首页 > 最新文献

2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)最新文献

英文 中文
Autonomous Underwater Robotic Electric Vehicles for Inter-Robot Line-of-Sight Tracking and Range Communication 用于机器人间视线跟踪和距离通信的自主水下机器人电动车辆
A. Raveendra, R. Shanmugasundaram, J. Sailaja, G. Boosa, I. Prasanth, Ashish Verma
The use of underwater robotic vehicles (URVs) for scientific inspection of the deep sea, oceanographic mapping, littoral survey, exploitation of underwater resources, protection of the marine environment, and so on, has grown dramatically in recent years. An underwater robot is more difficult to design than a vehicle for use on land or in space. In order to circumvent this issue, we offer a hybrid optimization approach for AUV path planning in an obstacle-filled environment subject to communication limitations. To coordinate several AUVs in a fixed topology environment, a PD controller is employed. A remotely operated underwater vehicle (ROV) is a type of submersible underwater vehicle that can operate without human intervention. It is controlled by an on board computer to perform assigned tasks. Due to the intricacy of the AUV motion control problem, a simulation environment was built in MATLAB/SIMULINK utilising the specifications of the widely used INFANTE AUV. The simulation studies have analysed the control performances under a variety of motion control scenarios, including coordination control, path tracking, and obstacle avoidance.
近年来,水下机器人在深海科学考察、海洋测绘、沿海调查、水下资源开发、海洋环境保护等方面的应用迅速发展。水下机器人比在陆地或太空中使用的交通工具更难设计。为了规避这一问题,我们提出了一种混合优化方法,用于受通信限制的障碍物环境下的AUV路径规划。为了在固定的拓扑环境中协调多个auv,采用了PD控制器。遥控水下航行器(ROV)是一种无需人工干预的水下航行器。它由机载计算机控制,执行指定的任务。由于AUV运动控制问题的复杂性,利用广泛使用的INFANTE AUV的规格,在MATLAB/SIMULINK中构建了仿真环境。仿真研究分析了各种运动控制场景下的控制性能,包括协调控制、路径跟踪和避障。
{"title":"Autonomous Underwater Robotic Electric Vehicles for Inter-Robot Line-of-Sight Tracking and Range Communication","authors":"A. Raveendra, R. Shanmugasundaram, J. Sailaja, G. Boosa, I. Prasanth, Ashish Verma","doi":"10.1109/ICECCT56650.2023.10179670","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179670","url":null,"abstract":"The use of underwater robotic vehicles (URVs) for scientific inspection of the deep sea, oceanographic mapping, littoral survey, exploitation of underwater resources, protection of the marine environment, and so on, has grown dramatically in recent years. An underwater robot is more difficult to design than a vehicle for use on land or in space. In order to circumvent this issue, we offer a hybrid optimization approach for AUV path planning in an obstacle-filled environment subject to communication limitations. To coordinate several AUVs in a fixed topology environment, a PD controller is employed. A remotely operated underwater vehicle (ROV) is a type of submersible underwater vehicle that can operate without human intervention. It is controlled by an on board computer to perform assigned tasks. Due to the intricacy of the AUV motion control problem, a simulation environment was built in MATLAB/SIMULINK utilising the specifications of the widely used INFANTE AUV. The simulation studies have analysed the control performances under a variety of motion control scenarios, including coordination control, path tracking, and obstacle avoidance.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129122640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FPGA Implementation of High Speed Convolutional Encoder and Viterbi Decoder for Software Defined Radio 软件无线电高速卷积编码器和维特比解码器的FPGA实现
Hanchinal Punit Basavaraj, Pappa M
Attenuation, interference, noise, and distortion affect any wireless communication system's data transfer, making it more difficult for the receiver to receive precise data. Convolution encoder is used to fix errors at the receiver end. Software defined radio may adjust to different encoding and modulation schemes by changing its configuration. In this work, convolutional encoding with a 1/2 code rate and a 3 length constraint is proposed. The updated Viterbi decoder architecture optimizes the key route, enabling higher speeds. MATLAB is used for simulation to verify the Viterbi design. Verilog HDL for RTL coding and a Xilinx Spartan Series FPGA is used in the implementation. ModelSim and Vivado are used for functional and timings simulations.
衰减、干扰、噪声和失真会影响任何无线通信系统的数据传输,使接收器更难接收到精确的数据。采用卷积编码器对接收端误差进行修正。软件无线电可以通过改变其配置来适应不同的编码和调制方案。在这项工作中,提出了1/2码率和3长度约束的卷积编码。更新后的Viterbi解码器架构优化了关键路由,实现了更高的速度。利用MATLAB仿真验证了Viterbi设计。采用Verilog HDL进行RTL编码,Xilinx Spartan系列FPGA进行实现。ModelSim和Vivado用于功能和时序模拟。
{"title":"FPGA Implementation of High Speed Convolutional Encoder and Viterbi Decoder for Software Defined Radio","authors":"Hanchinal Punit Basavaraj, Pappa M","doi":"10.1109/ICECCT56650.2023.10179840","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179840","url":null,"abstract":"Attenuation, interference, noise, and distortion affect any wireless communication system's data transfer, making it more difficult for the receiver to receive precise data. Convolution encoder is used to fix errors at the receiver end. Software defined radio may adjust to different encoding and modulation schemes by changing its configuration. In this work, convolutional encoding with a 1/2 code rate and a 3 length constraint is proposed. The updated Viterbi decoder architecture optimizes the key route, enabling higher speeds. MATLAB is used for simulation to verify the Viterbi design. Verilog HDL for RTL coding and a Xilinx Spartan Series FPGA is used in the implementation. ModelSim and Vivado are used for functional and timings simulations.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129138029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of AI/ML in Network-Slicing-Based Infrastructure of the Next-Generation Wireless Networking Systems AI/ML在下一代无线网络系统基于网络切片的基础设施中的应用
A. Haldorai, Ravishankar. C. V, Q. Mahdi, P. Devasudha
The future iteration of cellular networking systems will be very dynamical and variable due to the incorporation of telecommunications with varying sizes, diverse wireless access, and connectivity resources. Emergent applications e.g., machine-to-machines communications, industrial automations and autonomous driving, have more complex requirements based on latency and reliability. The complex requirements pose critical issues to resource orchestration, management of networks, and architecture design in next-generation wireless networking systems. Beginning with demonstrating these issues, this research contributions focusses on providing a critical understanding on the general infrastructure of the next-generation wireless networking systems and research directions under this general infrastructure. The first part of our discussion introduces infrastructure centered on network slicing and specifies location and the reason as to why AI should be deployed there. Generally, this research defines the potentials and benefits of artificial intelligence-based methods in the study of next-generation wireless networking systems.
蜂窝网络系统的未来迭代将是非常动态和可变的,因为合并了具有不同规模、不同无线接入和连接资源的电信。紧急应用,如机器对机器通信,工业自动化和自动驾驶,基于延迟和可靠性有更复杂的要求。这些复杂的需求对下一代无线网络系统中的资源编排、网络管理和体系结构设计提出了关键问题。从展示这些问题开始,本研究的重点是提供对下一代无线网络系统的一般基础设施和在这种一般基础设施下的研究方向的批判性理解。我们讨论的第一部分介绍了以网络切片为中心的基础设施,并指定了AI应该部署在那里的位置和原因。总的来说,本研究定义了基于人工智能的方法在下一代无线网络系统研究中的潜力和好处。
{"title":"Application of AI/ML in Network-Slicing-Based Infrastructure of the Next-Generation Wireless Networking Systems","authors":"A. Haldorai, Ravishankar. C. V, Q. Mahdi, P. Devasudha","doi":"10.1109/ICECCT56650.2023.10179649","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179649","url":null,"abstract":"The future iteration of cellular networking systems will be very dynamical and variable due to the incorporation of telecommunications with varying sizes, diverse wireless access, and connectivity resources. Emergent applications e.g., machine-to-machines communications, industrial automations and autonomous driving, have more complex requirements based on latency and reliability. The complex requirements pose critical issues to resource orchestration, management of networks, and architecture design in next-generation wireless networking systems. Beginning with demonstrating these issues, this research contributions focusses on providing a critical understanding on the general infrastructure of the next-generation wireless networking systems and research directions under this general infrastructure. The first part of our discussion introduces infrastructure centered on network slicing and specifies location and the reason as to why AI should be deployed there. Generally, this research defines the potentials and benefits of artificial intelligence-based methods in the study of next-generation wireless networking systems.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122384460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Five Level Cascaded Multilevel Inverter by Level Shift & Phase Shift PWM Techniques 电平移位与相移PWM技术对五电平级联多电平逆变器的比较分析
Champa P N, Abhay Deshpande A, K. Venkatesha
Most of the applications in industries require medium and high voltage so hence multilevel inverters (MLI) are gaining significant importance [1]. This paper gives an insight of different modulation strategies such as phase shift, level shift used for single phase five level cascaded H-bridge (CHB) MLI for reducing total harmonic distortions with high-power handling capability by increasing its voltage level. Also, emphasis more on multicarrier PWM strategy for the CHB MLI. A simulation model of five level cascaded H-bridge multilevel inverter is developed using MATLAB/SIMULINK and its total harmonic distortions has been analyzed.
工业中的大多数应用都需要中高压,因此多电平逆变器(MLI)越来越重要[1]。本文介绍了单相五电平级联h桥(CHB) MLI采用相移、电平移等不同的调制策略,通过提高其电压水平来降低总谐波畸变,并具有高功率处理能力。此外,重点介绍了CHB MLI的多载波PWM策略。利用MATLAB/SIMULINK建立了五电平级联h桥多电平逆变器的仿真模型,并对其总谐波畸变进行了分析。
{"title":"Comparative Analysis of Five Level Cascaded Multilevel Inverter by Level Shift & Phase Shift PWM Techniques","authors":"Champa P N, Abhay Deshpande A, K. Venkatesha","doi":"10.1109/ICECCT56650.2023.10179647","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179647","url":null,"abstract":"Most of the applications in industries require medium and high voltage so hence multilevel inverters (MLI) are gaining significant importance [1]. This paper gives an insight of different modulation strategies such as phase shift, level shift used for single phase five level cascaded H-bridge (CHB) MLI for reducing total harmonic distortions with high-power handling capability by increasing its voltage level. Also, emphasis more on multicarrier PWM strategy for the CHB MLI. A simulation model of five level cascaded H-bridge multilevel inverter is developed using MATLAB/SIMULINK and its total harmonic distortions has been analyzed.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130799660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Advanced Intrusion Detection Algorithm for Network Traffic Using Convolution Neural Network 一种基于卷积神经网络的网络流量入侵检测算法
Arun Kumar Silivery, K. R. Mohan Rao, Ramana Solleti
There has been rapid advancement in networks and technology over the past few years, and Internet service providers are now available anywhere in the world. The number of thefts has increased, and many current systems have been breached. As a result, the need for creating information security technology to spot new attacks has grown significantly. An Intrusion Detection System (IDS) combines machine learning and deep learning algorithms to discover network abnormalities, is an essential information security technology. The central concept of this study is to find the elusive assault bundle by using a high-level intrusion detection system with high network performance. Likewise, in this approach, the attack detection is completed. The proposed system has shown that empowering brings incredible precision.
在过去的几年里,网络和技术发展迅速,现在世界上任何地方都有互联网服务提供商。盗窃的数量有所增加,许多现有系统已被攻破。因此,创建信息安全技术以发现新的攻击的需求显著增长。入侵检测系统(IDS)是一种结合机器学习和深度学习算法来发现网络异常的技术,是一项必不可少的信息安全技术。本研究的中心思想是利用高性能的高级入侵检测系统,找到难以捉摸的攻击包。同样,在这种方法中,完成了攻击检测。所提出的系统表明,授权带来了难以置信的精确度。
{"title":"An Advanced Intrusion Detection Algorithm for Network Traffic Using Convolution Neural Network","authors":"Arun Kumar Silivery, K. R. Mohan Rao, Ramana Solleti","doi":"10.1109/ICECCT56650.2023.10179767","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179767","url":null,"abstract":"There has been rapid advancement in networks and technology over the past few years, and Internet service providers are now available anywhere in the world. The number of thefts has increased, and many current systems have been breached. As a result, the need for creating information security technology to spot new attacks has grown significantly. An Intrusion Detection System (IDS) combines machine learning and deep learning algorithms to discover network abnormalities, is an essential information security technology. The central concept of this study is to find the elusive assault bundle by using a high-level intrusion detection system with high network performance. Likewise, in this approach, the attack detection is completed. The proposed system has shown that empowering brings incredible precision.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130224447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling and Controlling of AC/DC Hybrid Microgrid 交直流混合微电网的建模与控制
D. Kishore, Muchhupalli Saimanoj, Adapala Sri Venkata Sai Kishore, Devadi Hari Krishna Veerendra
As a result of climate change, renewable energy sources like solar and wind have become the most popular choice for distributed generators (DGs). Power sources including wind, solar, biomass, mini-hydro, fuel cells, and microturbines will help boost decentralised power production. Electricity systems may benefit from distributed generation in a number of ways, including environmental friendliness, scalability, and the use of nonconventional microsources. A regulated microgrid is comprised of loads and distributed generators. Microgrids may function whether or not they are connected to the main power grid. Microgrids provide power system connections to variable renewable AC and DC sources and loads while minimising the need for reverse conversions in AC or DC grids. Connecting DGs to the utility/grid through power electronic converters raises questions about the security and integrity of the connected systems. Local dependability, feeder loss reduction, local voltage support, waste heat utilisation, voltage sag correction, and uninterruptible power supply are just some of the client demands that may be met by tailoring the microgrid to their specific requirements. In order to better understand how hybrid AC/DC microgrid systems function when connected to the mains, this research evaluates their efficiency. Microgrids use renewable energy sources such as solar panels, wind turbines, and batteries. The DC and AC sub-grids are synchronised by the manipulation of converters. MATLAB/Simulink is responsible for generating the results.
由于气候变化,太阳能和风能等可再生能源已成为分布式发电机(dg)最受欢迎的选择。包括风能、太阳能、生物质能、微型水电、燃料电池和微型涡轮机在内的能源将有助于推动分散的电力生产。电力系统可能在许多方面受益于分布式发电,包括环境友好、可扩展性和非常规微源的使用。调节微电网由负载和分布式发电机组成。无论微电网是否连接到主电网,它们都可以正常运行。微电网为可变的可再生交流和直流电源和负载提供电力系统连接,同时最大限度地减少交流或直流电网的反向转换需求。通过电力电子转换器将dg连接到公用事业/电网引发了有关所连接系统的安全性和完整性的问题。本地可靠性、馈线损耗降低、本地电压支持、余热利用、电压暂降校正和不间断电源只是客户的一些要求,可以通过定制微电网来满足他们的特定要求。为了更好地了解混合交/直流微电网系统在连接到市电时的功能,本研究评估了它们的效率。微电网使用可再生能源,如太阳能电池板、风力涡轮机和电池。直流和交流子电网通过变流器的操纵实现同步。MATLAB/Simulink负责生成结果。
{"title":"Modeling and Controlling of AC/DC Hybrid Microgrid","authors":"D. Kishore, Muchhupalli Saimanoj, Adapala Sri Venkata Sai Kishore, Devadi Hari Krishna Veerendra","doi":"10.1109/ICECCT56650.2023.10179709","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179709","url":null,"abstract":"As a result of climate change, renewable energy sources like solar and wind have become the most popular choice for distributed generators (DGs). Power sources including wind, solar, biomass, mini-hydro, fuel cells, and microturbines will help boost decentralised power production. Electricity systems may benefit from distributed generation in a number of ways, including environmental friendliness, scalability, and the use of nonconventional microsources. A regulated microgrid is comprised of loads and distributed generators. Microgrids may function whether or not they are connected to the main power grid. Microgrids provide power system connections to variable renewable AC and DC sources and loads while minimising the need for reverse conversions in AC or DC grids. Connecting DGs to the utility/grid through power electronic converters raises questions about the security and integrity of the connected systems. Local dependability, feeder loss reduction, local voltage support, waste heat utilisation, voltage sag correction, and uninterruptible power supply are just some of the client demands that may be met by tailoring the microgrid to their specific requirements. In order to better understand how hybrid AC/DC microgrid systems function when connected to the mains, this research evaluates their efficiency. Microgrids use renewable energy sources such as solar panels, wind turbines, and batteries. The DC and AC sub-grids are synchronised by the manipulation of converters. MATLAB/Simulink is responsible for generating the results.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127845517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automation of Short Answer Grading Techniques: Comparative Study using Deep Learning Techniques 简答评分技术的自动化:使用深度学习技术的比较研究
Arunima Divya, Vivek Haridas, Jayasree Narayanan
Automatic short answer grading (ASAG) techniques have been shown to cut down on the time and work needed to grade exams, and it is a method that is becoming more and more common, especially with the rise in popularity of online courses. This study compares the results of 7 pre-trained embedding models using just one feature to automatically grade brief responses: the similarity between the model answer's and the student answer's embeddings. Regression models are developed and evaluated to predict a short answer's score based on the similarities between all pairs of answers in the Mohler dataset. The predictions are evaluated by comparing the Root Mean Squared Error (RMSE) and Pearson correlation scores of each model.
自动简答评分(ASAG)技术已经被证明可以减少考试评分所需的时间和工作量,而且这种方法正变得越来越普遍,尤其是随着在线课程的普及。这项研究比较了7个预训练的嵌入模型的结果,只使用一个特征来自动对简短的回答进行评分:模型答案和学生答案嵌入之间的相似性。基于Mohler数据集中所有对答案之间的相似性,开发和评估回归模型来预测简短答案的得分。通过比较每个模型的均方根误差(RMSE)和Pearson相关评分来评估预测。
{"title":"Automation of Short Answer Grading Techniques: Comparative Study using Deep Learning Techniques","authors":"Arunima Divya, Vivek Haridas, Jayasree Narayanan","doi":"10.1109/ICECCT56650.2023.10179759","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179759","url":null,"abstract":"Automatic short answer grading (ASAG) techniques have been shown to cut down on the time and work needed to grade exams, and it is a method that is becoming more and more common, especially with the rise in popularity of online courses. This study compares the results of 7 pre-trained embedding models using just one feature to automatically grade brief responses: the similarity between the model answer's and the student answer's embeddings. Regression models are developed and evaluated to predict a short answer's score based on the similarities between all pairs of answers in the Mohler dataset. The predictions are evaluated by comparing the Root Mean Squared Error (RMSE) and Pearson correlation scores of each model.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131688061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Placement of Micro-Phasor Measurement Units in Distribution Network using Pattern Search Algorithm 基于模式搜索算法的配电网微相量测量单元优化配置
R. Manam, Ramesh Adireddy, Lakshmi Kambampati, Manoz Kumar Reddy Karri, Tata Rao Donepudi, S. Rayapudi
This paper presents a Pattern Search (PS) algorithm for optimal placement of Micro-Phasor Measurement Units (M-PMUs) in a distribution network to obtain complete observability through which security of network can be attained. By the distribution state estimation process, these M-PMU measurements can help to estimate the state of every node in the network. The pattern search algorithm is a nonlinear, constrained procedure used to optimize network locations for M-PMU placement. Redundancy bus nodes in the feeder network are considered in the optimization process to minimize PMU locations. The locations of M-PMUs with and without radial buses are compared. A redundancy index (RI) at the node and a complete network observabilty index (CNOI) for the entire network are proposed to assess network observabilty. The proposed indices can show whether the system is completely observable or not. Test cases that are MATLAB-programmed include the IEEE-13, 33, and 69 feeder networks. The effectiveness of the findings in the optimization of nonlinear constraints is shown by comparison with other widely used techniques.
提出了一种基于模式搜索的配电网微相量测量单元(m - pmu)优化配置算法,以获得完全可观测性,从而保证配电网的安全性。通过分布状态估计过程,这些M-PMU测量值可以帮助估计网络中每个节点的状态。模式搜索算法是一种非线性约束过程,用于优化M-PMU放置的网络位置。在优化过程中考虑馈线网络中的冗余总线节点,以最小化PMU的位置。比较了带和不带径向母线的m - pmu的位置。提出了节点的冗余指数(RI)和整个网络的完全网络可观察性指数(CNOI)来评估网络的可观察性。所提出的指标可以显示系统是否完全可观察。用matlab编程的测试用例包括IEEE-13、33和69馈线网络。通过与其他广泛使用的技术进行比较,证明了这些发现在非线性约束优化中的有效性。
{"title":"Optimal Placement of Micro-Phasor Measurement Units in Distribution Network using Pattern Search Algorithm","authors":"R. Manam, Ramesh Adireddy, Lakshmi Kambampati, Manoz Kumar Reddy Karri, Tata Rao Donepudi, S. Rayapudi","doi":"10.1109/ICECCT56650.2023.10179715","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179715","url":null,"abstract":"This paper presents a Pattern Search (PS) algorithm for optimal placement of Micro-Phasor Measurement Units (M-PMUs) in a distribution network to obtain complete observability through which security of network can be attained. By the distribution state estimation process, these M-PMU measurements can help to estimate the state of every node in the network. The pattern search algorithm is a nonlinear, constrained procedure used to optimize network locations for M-PMU placement. Redundancy bus nodes in the feeder network are considered in the optimization process to minimize PMU locations. The locations of M-PMUs with and without radial buses are compared. A redundancy index (RI) at the node and a complete network observabilty index (CNOI) for the entire network are proposed to assess network observabilty. The proposed indices can show whether the system is completely observable or not. Test cases that are MATLAB-programmed include the IEEE-13, 33, and 69 feeder networks. The effectiveness of the findings in the optimization of nonlinear constraints is shown by comparison with other widely used techniques.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125393131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Redundancy, Data Phishing, and Data Cloud Backup 数据冗余、数据钓鱼、数据云备份
M. Lokesh, Anjali Devi, U. D. Chowdary, P. V. N. S. D. Lakshmi, G. Rao
Data today is extremely complex and massive in size. By taking these factors into account, machine learning and ETL techniques will find it much easier to separate useful data from unusable raw data. In web technology, OLTP and OLAP are used to manipulate data on a daily basis. During the transaction, a massive amount of data is maintained in the database or data warehouse. There was no Cloud storage to back up data in the past. Because of the significant increase in internet usage, people are sharing more of their personal information online. Cybercriminals can now access a vast amount of personal data and financial activities. Phishing is one instance of a very efficient type of cybercrime that allows offenders to trick users and obtain crucial data. Phishing has advanced into a more complex attack vector since the first known instance was published in 1990. One of the most common online fraud types now is phishing. Phishing attacks can cause serious losses for their victims, including the theft of confidential information, identities, businesses, and state secrets. This article evaluates these attacks by addressing existing phishing techniques and discussing the current state of phishing. Phishing attacks have been classified in studies based on common phishing methodologies and defences, ignoring the importance of the entire phishing lifecycle. This article provides a new, in-depth model of the anatomy of phishing attacks, including attack phases, attacker types, threats, targets, attack media, and attacking strategies. The suggested physiology would also help readers understand the lifecycle of a phishing attack, which would aid in the development of a comprehensive anti-phishing system. This will improve public awareness of phishing attacks and the methods used. New approaches are also proposed, and certain preventive measures are investigated.
今天的数据是极其复杂和庞大的。考虑到这些因素,机器学习和ETL技术将会更容易将有用的数据从不可用的原始数据中分离出来。在web技术中,OLTP和OLAP用于日常操作数据。在事务期间,在数据库或数据仓库中维护大量数据。过去没有云存储来备份数据。由于互联网使用量的显著增加,人们在网上分享了更多的个人信息。网络犯罪分子现在可以访问大量的个人数据和金融活动。网络钓鱼是一种非常有效的网络犯罪类型,它允许罪犯欺骗用户并获取关键数据。自从1990年第一个已知实例发布以来,网络钓鱼已经发展成为一种更复杂的攻击媒介。现在最常见的网络诈骗类型之一是网络钓鱼。网络钓鱼攻击会给受害者造成严重的损失,包括窃取机密信息、身份、企业和国家机密。本文通过解决现有的网络钓鱼技术和讨论网络钓鱼的当前状态来评估这些攻击。在研究中,基于常见的网络钓鱼方法和防御手段对网络钓鱼攻击进行分类,忽略了整个网络钓鱼生命周期的重要性。本文提供了一个新的、深入的网络钓鱼攻击剖析模型,包括攻击阶段、攻击者类型、威胁、目标、攻击媒体和攻击策略。建议的生理学也将帮助读者了解网络钓鱼攻击的生命周期,这将有助于开发全面的反网络钓鱼系统。这将提高公众对网络钓鱼攻击及其使用方法的认识。提出了新的途径,并探讨了一些预防措施。
{"title":"Data Redundancy, Data Phishing, and Data Cloud Backup","authors":"M. Lokesh, Anjali Devi, U. D. Chowdary, P. V. N. S. D. Lakshmi, G. Rao","doi":"10.1109/ICECCT56650.2023.10179679","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179679","url":null,"abstract":"Data today is extremely complex and massive in size. By taking these factors into account, machine learning and ETL techniques will find it much easier to separate useful data from unusable raw data. In web technology, OLTP and OLAP are used to manipulate data on a daily basis. During the transaction, a massive amount of data is maintained in the database or data warehouse. There was no Cloud storage to back up data in the past. Because of the significant increase in internet usage, people are sharing more of their personal information online. Cybercriminals can now access a vast amount of personal data and financial activities. Phishing is one instance of a very efficient type of cybercrime that allows offenders to trick users and obtain crucial data. Phishing has advanced into a more complex attack vector since the first known instance was published in 1990. One of the most common online fraud types now is phishing. Phishing attacks can cause serious losses for their victims, including the theft of confidential information, identities, businesses, and state secrets. This article evaluates these attacks by addressing existing phishing techniques and discussing the current state of phishing. Phishing attacks have been classified in studies based on common phishing methodologies and defences, ignoring the importance of the entire phishing lifecycle. This article provides a new, in-depth model of the anatomy of phishing attacks, including attack phases, attacker types, threats, targets, attack media, and attacking strategies. The suggested physiology would also help readers understand the lifecycle of a phishing attack, which would aid in the development of a comprehensive anti-phishing system. This will improve public awareness of phishing attacks and the methods used. New approaches are also proposed, and certain preventive measures are investigated.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126878494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interleaved DC-DC Boost Converter with Coupled Inductors 带耦合电感的交错DC-DC升压变换器
Sivaprasad Kollati, Godi Poojitha, Bobbepalli Gopi, Kunche Swarna Nikhitha
The purpose of this research is to come up with an original design for a high-step-up dc-dc converter that might be used in decentralised power plants. This concept is built on a foundation of a pair of capacitors and a single inductor that is coupled together. The energy that is stored in the connected inductor is used to charge the two capacitors in parallel during the time when the switch is off and to discharge them in series during the time when the switch is on. This results in a high step-up voltage gain. In addition, the energy lost by the linked inductor's leaky inductance may be recycled via the use of a passive clamp circuit. As a result, the strain that the primary switch experiences from the voltage is minimised. Utilizing a switch that has an RDS that has a low resistance may help reduce the amount of conduction loss (ON). Since the problem with the diodes' reverse-recovery has been fixed, the efficiency could be able to be improved even more. There is a focus on providing in-depth descriptions of the operating principle as well as steady-state investigations.
本研究的目的是提出一种可能用于分散式发电厂的高升压dc-dc转换器的原始设计。这个概念是建立在一对电容器和一个电感耦合在一起的基础上的。存储在连接的电感中的能量用于在开关断开时对两个电容器并联充电,在开关打开时对它们进行串联放电。这导致了高升压增益。此外,连接电感漏感所损失的能量可以通过使用无源钳位电路进行回收。因此,初级开关从电压经历的应变是最小的。使用具有低电阻RDS的开关可能有助于减少导通损耗(ON)的量。由于二极管反向恢复的问题已经解决,效率可能会进一步提高。重点是提供对工作原理的深入描述以及稳态研究。
{"title":"Interleaved DC-DC Boost Converter with Coupled Inductors","authors":"Sivaprasad Kollati, Godi Poojitha, Bobbepalli Gopi, Kunche Swarna Nikhitha","doi":"10.1109/ICECCT56650.2023.10179736","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179736","url":null,"abstract":"The purpose of this research is to come up with an original design for a high-step-up dc-dc converter that might be used in decentralised power plants. This concept is built on a foundation of a pair of capacitors and a single inductor that is coupled together. The energy that is stored in the connected inductor is used to charge the two capacitors in parallel during the time when the switch is off and to discharge them in series during the time when the switch is on. This results in a high step-up voltage gain. In addition, the energy lost by the linked inductor's leaky inductance may be recycled via the use of a passive clamp circuit. As a result, the strain that the primary switch experiences from the voltage is minimised. Utilizing a switch that has an RDS that has a low resistance may help reduce the amount of conduction loss (ON). Since the problem with the diodes' reverse-recovery has been fixed, the efficiency could be able to be improved even more. There is a focus on providing in-depth descriptions of the operating principle as well as steady-state investigations.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123345928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1