N. Gunantara, I. Widyantara, I. P. Ardana, K. O. Saputra, I. N. Bernadus
The bandwidth available on the network must be managed. In this paper, hierarchical tocken bucket (HTB) and class based queuing (CBQ) methods are used to manage bandwidth. As well as measuring customer satisfaction in the form of a customer satisfaction index (CSI). Quality of service (QoS) performance that is reviewed is throughput, delay, packet loss, and jitter. Based on the results of measurement analysis for the four QoS performance, internet network performance using HTB method shows better performance than CBQ performance. And the level of customer satisfaction with internet services using the HTB method is higher than the CBQ method
需要对网络的可用带宽进行管理。本文采用分层令牌桶(HTB)和基于类的队列(CBQ)方法进行带宽管理。以及以客户满意度指数(CSI)的形式衡量客户满意度。评价的QoS (Quality of service)性能包括吞吐量、延迟、丢包和抖动。基于对四种QoS性能的测量分析结果,采用HTB方法的互联网网络性能优于CBQ方法。使用HTB方法的客户对互联网服务的满意度高于CBQ方法
{"title":"Improving Internet Network Performance through Bandwidth Management","authors":"N. Gunantara, I. Widyantara, I. P. Ardana, K. O. Saputra, I. N. Bernadus","doi":"10.46338/ijetae1222_07","DOIUrl":"https://doi.org/10.46338/ijetae1222_07","url":null,"abstract":"The bandwidth available on the network must be managed. In this paper, hierarchical tocken bucket (HTB) and class based queuing (CBQ) methods are used to manage bandwidth. As well as measuring customer satisfaction in the form of a customer satisfaction index (CSI). Quality of service (QoS) performance that is reviewed is throughput, delay, packet loss, and jitter. Based on the results of measurement analysis for the four QoS performance, internet network performance using HTB method shows better performance than CBQ performance. And the level of customer satisfaction with internet services using the HTB method is higher than the CBQ method","PeriodicalId":169403,"journal":{"name":"International Journal of Emerging Technology and Advanced Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114510650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Khudov, O. Baranik, O. Kovalenko, Yevhen Yakovenko, Y. Chahan
The article proposes on the information technology for determining vehicle route based on ant colony algorithms. The analysis of specialized software and information technologies for determining vehicle route was carried out. Existing information technologies for determining the route of vehicles are not able to find an accurate solution or require an unreasonably long time to find effective solutions. The relevance of the article is due to the great complexity and dimension of routing problems, as well as the emergence of its new verifications. In this regard, there is a need to develop new information technologies for solving problems of this class. The proposed information technology is based on ant colony algorithms. This information technology allows to reduce the time of searching for solutions in problems of large dimensions, and at the same time improve the quality of the solutions obtained. Information technology for determining the route of the vehicle will be considered in the form of a set of functions. This set of functions are related to each other in a certain way. This set of functions implement techniques, methods and methods that ensure the receipt, storage, processing, transmission and use of information regarding the route of the vehicle. In the paper, we will use the IDEF0. This is required for visualization and further formal representation of the structure and composition of the information technology for determining the route of the vehicle. We will present the Determining Route Information Technology in its entirety: the tuple and the sets. The top-level context diagram and. the upper child diagram top-level context diagram are presented. When determining the route of the vehicle, we will use ant algorithms. The main modifications of the classic ant colony algorithm are presented: Max-Min Ant System, Elitist Ant System, Q-ant system, Rank ant system, Ant Colony System, Fast Ant System, Antabu
{"title":"The Information Technology for Determining Vehicle Route Based on Ant Colony Algorithms","authors":"H. Khudov, O. Baranik, O. Kovalenko, Yevhen Yakovenko, Y. Chahan","doi":"10.46338/ijetae1222_13","DOIUrl":"https://doi.org/10.46338/ijetae1222_13","url":null,"abstract":"The article proposes on the information technology for determining vehicle route based on ant colony algorithms. The analysis of specialized software and information technologies for determining vehicle route was carried out. Existing information technologies for determining the route of vehicles are not able to find an accurate solution or require an unreasonably long time to find effective solutions. The relevance of the article is due to the great complexity and dimension of routing problems, as well as the emergence of its new verifications. In this regard, there is a need to develop new information technologies for solving problems of this class. The proposed information technology is based on ant colony algorithms. This information technology allows to reduce the time of searching for solutions in problems of large dimensions, and at the same time improve the quality of the solutions obtained. Information technology for determining the route of the vehicle will be considered in the form of a set of functions. This set of functions are related to each other in a certain way. This set of functions implement techniques, methods and methods that ensure the receipt, storage, processing, transmission and use of information regarding the route of the vehicle. In the paper, we will use the IDEF0. This is required for visualization and further formal representation of the structure and composition of the information technology for determining the route of the vehicle. We will present the Determining Route Information Technology in its entirety: the tuple and the sets. The top-level context diagram and. the upper child diagram top-level context diagram are presented. When determining the route of the vehicle, we will use ant algorithms. The main modifications of the classic ant colony algorithm are presented: Max-Min Ant System, Elitist Ant System, Q-ant system, Rank ant system, Ant Colony System, Fast Ant System, Antabu","PeriodicalId":169403,"journal":{"name":"International Journal of Emerging Technology and Advanced Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116570056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The demand for high-efficiency DC-DC converters is growing rapidly, especially for use in batteryoperated. To increase the supply DC input from power sources such as batteries, solar panels, and output from rectifiers, DC supplies, or DC generators, boost converters are used. This research designed a 24 VDC to 400 VDC voltage booster, tested using a 220 Vac amplification inverter system with an output of 220 Vac. The EGS-002 inverter used in this research was equipped with a Sinusoidal Pulse Width Modulation (SPWM) driver, a method that produces an output signal in the form of a pure sinusoidal wave. The test was carried out by connecting the inverter circuit directly with a voltage booster circuit in the form of a 400VAC step-up transformer to produce 24 VDC input and 50-400VDC output voltages. The length, width and height of the voltage booster are 55 cm x 35 cm x 15 cm, equipped with a cooling fan consisting of a 24V battery charger, and 4 VDC output terminals.
{"title":"The Design of 24V DC to 400V DC Converter with Pure Sine Wave Inverter","authors":"Fitri Puspasari, S. ., Ahmad Ashari","doi":"10.46338/ijetae1222_16","DOIUrl":"https://doi.org/10.46338/ijetae1222_16","url":null,"abstract":"The demand for high-efficiency DC-DC converters is growing rapidly, especially for use in batteryoperated. To increase the supply DC input from power sources such as batteries, solar panels, and output from rectifiers, DC supplies, or DC generators, boost converters are used. This research designed a 24 VDC to 400 VDC voltage booster, tested using a 220 Vac amplification inverter system with an output of 220 Vac. The EGS-002 inverter used in this research was equipped with a Sinusoidal Pulse Width Modulation (SPWM) driver, a method that produces an output signal in the form of a pure sinusoidal wave. The test was carried out by connecting the inverter circuit directly with a voltage booster circuit in the form of a 400VAC step-up transformer to produce 24 VDC input and 50-400VDC output voltages. The length, width and height of the voltage booster are 55 cm x 35 cm x 15 cm, equipped with a cooling fan consisting of a 24V battery charger, and 4 VDC output terminals.","PeriodicalId":169403,"journal":{"name":"International Journal of Emerging Technology and Advanced Engineering","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132527993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Widodo, S. Handoyo, G. Irianto, N. W. Hidajati, Dewi Sri Susanti, I. Purwanto
—Fraud detection is the first step to preventing fraud committed by both individuals and organizations. The development of a high-performance classification model to detect fraud is an interesting topic in machine learning modeling. A finding of the best Bayesian and Naive Bayes classification models is a crucial issue because both models are simple and easily applied models in the fields of life and social sciences. This study aims to obtain the best performance of classification models developed based on probability concepts, namely Bayesian and Naive Bayes models. Adding a threshold value to the decision-making criteria of the two models is an effort expected to can find models that perform superiorly. Data on the auditing of fraudulent firms containing of 775 firms from various business sectors in Australia is used as a case study. The testing data consisting of 100 instances were taken by cluster random sampling with a proportion of 61 non-fraudulent and 39 fraudulent firms and the remaining instances as the training data. The best Bayesian model has an average accuracy of 84% obtained at a threshold value of 0.22. While the best Naive Bayes model has an average accuracy of 94% which is obtained in the 15 threshold values. Adding the threshold value has a significant impact on the performance of the Bayesian model, which can increase the average accuracy from 36% to 84%. On the other hand, the average accuracy of the Naive Bayes model only increased by 1%, from 93% to 94%. Performance measures Sensitivity, Specificity, F1 score, and ROC curve of the Naive Bayes model are also superior to the Bayesian model.
{"title":"Finding the Best Performance of Bayesian and Naïve Bayes Models in Fraudulent Firms Classification through Varying Threshold","authors":"A. Widodo, S. Handoyo, G. Irianto, N. W. Hidajati, Dewi Sri Susanti, I. Purwanto","doi":"10.46338/ijetae1222_11","DOIUrl":"https://doi.org/10.46338/ijetae1222_11","url":null,"abstract":"—Fraud detection is the first step to preventing fraud committed by both individuals and organizations. The development of a high-performance classification model to detect fraud is an interesting topic in machine learning modeling. A finding of the best Bayesian and Naive Bayes classification models is a crucial issue because both models are simple and easily applied models in the fields of life and social sciences. This study aims to obtain the best performance of classification models developed based on probability concepts, namely Bayesian and Naive Bayes models. Adding a threshold value to the decision-making criteria of the two models is an effort expected to can find models that perform superiorly. Data on the auditing of fraudulent firms containing of 775 firms from various business sectors in Australia is used as a case study. The testing data consisting of 100 instances were taken by cluster random sampling with a proportion of 61 non-fraudulent and 39 fraudulent firms and the remaining instances as the training data. The best Bayesian model has an average accuracy of 84% obtained at a threshold value of 0.22. While the best Naive Bayes model has an average accuracy of 94% which is obtained in the 15 threshold values. Adding the threshold value has a significant impact on the performance of the Bayesian model, which can increase the average accuracy from 36% to 84%. On the other hand, the average accuracy of the Naive Bayes model only increased by 1%, from 93% to 94%. Performance measures Sensitivity, Specificity, F1 score, and ROC curve of the Naive Bayes model are also superior to the Bayesian model.","PeriodicalId":169403,"journal":{"name":"International Journal of Emerging Technology and Advanced Engineering","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129159380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this research, we developed an Autonomous UVC robot disinfection system suitable for a healthcare setting. The effectiveness of cleaning with UVC light inspired the design of the robot. The experiment was designed to determine how long, how far, and how much energy would be required to prevent the germs from replicating and kill them as rapidly as possible. The UVC robot is lightweight and simple to move about. The ultraviolet-candelabra (UVC) lamp was used in its construction. UVC light kills bacteria and viruses by interfering with the way their DNA bases couple together. Our experiment involved shutting the UVC robot in a room and observing its behavior. The UVC robot is equipped with four 30W lights that can illuminate an entire room. Within 30 seconds after commencement, samples were placed 60 centimeters from the lights and left there for a time from 0 to 6 minutes. Killing 92% of the germs in 6 minutes is a strong indicator that the suggested approach works effectively. The low initial cost and relatively straightforward nature of the design suggest that it might eventually achieve its full potential.
{"title":"The Development and Validation of an Autonomous UVC (Ultraviolet - C) Disinfection Robot System","authors":"Ahmed El Hanbali, Amjed Al Fahoum","doi":"10.46338/ijetae1222_14","DOIUrl":"https://doi.org/10.46338/ijetae1222_14","url":null,"abstract":"In this research, we developed an Autonomous UVC robot disinfection system suitable for a healthcare setting. The effectiveness of cleaning with UVC light inspired the design of the robot. The experiment was designed to determine how long, how far, and how much energy would be required to prevent the germs from replicating and kill them as rapidly as possible. The UVC robot is lightweight and simple to move about. The ultraviolet-candelabra (UVC) lamp was used in its construction. UVC light kills bacteria and viruses by interfering with the way their DNA bases couple together. Our experiment involved shutting the UVC robot in a room and observing its behavior. The UVC robot is equipped with four 30W lights that can illuminate an entire room. Within 30 seconds after commencement, samples were placed 60 centimeters from the lights and left there for a time from 0 to 6 minutes. Killing 92% of the germs in 6 minutes is a strong indicator that the suggested approach works effectively. The low initial cost and relatively straightforward nature of the design suggest that it might eventually achieve its full potential.","PeriodicalId":169403,"journal":{"name":"International Journal of Emerging Technology and Advanced Engineering","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126585735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Yap, Emmanuel C. Del Rosario, Raymund Miguel Francisco Munchua
Convolutional Neural Networks (CNN) is a popular tool used for image recognition. In CNN architecture, a set of weights undergo a series of updating while the training process for image recognition is ongoing. These weight values can be quite a lot in memory consumption. One way to reduce memory consumption is to use a form of weight compression through weight sharing. To do this, one can quantize the weights using K-Means clustering. To use the K means Clustering algorithm, one can manually try different values of K and then choose the best value that can save the CNN memory usage and at the same time will not deteriorate the recognition ability of the CNN. The method of trying different values of K to search for the best compression rate, can be time consuming for the user. In this paper, using XILINX Virtex FPGA library, a proposed hardware model design for a CNN integrated to a resizable Kmeans Clustering Model is presented. The hardware model design highlights the elimination of the manual search for best value of K. A synthesizable hardware model for the control and data path of the integration is proposed. A Hardware Model algorithm for an automated search for the best value of K in steps of 10, is presented. The proposed integration will allow the system to work by itself, to auto search for the best compression ratio after the CNN has finished training.
{"title":"An FPGA Library Based Design of Variable CNN Weight Compression using Resizable K-Means Clustering","authors":"R. Yap, Emmanuel C. Del Rosario, Raymund Miguel Francisco Munchua","doi":"10.46338/ijetae1222_10","DOIUrl":"https://doi.org/10.46338/ijetae1222_10","url":null,"abstract":"Convolutional Neural Networks (CNN) is a popular tool used for image recognition. In CNN architecture, a set of weights undergo a series of updating while the training process for image recognition is ongoing. These weight values can be quite a lot in memory consumption. One way to reduce memory consumption is to use a form of weight compression through weight sharing. To do this, one can quantize the weights using K-Means clustering. To use the K means Clustering algorithm, one can manually try different values of K and then choose the best value that can save the CNN memory usage and at the same time will not deteriorate the recognition ability of the CNN. The method of trying different values of K to search for the best compression rate, can be time consuming for the user. In this paper, using XILINX Virtex FPGA library, a proposed hardware model design for a CNN integrated to a resizable Kmeans Clustering Model is presented. The hardware model design highlights the elimination of the manual search for best value of K. A synthesizable hardware model for the control and data path of the integration is proposed. A Hardware Model algorithm for an automated search for the best value of K in steps of 10, is presented. The proposed integration will allow the system to work by itself, to auto search for the best compression ratio after the CNN has finished training.","PeriodicalId":169403,"journal":{"name":"International Journal of Emerging Technology and Advanced Engineering","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126743985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Hamid, Firdaus Mohamad, M. Noh, R. E. Nasir, M. A. M. Sapardi
Airfoil selection is a crucial phase in the design of a small unmanned fixed-wing aircraft to allow a minimum size and weight of the lifting surfaces. The present study analyzesairfoils to be used in low operating Reynolds number unmanned aerial vehicles (UAV) using XFLR5 software, which was validated against wind tunnel data. Three baseline airfoils were investigated, namely NACA4412, Miley M06-13- 128 and Selig S1223. The best performing airfoils are then modified using the inverse airfoil design method to improve their performance in cruising flight. The modified airfoil resulted in larger leading edge radius and slightly thicker chord of the airfoil compared to the baseline airfoil. In general, the modified airfoil showed an improvement in stall characteristic, lift and drag coefficients in the post-stall regime, and a lower magnitude of moment coefficient for almost all investigated angles of attack compared to the baseline airfoil.
在小型无人固定翼飞机的设计中,翼型的选择是一个至关重要的阶段,以允许最小尺寸和重量的升力面。本研究利用XFLR5软件对低雷诺数无人机的翼型进行了分析,并对风洞数据进行了验证。研究了三个基线翼型,即NACA4412, Miley M06-13- 128和Selig S1223。然后使用反翼型设计方法对性能最好的翼型进行修改,以提高其巡航飞行性能。修改翼型导致较大的前缘半径和稍厚的弦翼型相比,基线翼型。在一般情况下,修改翼型显示在失速特性的改善,升力和阻力系数在失速后的制度,和一个较低的矩系数几乎所有调查的攻角相比,基线翼型。
{"title":"Aerodynamics of a Modified High-Lift Low Reynolds Number Airfoil: Preliminary Analysis","authors":"A. Hamid, Firdaus Mohamad, M. Noh, R. E. Nasir, M. A. M. Sapardi","doi":"10.46338/ijetae1222_02","DOIUrl":"https://doi.org/10.46338/ijetae1222_02","url":null,"abstract":"Airfoil selection is a crucial phase in the design of a small unmanned fixed-wing aircraft to allow a minimum size and weight of the lifting surfaces. The present study analyzesairfoils to be used in low operating Reynolds number unmanned aerial vehicles (UAV) using XFLR5 software, which was validated against wind tunnel data. Three baseline airfoils were investigated, namely NACA4412, Miley M06-13- 128 and Selig S1223. The best performing airfoils are then modified using the inverse airfoil design method to improve their performance in cruising flight. The modified airfoil resulted in larger leading edge radius and slightly thicker chord of the airfoil compared to the baseline airfoil. In general, the modified airfoil showed an improvement in stall characteristic, lift and drag coefficients in the post-stall regime, and a lower magnitude of moment coefficient for almost all investigated angles of attack compared to the baseline airfoil.","PeriodicalId":169403,"journal":{"name":"International Journal of Emerging Technology and Advanced Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115964697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abraham Ninian Ejin, Wong Guang Xing, H. T. Yew, Mazlina Mamat
The three main Covid-19 symptoms are shortness of breath, coughing and fever. Currently, most of the patients who tested positive for COVID-19 are selfquarantined at home. Unfortunately, some home quarantine Covid-19 patients are brought in death to hospital. Therefore, e-health remote patient monitoring systems are needed. Although many e-health monitoring systems are proposed by the researcher, not many dedicated systems are suitable for COVID-19 specifically. Mostly do not have a respiratory rate monitoring function. Furthermore, many e-health devices in the market only feature local data storage and do not include Internet of Things (IoT) integration. In this work, we proposed a low-cost IoT based respiratory sensor for home quarantine Covid-19 patients to monitor the respiratory rate. The measured respiratory rate will be transmitted to Google Clould via WiFi connection and the user can read it through their computer or smartphone. Alert message will be generated if the respiratory rate reaches an unsafe threshold. The proposed device was tested with five samples and gave a 100% accuracy on respiratory rate measurement. The proposed prototype cost is much lower than the other respiratory monitoring devices in the market. The proposed device could reduce the mortality of home quarantine Covid19 patients
{"title":"Low-Cost IoT Based Wearable Respiratory Sensor for Covid-19 Patients","authors":"Abraham Ninian Ejin, Wong Guang Xing, H. T. Yew, Mazlina Mamat","doi":"10.46338/ijetae1222_08","DOIUrl":"https://doi.org/10.46338/ijetae1222_08","url":null,"abstract":"The three main Covid-19 symptoms are shortness of breath, coughing and fever. Currently, most of the patients who tested positive for COVID-19 are selfquarantined at home. Unfortunately, some home quarantine Covid-19 patients are brought in death to hospital. Therefore, e-health remote patient monitoring systems are needed. Although many e-health monitoring systems are proposed by the researcher, not many dedicated systems are suitable for COVID-19 specifically. Mostly do not have a respiratory rate monitoring function. Furthermore, many e-health devices in the market only feature local data storage and do not include Internet of Things (IoT) integration. In this work, we proposed a low-cost IoT based respiratory sensor for home quarantine Covid-19 patients to monitor the respiratory rate. The measured respiratory rate will be transmitted to Google Clould via WiFi connection and the user can read it through their computer or smartphone. Alert message will be generated if the respiratory rate reaches an unsafe threshold. The proposed device was tested with five samples and gave a 100% accuracy on respiratory rate measurement. The proposed prototype cost is much lower than the other respiratory monitoring devices in the market. The proposed device could reduce the mortality of home quarantine Covid19 patients","PeriodicalId":169403,"journal":{"name":"International Journal of Emerging Technology and Advanced Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133982237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, the time-domain equivalent circuit for three-phase delta-connected loads, within the frame of the Clarke transformation and the space vector approach,is derived. The proposed theoretical derivation is a further contribution to extend the general theory of the space-vector approach for transient analysis of three-phase networks. In fact, since space vectors are defined in the time domain, the proposed methodology can be used for three-phase transient analysis, whereas the conventional steady-state analysis results as a special case. The theoretically derived equivalent circuit is validated through Matlab/Simulink simulation of a case study consisting in a specific three-phase active load. Keywords—Clarke transformation, power system analysis, space vec
{"title":"Space-Vector Transient Analysis of Delta-Connected ThreePhase Loads","authors":"D. Bellan","doi":"10.46338/ijetae1122_08","DOIUrl":"https://doi.org/10.46338/ijetae1122_08","url":null,"abstract":"In this paper, the time-domain equivalent circuit for three-phase delta-connected loads, within the frame of the Clarke transformation and the space vector approach,is derived. The proposed theoretical derivation is a further contribution to extend the general theory of the space-vector approach for transient analysis of three-phase networks. In fact, since space vectors are defined in the time domain, the proposed methodology can be used for three-phase transient analysis, whereas the conventional steady-state analysis results as a special case. The theoretically derived equivalent circuit is validated through Matlab/Simulink simulation of a case study consisting in a specific three-phase active load. Keywords—Clarke transformation, power system analysis, space vec","PeriodicalId":169403,"journal":{"name":"International Journal of Emerging Technology and Advanced Engineering","volume":"40 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120999646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Mane, S. Sangve, Gopal Upadhye, Sahil Kandhare, Saurabh Mohole, Sanket Sonar, Satej Tupare
Anomaly detection is an important element in the domain of security. As a result, we undertook a literature review on ML algorithms that identify abnormalities. In this paper, we are presenting a review of the 101 research articles describing ML techniques for anomaly detection published between 2015 - 2022.The goal of this paper is to review research papers that have used machine learning to develop anomaly detection algorithmThe forms of anomaly detection examined in this study include system log anomaly detection, network anomaly detection, cloud-based anomaly detection, and anomaly detection in the medical profession. After assessing the selected research articles, we present more than 10 applications of anomaly detection. Also, we have shared a range of datasets used in anomaly detection research, in addition to revealing 30+ new ML models employed in anomaly detection. We have discovered 55 new datasets for anomaly detection. We've noticed that the majority of researchers utilize real-life datasets and an unsupervised learning technique to detect anomalies. Many ML methods may be applied in this subject, so we present a summary of all work done in the previous six years. Keywords Intrusion detection, Artificial intelligence, Anomaly detection, security, Machine learning.
{"title":"Detection of Anomaly using Machine Learning: A Comprehensive Survey","authors":"D. Mane, S. Sangve, Gopal Upadhye, Sahil Kandhare, Saurabh Mohole, Sanket Sonar, Satej Tupare","doi":"10.46338/ijetae1122_15","DOIUrl":"https://doi.org/10.46338/ijetae1122_15","url":null,"abstract":"Anomaly detection is an important element in the domain of security. As a result, we undertook a literature review on ML algorithms that identify abnormalities. In this paper, we are presenting a review of the 101 research articles describing ML techniques for anomaly detection published between 2015 - 2022.The goal of this paper is to review research papers that have used machine learning to develop anomaly detection algorithmThe forms of anomaly detection examined in this study include system log anomaly detection, network anomaly detection, cloud-based anomaly detection, and anomaly detection in the medical profession. After assessing the selected research articles, we present more than 10 applications of anomaly detection. Also, we have shared a range of datasets used in anomaly detection research, in addition to revealing 30+ new ML models employed in anomaly detection. We have discovered 55 new datasets for anomaly detection. We've noticed that the majority of researchers utilize real-life datasets and an unsupervised learning technique to detect anomalies. Many ML methods may be applied in this subject, so we present a summary of all work done in the previous six years. Keywords Intrusion detection, Artificial intelligence, Anomaly detection, security, Machine learning.","PeriodicalId":169403,"journal":{"name":"International Journal of Emerging Technology and Advanced Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128741051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}