首页 > 最新文献

2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)最新文献

英文 中文
Performance of Three-Phase Induction Motor with Space Vector Pulse Width Modulation under Artificial Neural Network Control 空间矢量脉宽调制三相异步电动机在人工神经网络控制下的性能
A. Sahu, D. Joshi
In this paper, the performance of a three-phase induction motor with space vector pulse width modulation (SVPWM) technique under artificial neural network (ANN) control is studied. The use of ANN control allows for improved performance of the induction motor, including enhanced speed control. The SVPWM technique is used to accurately control the voltage applied to the motor, resulting in improved performance of the induction motor. The operation of the induction motor is compared with proportional-integral (PI) controller. The results of the study show that the use of ANN control in conjunction with SVPWM leads to improved performance of the three-phase induction motor. The system's complete mathematical model is outlined and simulated using the MATLAB/Simulink platform.
本文研究了人工神经网络控制下空间矢量脉宽调制(SVPWM)三相异步电动机的性能。人工神经网络控制的使用可以提高感应电机的性能,包括增强的速度控制。采用SVPWM技术精确控制施加在电机上的电压,从而提高了感应电机的性能。并与比例积分(PI)控制器进行了比较。研究结果表明,将人工神经网络控制与SVPWM相结合,可以提高三相异步电动机的性能。给出了系统完整的数学模型,并利用MATLAB/Simulink平台进行了仿真。
{"title":"Performance of Three-Phase Induction Motor with Space Vector Pulse Width Modulation under Artificial Neural Network Control","authors":"A. Sahu, D. Joshi","doi":"10.1109/ICECCT56650.2023.10179695","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179695","url":null,"abstract":"In this paper, the performance of a three-phase induction motor with space vector pulse width modulation (SVPWM) technique under artificial neural network (ANN) control is studied. The use of ANN control allows for improved performance of the induction motor, including enhanced speed control. The SVPWM technique is used to accurately control the voltage applied to the motor, resulting in improved performance of the induction motor. The operation of the induction motor is compared with proportional-integral (PI) controller. The results of the study show that the use of ANN control in conjunction with SVPWM leads to improved performance of the three-phase induction motor. The system's complete mathematical model is outlined and simulated using the MATLAB/Simulink platform.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133278293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hesitant Triangular Fuzzy Dombi Operators and Its Applications 犹豫三角模糊Dombi算子及其应用
A. B, Vidhya. M
In this research, the concept of hesitant triangular fuzzy set (HTFS) by integrating HFS and TFS concepts, and we give various HTFS set theoretical operations. On HTFSs, we also create Dombi operations. We describe some Dombi-based aggreagation operators, such as the hesitant triangular fuzzy Dombi weighted averaging operator (HTFDW A) and the hesitant triangular fuzzy Dombi weighted Geometric operator (HTFDWG). Additionally, we add a score for hesitant triangular dombi numbers to the ranking system. In order to choose the most preferable option, we develop a MADM approach where the alternatives are ranked according to the values of the score of HTFDO. The accuracy and efficiency of the created aggregation operators and decision-making approach are finally shown through real-world examples.
本文通过对犹豫不决三角模糊集(HTFS)和犹豫不决三角模糊集(TFS)概念的整合,提出了犹豫不决三角模糊集(HTFS)的概念,并给出了HTFS集合的各种理论操作。在https上,我们还创建了Dombi操作。我们描述了一些基于Dombi的聚合算子,如犹豫不决三角形模糊Dombi加权平均算子(HTFDW A)和犹豫不决三角形模糊Dombi加权几何算子(HTFDWG)。此外,我们在排名系统中添加了犹豫三角形dombi数的分数。为了选择最可取的选项,我们开发了一种MADM方法,其中根据HTFDO分数的值对备选方案进行排名。最后通过实例验证了所创建的聚合算子和决策方法的准确性和效率。
{"title":"Hesitant Triangular Fuzzy Dombi Operators and Its Applications","authors":"A. B, Vidhya. M","doi":"10.1109/ICECCT56650.2023.10179707","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179707","url":null,"abstract":"In this research, the concept of hesitant triangular fuzzy set (HTFS) by integrating HFS and TFS concepts, and we give various HTFS set theoretical operations. On HTFSs, we also create Dombi operations. We describe some Dombi-based aggreagation operators, such as the hesitant triangular fuzzy Dombi weighted averaging operator (HTFDW A) and the hesitant triangular fuzzy Dombi weighted Geometric operator (HTFDWG). Additionally, we add a score for hesitant triangular dombi numbers to the ranking system. In order to choose the most preferable option, we develop a MADM approach where the alternatives are ranked according to the values of the score of HTFDO. The accuracy and efficiency of the created aggregation operators and decision-making approach are finally shown through real-world examples.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"17 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114052367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Online Clearance System Using Web-Based System 基于web系统的在线通关系统开发
Abir AlSideiri, R. M. Tawafak, G. Alfarsi, B. Khudayer, Z. C. Cob
Computer Software, an Online-based clearance system, is an internet-based system that effectively manages information for colleges and universities. The aim of this study is to develop software for graduated services and follow up to replace the manual method of clearance for graduating students. The system serves as a more reliable and effective means of removing all forms of delay and enabling an understanding of the procedures involved and how to do online clearance. The data was collected from the BUC collage. the method used to develop software for easy service after graduation. The online clearance system was implemented using Basic Visual 2015 for all static and dynamic programming and MYSQL to manage the database. The finding reveals a significant use of the software. The application reveals the effectiveness and efficiency of these services' software.
计算机软件,一个基于网络的清查系统,是一个基于互联网的系统,可以有效地管理高校的信息。本研究的目的是开发毕业服务的软体,以取代毕业学生的人工清关方式。该系统是一种更可靠和有效的手段,可以消除各种形式的延误,并使人们了解所涉及的程序以及如何进行网上通关。数据来自北卡罗来纳大学拼贴。为毕业后方便服务而开发软件的方法。在线通关系统采用Basic Visual 2015进行静态和动态编程,使用MYSQL进行数据库管理。这一发现揭示了该软件的大量使用。应用表明了这些服务软件的有效性和高效性。
{"title":"Development of Online Clearance System Using Web-Based System","authors":"Abir AlSideiri, R. M. Tawafak, G. Alfarsi, B. Khudayer, Z. C. Cob","doi":"10.1109/ICECCT56650.2023.10179667","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179667","url":null,"abstract":"Computer Software, an Online-based clearance system, is an internet-based system that effectively manages information for colleges and universities. The aim of this study is to develop software for graduated services and follow up to replace the manual method of clearance for graduating students. The system serves as a more reliable and effective means of removing all forms of delay and enabling an understanding of the procedures involved and how to do online clearance. The data was collected from the BUC collage. the method used to develop software for easy service after graduation. The online clearance system was implemented using Basic Visual 2015 for all static and dynamic programming and MYSQL to manage the database. The finding reveals a significant use of the software. The application reveals the effectiveness and efficiency of these services' software.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122584299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Malaria Disease Using Machine Learning Models 使用机器学习模型识别疟疾疾病
S. Kuzhaloli, S. Thenappan, Premavathi T, V. Nivedita, M. Mageshbabu, S. Navaneethan
Malaria, caused by Plasmodium parasites in the bloodstream spread by infected mosquitoes, is a highly severe and sometimes deadly disease. Image analysis and machine learning can enhance diagnosis by quantifying parasitemia on blood slides. The building of an autonomous, accurate, and effective model can significantly reduce the need for trained laborers. This article discusses computer-assisted approaches for finding malaria parasites in blood smear images. These procedures consist of obtaining the dataset, preprocessing the images, segmenting the red blood cells, extracting and choosing features, and classifying the images. The approach is based on well-known Convolutional neural network (CNN) models of Plasmodium parasites and erythrocytes. The trained CNN and VGG-19 are given images of infected and uninfected erythrocytes from the same dataset. VGG 19 gives 96% detection accuracy where CNN achieves 94%.
疟疾是由血液中的疟原虫引起的,由受感染的蚊子传播,是一种非常严重,有时甚至致命的疾病。图像分析和机器学习可以通过定量血载玻片上的寄生虫血症来增强诊断。建立一个自主、准确、有效的模型可以显著减少对训练有素的劳动力的需求。本文讨论了在血液涂片图像中寻找疟疾寄生虫的计算机辅助方法。这些步骤包括数据集的获取、图像的预处理、红细胞的分割、特征的提取和选择、图像的分类。该方法是基于众所周知的卷积神经网络(CNN)模型的疟原虫寄生虫和红细胞。训练后的CNN和VGG-19被给予来自同一数据集的感染和未感染红细胞的图像。VGG 19的检测准确率为96%,CNN的检测准确率为94%。
{"title":"Identification of Malaria Disease Using Machine Learning Models","authors":"S. Kuzhaloli, S. Thenappan, Premavathi T, V. Nivedita, M. Mageshbabu, S. Navaneethan","doi":"10.1109/ICECCT56650.2023.10179665","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179665","url":null,"abstract":"Malaria, caused by Plasmodium parasites in the bloodstream spread by infected mosquitoes, is a highly severe and sometimes deadly disease. Image analysis and machine learning can enhance diagnosis by quantifying parasitemia on blood slides. The building of an autonomous, accurate, and effective model can significantly reduce the need for trained laborers. This article discusses computer-assisted approaches for finding malaria parasites in blood smear images. These procedures consist of obtaining the dataset, preprocessing the images, segmenting the red blood cells, extracting and choosing features, and classifying the images. The approach is based on well-known Convolutional neural network (CNN) models of Plasmodium parasites and erythrocytes. The trained CNN and VGG-19 are given images of infected and uninfected erythrocytes from the same dataset. VGG 19 gives 96% detection accuracy where CNN achieves 94%.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124178858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization techniques for preserving privacy in data mining 数据挖掘中保护隐私的优化技术
K. Devi, K. Balasamy, M. Prathyusha, R. Jeevitha, P. Balasubramanie, M. Eswaran
Data mining is one of the significant area where it plays a predominant role in extracting important factors and trends from large volume of data. This covers various areas such as healthcare, education, entertainment, finance, e-commerce applications etc., The data mining domain has used a variety of algorithms, including supervised, unsupervised, semi-supervised, and reinforcement learning techniques. Under healthcare arena, it deals with huge amount of sensitive data such as patients' data such as their name, age, health records. Those sensitive data have been utilized by the intruders for extracting the original data and also became a prey for the authorized access. Hence, the privacy is one of the serious concern that should be addressed. Various privacy preserving in data mining (PPDM) techniques such as anonymization, perturbation, condensation and cryptographic methods are available to protect those data. In this paper, the optimization techniques such as Genetic algorithm(GA) under evolutionary method and Particle swarm optimization(PSO) under meta heuristic method have been discussed and how it plays an important part in providing more optimal results by securing those sensitive and important information from the unauthorized access.
数据挖掘是一个重要的领域,它在从大量数据中提取重要因素和趋势方面发挥着主导作用。这涵盖了医疗保健、教育、娱乐、金融、电子商务应用等各个领域,数据挖掘领域使用了各种算法,包括监督、无监督、半监督和强化学习技术。在医疗保健领域,它处理大量敏感数据,如患者的姓名、年龄、健康记录等数据。这些敏感数据被入侵者用来提取原始数据,也成为授权访问的猎物。因此,隐私问题是需要解决的严重问题之一。数据挖掘(PPDM)中的各种隐私保护技术,如匿名化、微扰、凝聚和加密方法,可用于保护这些数据。本文讨论了进化方法下的遗传算法(GA)和元启发式方法下的粒子群优化(PSO)等优化技术,以及它们如何通过保护敏感和重要信息不被非法访问来提供更优的结果。
{"title":"Optimization techniques for preserving privacy in data mining","authors":"K. Devi, K. Balasamy, M. Prathyusha, R. Jeevitha, P. Balasubramanie, M. Eswaran","doi":"10.1109/ICECCT56650.2023.10179655","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179655","url":null,"abstract":"Data mining is one of the significant area where it plays a predominant role in extracting important factors and trends from large volume of data. This covers various areas such as healthcare, education, entertainment, finance, e-commerce applications etc., The data mining domain has used a variety of algorithms, including supervised, unsupervised, semi-supervised, and reinforcement learning techniques. Under healthcare arena, it deals with huge amount of sensitive data such as patients' data such as their name, age, health records. Those sensitive data have been utilized by the intruders for extracting the original data and also became a prey for the authorized access. Hence, the privacy is one of the serious concern that should be addressed. Various privacy preserving in data mining (PPDM) techniques such as anonymization, perturbation, condensation and cryptographic methods are available to protect those data. In this paper, the optimization techniques such as Genetic algorithm(GA) under evolutionary method and Particle swarm optimization(PSO) under meta heuristic method have been discussed and how it plays an important part in providing more optimal results by securing those sensitive and important information from the unauthorized access.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127672540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensitivity Analysis of Polarity Control Electrically doped GaAs-InAs Tunnel Field Effect Transistor for Bio-sensing Application 极性控制电掺杂GaAs-InAs隧道场效应晶体管生物传感灵敏度分析
Dharmender, Piyush Yadav, Rashi Gupta, Shivangi Singh
In this paper, a novel III-V material-based polarity-controlled electrical doped Tunnel field effect transistor (PC- ED-GaAs-InAs-TFET) biosensor has been proposed. The N+ drain and P+ source regions are created in the intrinsic GaAs and InAs regions using the polarity-controlled concept. In addition, a nano-cavity is etched in the gate oxide towards the tunneling junction to modulate the tunneling mechanism via the immobilized biomolecules. The sensitivity of the proposed biosensor is analyzed using neutral and charged biomolecules, namely Biotin (k = 2.63), Ferro-cytochrome c (k = 4.7), Keratin (k = 8) and Gelatin (k = 12). The PC-ED-GaAs-InAs- TFET biosensor exhibits superior sensitivity in terms of drain current, threshold voltage, subthreshold swing, and $mathrm{I}_{ON}/mathrm{I}_{OFF}$ ratio. The sensitivity of the PC-ED-GaAs-InAs-TFET biosensor, in terms of various cavity dimensions (thickness and height), fill factors and the effect of temperature has also been investigated.
本文提出了一种新型的III-V材料极性控制掺杂隧道场效应晶体管(PC- ED-GaAs-InAs-TFET)生物传感器。利用极性控制的概念,在本征GaAs和InAs区域中创建了N+漏极和P+源区。此外,在通向隧道结的栅氧化物中蚀刻纳米空腔,通过固定化生物分子来调节隧道机制。利用中性和带电生物分子,即生物素(k = 2.63)、铁细胞色素c (k = 4.7)、角蛋白(k = 8)和明胶(k = 12),对所提出的生物传感器的灵敏度进行了分析。PC-ED-GaAs-InAs- TFET生物传感器在漏极电流、阈值电压、亚阈值摆幅和$ mathm {I}_{ON}/ mathm {I}_{OFF}}$比值方面表现出优异的灵敏度。本文还研究了PC-ED-GaAs-InAs-TFET生物传感器在不同腔体尺寸(厚度和高度)、填充因子和温度影响下的灵敏度。
{"title":"Sensitivity Analysis of Polarity Control Electrically doped GaAs-InAs Tunnel Field Effect Transistor for Bio-sensing Application","authors":"Dharmender, Piyush Yadav, Rashi Gupta, Shivangi Singh","doi":"10.1109/ICECCT56650.2023.10179770","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179770","url":null,"abstract":"In this paper, a novel III-V material-based polarity-controlled electrical doped Tunnel field effect transistor (PC- ED-GaAs-InAs-TFET) biosensor has been proposed. The N+ drain and P+ source regions are created in the intrinsic GaAs and InAs regions using the polarity-controlled concept. In addition, a nano-cavity is etched in the gate oxide towards the tunneling junction to modulate the tunneling mechanism via the immobilized biomolecules. The sensitivity of the proposed biosensor is analyzed using neutral and charged biomolecules, namely Biotin (k = 2.63), Ferro-cytochrome c (k = 4.7), Keratin (k = 8) and Gelatin (k = 12). The PC-ED-GaAs-InAs- TFET biosensor exhibits superior sensitivity in terms of drain current, threshold voltage, subthreshold swing, and $mathrm{I}_{ON}/mathrm{I}_{OFF}$ ratio. The sensitivity of the PC-ED-GaAs-InAs-TFET biosensor, in terms of various cavity dimensions (thickness and height), fill factors and the effect of temperature has also been investigated.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127983654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing Security and Privacy issues for Multi-Cloud Service Providers Using Nessus 分析使用Nessus的多云服务提供商的安全和隐私问题
T. Singh, Ajay Mahaputra Kumar
Cloud computing security is a broad term that covers a wide range of security and privacy issues for businesses that use multi-cloud services. The service providers must take several factors into account when addressing security for their clients, including access and identity control, in-transit, and other security factors such as confidentiality, vulnerability management, threats, and audits. This paper takes a close look at each of these areas of cloud security and shows how multi-cloud service providers can protect themselves and move forward. It also talks about the problems with protecting systems that use more than one cloud and gives ways to deal with these problems. The reader should understand all of the security concerns that come with multi-cloud setups and how to deal with them in light of the latest cyber threats. The sole motivation of this paper is to raise awareness about multi-cloud service security in different aspects and its impact. Nessus, which is a well-known security tool, has been used to find vulnerabilities and other critical security concerns. Overall, experiments have been performed on three different websites: “www.cuchd.in”, “indiapost.gov.in” and “ajaykumar.in”. Despite this, the mitigation approaches for each vulnerability are explained systematically.
云计算安全是一个广泛的术语,涵盖了使用多云服务的企业的广泛安全和隐私问题。服务提供者在为其客户处理安全问题时必须考虑几个因素,包括访问和身份控制、传输中以及其他安全因素,如机密性、漏洞管理、威胁和审计。本文将详细介绍云安全的每个领域,并展示多云服务提供商如何保护自己并向前发展。它还讨论了保护使用多个云的系统的问题,并给出了处理这些问题的方法。读者应该了解多云设置带来的所有安全问题,以及如何根据最新的网络威胁来处理这些问题。本文的唯一动机是提高人们对多云服务安全在不同方面及其影响的认识。Nessus是一个众所周知的安全工具,它被用来发现漏洞和其他关键的安全问题。总的来说,实验是在三个不同的网站上进行的:“www.cuchd.in”、“indiapost.gov.in”和“ajaykumar.in”。尽管如此,系统地解释了每个漏洞的缓解方法。
{"title":"Analyzing Security and Privacy issues for Multi-Cloud Service Providers Using Nessus","authors":"T. Singh, Ajay Mahaputra Kumar","doi":"10.1109/ICECCT56650.2023.10179727","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179727","url":null,"abstract":"Cloud computing security is a broad term that covers a wide range of security and privacy issues for businesses that use multi-cloud services. The service providers must take several factors into account when addressing security for their clients, including access and identity control, in-transit, and other security factors such as confidentiality, vulnerability management, threats, and audits. This paper takes a close look at each of these areas of cloud security and shows how multi-cloud service providers can protect themselves and move forward. It also talks about the problems with protecting systems that use more than one cloud and gives ways to deal with these problems. The reader should understand all of the security concerns that come with multi-cloud setups and how to deal with them in light of the latest cyber threats. The sole motivation of this paper is to raise awareness about multi-cloud service security in different aspects and its impact. Nessus, which is a well-known security tool, has been used to find vulnerabilities and other critical security concerns. Overall, experiments have been performed on three different websites: “www.cuchd.in”, “indiapost.gov.in” and “ajaykumar.in”. Despite this, the mitigation approaches for each vulnerability are explained systematically.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121327378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance And Security Enhanced Improved Hill Cipher 性能和安全增强改进希尔密码
Muralidharan D, B. R, Vijay Sai R, C. K
Hill cipher is one of the classical ciphers which is considered as a secured one till date apart from its vulnerability of known plaintext attack. Because of its simplicity, in recent days also it is used as one of the building block of cryptography and steganography based algorithms. Many research articles are available to minimize the known plaintext attack vulnerability of Hill cipher. One of the research works suggests to use a second key which varies exponentially with block numbers of the plaintext. Though the proposal is very simple, it is a time consuming process. Furthermore, it has some weak blocks which deteriorates the security. In this research article both issues are rectified by the inclusion of a look-up-table method. The proposed method saves power and enhances the speed by slightly compromising with area. Implementation results show that the proposed method reduces the performance complexity from O(nlogn) to O(n).
Hill密码是迄今为止被认为是安全的经典密码之一,但它存在已知的易受明文攻击的弱点。由于它的简单性,近年来它也被用作密码学和隐写术算法的构建块之一。目前已有许多研究文章对已知的Hill密码明文攻击漏洞进行了最小化。其中一项研究建议使用第二个密钥,该密钥随明文的块数呈指数级变化。虽然这个提议很简单,但它是一个耗时的过程。此外,它还存在一些薄弱的块,使其安全性降低。在这篇研究文章中,这两个问题都纠正了一个查找表的方法。该方法在减小面积的同时,节省了功耗,提高了速度。实现结果表明,该方法将性能复杂度从0 (nlogn)降低到O(n)。
{"title":"Performance And Security Enhanced Improved Hill Cipher","authors":"Muralidharan D, B. R, Vijay Sai R, C. K","doi":"10.1109/ICECCT56650.2023.10179696","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179696","url":null,"abstract":"Hill cipher is one of the classical ciphers which is considered as a secured one till date apart from its vulnerability of known plaintext attack. Because of its simplicity, in recent days also it is used as one of the building block of cryptography and steganography based algorithms. Many research articles are available to minimize the known plaintext attack vulnerability of Hill cipher. One of the research works suggests to use a second key which varies exponentially with block numbers of the plaintext. Though the proposal is very simple, it is a time consuming process. Furthermore, it has some weak blocks which deteriorates the security. In this research article both issues are rectified by the inclusion of a look-up-table method. The proposed method saves power and enhances the speed by slightly compromising with area. Implementation results show that the proposed method reduces the performance complexity from O(nlogn) to O(n).","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128531264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Approaches on Pedestrian Detection in an autonomous vehicle 自动驾驶车辆中行人检测的机器学习方法
V. Ranganayaki, Jency Rubia J, P. S. Ramesh, K. Rammohan, R.Babitha Lincy, A. Deepak
In autonomous driving, detecting pedestrians is a safety-critical activity, and the decision to avoid a person must be made as quickly as possible with as little delay as possible. In this work, INRIA and PETA datasets are taken. The progression of the work that is being proposed is broken up into three phases. The first step is to detect edges, the second step is to group colours, and the third step is extracting the feature, which includes screening body parts of pedestrians and detecting shoulder lines. The machine learning classifiers such as SVM, Naïve Bayes and KNN are taken for predicting the pedestrian in the road. The accuracy for SVM, Naïve Bayes and KNN are calculated as 93.58, 94.42 and 98.44 respectively. With the KNN model, it achieves the highest accuracy for predicting the exact images.
在自动驾驶中,探测行人是一项至关重要的安全活动,必须在尽可能短的时间内做出避开行人的决定。本研究采用INRIA和PETA数据集。所提议的工作进展分为三个阶段。第一步是边缘检测,第二步是颜色分组,第三步是特征提取,其中包括行人身体部位的筛选和肩线的检测。采用SVM、Naïve贝叶斯、KNN等机器学习分类器对道路上的行人进行预测。SVM、Naïve贝叶斯和KNN的准确率分别为93.58、94.42和98.44。使用KNN模型,它在准确预测图像方面达到了最高的精度。
{"title":"Machine Learning Approaches on Pedestrian Detection in an autonomous vehicle","authors":"V. Ranganayaki, Jency Rubia J, P. S. Ramesh, K. Rammohan, R.Babitha Lincy, A. Deepak","doi":"10.1109/ICECCT56650.2023.10179836","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179836","url":null,"abstract":"In autonomous driving, detecting pedestrians is a safety-critical activity, and the decision to avoid a person must be made as quickly as possible with as little delay as possible. In this work, INRIA and PETA datasets are taken. The progression of the work that is being proposed is broken up into three phases. The first step is to detect edges, the second step is to group colours, and the third step is extracting the feature, which includes screening body parts of pedestrians and detecting shoulder lines. The machine learning classifiers such as SVM, Naïve Bayes and KNN are taken for predicting the pedestrian in the road. The accuracy for SVM, Naïve Bayes and KNN are calculated as 93.58, 94.42 and 98.44 respectively. With the KNN model, it achieves the highest accuracy for predicting the exact images.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128607263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EEG evoked automated emotion recognition using deep convolutional neural network 脑电诱发深度卷积神经网络自动情绪识别
Abgeena Abgeena, S. Garg
As life continues to change in the digital era, it is crucial to perceive a person's emotional state. Affective computing is receiving more attention with the increase in the human-computer interface (HCI). Human emotion recognition employing electroen-cephalogram (EEG) signals has been studied to obtain a person's emotional status for different stimuli. However, it is difficult to identify clear patterns in EEG signals because they have low electrical impulses and are highly sensitive to noise. A deep convolutional neural network (DCNN) was employed in the present study to recognize emotions in EEG signals. For this purpose, a publicly available dataset, DREAMER, was utilized in this study to assess the applicability of the model for emotion classification. The dataset consisted of three-dimensional emotions, that is, valence, arousal, and dominance (VAD). 2D emotions arousal and valence were the most-recognized emotions in existing research. The present study identified the 3D emotions present in the above-mentioned dataset. In this study, raw EEG signals from the DREAMER dataset were pre-processed. Subsequently, three EEG rhythms, theta, alpha, and beta, were extracted using a bandpass filter. The power spectral density (PSD) was computed using fast Fourier transform (FFT) in the feature extraction. Finally, a 1D CNN model is applied to the classification of emotions. In addition, the performance of the proposed model was compared with two machine learning (ML) classifiers: random forest (RF) and extreme Gradient Boosting (XGBoost) classifiers. The highest accuracy (ACC) of 97.6% was obtained using the proposed model in the dominance dimension. The working principles were compared and discussed to determine the suitability of the model for emotion recognition applications.
随着数字时代生活的不断变化,感知一个人的情绪状态是至关重要的。随着人机界面(HCI)的发展,情感计算越来越受到人们的关注。研究了利用脑电图(EEG)信号进行人类情绪识别,以获取人在不同刺激下的情绪状态。然而,由于脑电图信号具有低电脉冲和对噪声高度敏感,因此很难识别出清晰的模式。本研究采用深度卷积神经网络(DCNN)对脑电信号中的情绪进行识别。为此,本研究使用了一个公开可用的数据集,dream,来评估该模型在情绪分类中的适用性。数据集由三维情绪组成,即效价、唤醒和支配(VAD)。二维情绪的唤醒和效价是现有研究中最容易识别的情绪。本研究确定了上述数据集中存在的3D情绪。在本研究中,对来自做梦者数据集的原始EEG信号进行了预处理。随后,使用带通滤波器提取三种EEG节律,theta, alpha和beta。在特征提取中,采用快速傅里叶变换(FFT)计算功率谱密度(PSD)。最后,将一维CNN模型应用于情绪分类。此外,该模型的性能与两种机器学习(ML)分类器:随机森林(RF)和极端梯度增强(XGBoost)分类器进行了比较。该模型在优势度维度上的准确率最高,达到97.6%。对工作原理进行了比较和讨论,以确定该模型在情感识别应用中的适用性。
{"title":"EEG evoked automated emotion recognition using deep convolutional neural network","authors":"Abgeena Abgeena, S. Garg","doi":"10.1109/ICECCT56650.2023.10179711","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179711","url":null,"abstract":"As life continues to change in the digital era, it is crucial to perceive a person's emotional state. Affective computing is receiving more attention with the increase in the human-computer interface (HCI). Human emotion recognition employing electroen-cephalogram (EEG) signals has been studied to obtain a person's emotional status for different stimuli. However, it is difficult to identify clear patterns in EEG signals because they have low electrical impulses and are highly sensitive to noise. A deep convolutional neural network (DCNN) was employed in the present study to recognize emotions in EEG signals. For this purpose, a publicly available dataset, DREAMER, was utilized in this study to assess the applicability of the model for emotion classification. The dataset consisted of three-dimensional emotions, that is, valence, arousal, and dominance (VAD). 2D emotions arousal and valence were the most-recognized emotions in existing research. The present study identified the 3D emotions present in the above-mentioned dataset. In this study, raw EEG signals from the DREAMER dataset were pre-processed. Subsequently, three EEG rhythms, theta, alpha, and beta, were extracted using a bandpass filter. The power spectral density (PSD) was computed using fast Fourier transform (FFT) in the feature extraction. Finally, a 1D CNN model is applied to the classification of emotions. In addition, the performance of the proposed model was compared with two machine learning (ML) classifiers: random forest (RF) and extreme Gradient Boosting (XGBoost) classifiers. The highest accuracy (ACC) of 97.6% was obtained using the proposed model in the dominance dimension. The working principles were compared and discussed to determine the suitability of the model for emotion recognition applications.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128521571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1