文的主要目的是利用基于SVC的多层前馈网络(MLFN)确定阻尼振荡函数的有效控制信号。为了缩短多机电力系统在大、突发扰动下不同参数响应的稳定时间,设计了基于MLFN的SVC算法。利用MATLAB环境对所提出的基于神经网络的SVC与基于PI的SVC进行了对比分析,并进行了测试和验证。
{"title":"ANN Based Static Var Compensator For Improved Power System Security","authors":"Rushali L. Kapse, V. Chandrakar","doi":"10.1109/ICAIS56108.2023.10073700","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073700","url":null,"abstract":"The main aim of this article is to determine the effective control signal for the function of damping oscillation by using Multilayer Feed Forward Network(MLFN) based SVC. MLFN based SVC is designed to achieve reduce settling time of response of different parameters during large and sudden disturbance in multimachine power system. The comparative analysis of proposed ANN based SVC with PI based SVC using MATLAB environment for testing and validation.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"58 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113986759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and Simulation of Selfish Mining Attacks in Blockchain Network using Evolutionary Game Theory 基于进化博弈论的区块链网络自私挖矿攻击建模与仿真
Pub Date : 2023-02-02 DOI: 10.1109/ICAIS56108.2023.10073670
K. R, K. Pitchai
This paper presents a method of attacking proof of work consensus based on selfish mining. The current mitigation strategies for the blockchain network's egotistical mining are not self-sufficient after a certain number of generations. Additionally, these solutions do not address the network nodes' cooperative and defector behavior. Additionally, more blocks from self-centered nodes are added to the blockchain in this development. This study analyzes to what extent these risks may affect cryptocurrency extraction. Minority mining pools keep some blocks private by deviating from the original mining protocol. An attacking collection aims to increase revenue by wasting other miners' computing power. By adopting a novel approach in this study. To determine whether such attacks are profitable. Using the interaction between pools in this model, mining strategies can be derived using game theory. By analyzing the relative revenue rather than the monetary award, this model simulates the game for a Bitcoin blockchain. This illustrates the usefulness of considering the cost of a strategy when discussing the potential outcomes of selfish mining strategies. The author highlights scenarios where the system might be compromised based on the way the parameters are set up in the game.
提出了一种基于自私挖掘的工作量证明共识攻击方法。目前针对区块链网络自我挖矿的缓解策略,在经过一定的代数后,是不能自给自足的。此外,这些解决方案没有解决网络节点的合作和背叛行为。此外,在此开发过程中,更多来自自我中心节点的区块被添加到区块链中。本研究分析了这些风险对加密货币提取的影响程度。少数矿池通过偏离原始的采矿协议来保持一些区块的私有性。攻击集合旨在通过浪费其他矿工的计算能力来增加收入。本研究采用一种新颖的方法。以确定此类攻击是否有利可图。利用该模型中矿池之间的相互作用,利用博弈论推导出挖矿策略。通过分析相对收入而不是货币奖励,该模型模拟了比特币区块链的游戏。这说明了在讨论自私挖掘策略的潜在结果时考虑策略成本的有用性。作者强调了基于游戏中设置参数的方式,系统可能被破坏的场景。
{"title":"Modeling and Simulation of Selfish Mining Attacks in Blockchain Network using Evolutionary Game Theory","authors":"K. R, K. Pitchai","doi":"10.1109/ICAIS56108.2023.10073670","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073670","url":null,"abstract":"This paper presents a method of attacking proof of work consensus based on selfish mining. The current mitigation strategies for the blockchain network's egotistical mining are not self-sufficient after a certain number of generations. Additionally, these solutions do not address the network nodes' cooperative and defector behavior. Additionally, more blocks from self-centered nodes are added to the blockchain in this development. This study analyzes to what extent these risks may affect cryptocurrency extraction. Minority mining pools keep some blocks private by deviating from the original mining protocol. An attacking collection aims to increase revenue by wasting other miners' computing power. By adopting a novel approach in this study. To determine whether such attacks are profitable. Using the interaction between pools in this model, mining strategies can be derived using game theory. By analyzing the relative revenue rather than the monetary award, this model simulates the game for a Bitcoin blockchain. This illustrates the usefulness of considering the cost of a strategy when discussing the potential outcomes of selfish mining strategies. The author highlights scenarios where the system might be compromised based on the way the parameters are set up in the game.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115943882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1