首页 > 最新文献

2021 International Conference on Computational Performance Evaluation (ComPE)最新文献

英文 中文
Effect of Load Switching on Induced e.m.f. of a Transformer 负载切换对变压器感应电动势的影响
Pub Date : 2021-12-01 DOI: 10.1109/ComPE53109.2021.9752120
S. Bhowmik, A. Mitra, P. Deb
In this proposed work, a mathematical model of transformer has been implemented using Simulink environment to investigate the effect of load switching on the induced e.m.f. due to the presence of leakage inductances of the windings. Estimation of the parameters on a laboratory single-phase transformer has been carried out through Open Circuit (O.C.) and Short Circuit (S.C.) tests and the transient equation for no-load current has been established. This experimental work defines the switching effect of resistive, resistive-inductive (RL) along with a power factor improvement capacitor introduced in parallel with RL load. It has been found in presence of capacitor, the inductive voltage spikes is minimized because of reactive power injection to the system.
本文利用Simulink环境建立了变压器的数学模型,研究了由于绕组存在漏电感而导致的负载切换对感应电动势的影响。通过开路和短路试验对实验室单相变压器进行了参数估计,建立了空载电流暂态方程。这项实验工作定义了电阻、电阻-电感(RL)的开关效应,以及与RL负载并联引入的功率因数改进电容器。研究发现,在电容器存在的情况下,由于向系统注入无功功率,感应电压尖峰被最小化。
{"title":"Effect of Load Switching on Induced e.m.f. of a Transformer","authors":"S. Bhowmik, A. Mitra, P. Deb","doi":"10.1109/ComPE53109.2021.9752120","DOIUrl":"https://doi.org/10.1109/ComPE53109.2021.9752120","url":null,"abstract":"In this proposed work, a mathematical model of transformer has been implemented using Simulink environment to investigate the effect of load switching on the induced e.m.f. due to the presence of leakage inductances of the windings. Estimation of the parameters on a laboratory single-phase transformer has been carried out through Open Circuit (O.C.) and Short Circuit (S.C.) tests and the transient equation for no-load current has been established. This experimental work defines the switching effect of resistive, resistive-inductive (RL) along with a power factor improvement capacitor introduced in parallel with RL load. It has been found in presence of capacitor, the inductive voltage spikes is minimized because of reactive power injection to the system.","PeriodicalId":211704,"journal":{"name":"2021 International Conference on Computational Performance Evaluation (ComPE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123406733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Roles of UAVs in IoT work-flow architecture 无人机在物联网工作流程架构中的作用
Pub Date : 2021-12-01 DOI: 10.1109/ComPE53109.2021.9751830
Abhishek Singh, A. Payal
Recent advancements in various ICT technologies and integration of machine-learning and AI have further extended the Internet of Things (IoT) perspective from ’passive system of interconnected things’ to "an active multi-agent-based system of interconnected everything". However, true realization of future IoT solutions requires addressing critical challenges including limited network coverage and resources. Unmanned Aerial Vehicles (UAVs) have recently gained significant attention due to their acute mobility, equitable operational costs, flexible deployment, and autonomous capabilities. Efforts are being made towards integrating drones in IoT as a solution to the critical challenges. In this paper, we highlighted the key expectations based on the new perspective of IoT and summarized the challenges in IoT due to its inherent nature towards contentment of those expectations. Finally, we investigated the roles of UAVs at various functional layers of IoT-workflow architecture towards addressing the critical issues and enabling key expectations in future-IoT solutions.
近年来,各种ICT技术的进步以及机器学习和人工智能的融合,进一步将物联网的视角从“被动的物联网系统”扩展到“主动的基于多智能体的万物互联系统”。然而,未来物联网解决方案的真正实现需要解决关键挑战,包括有限的网络覆盖和资源。无人机(uav)由于其灵敏的机动性、合理的运营成本、灵活的部署和自主能力,最近受到了极大的关注。人们正在努力将无人机整合到物联网中,作为应对关键挑战的解决方案。在本文中,我们强调了基于物联网新视角的关键期望,并总结了物联网因其满足这些期望的固有性质而面临的挑战。最后,我们研究了无人机在物联网工作流架构的各个功能层中的作用,以解决未来物联网解决方案中的关键问题并实现关键期望。
{"title":"Roles of UAVs in IoT work-flow architecture","authors":"Abhishek Singh, A. Payal","doi":"10.1109/ComPE53109.2021.9751830","DOIUrl":"https://doi.org/10.1109/ComPE53109.2021.9751830","url":null,"abstract":"Recent advancements in various ICT technologies and integration of machine-learning and AI have further extended the Internet of Things (IoT) perspective from ’passive system of interconnected things’ to \"an active multi-agent-based system of interconnected everything\". However, true realization of future IoT solutions requires addressing critical challenges including limited network coverage and resources. Unmanned Aerial Vehicles (UAVs) have recently gained significant attention due to their acute mobility, equitable operational costs, flexible deployment, and autonomous capabilities. Efforts are being made towards integrating drones in IoT as a solution to the critical challenges. In this paper, we highlighted the key expectations based on the new perspective of IoT and summarized the challenges in IoT due to its inherent nature towards contentment of those expectations. Finally, we investigated the roles of UAVs at various functional layers of IoT-workflow architecture towards addressing the critical issues and enabling key expectations in future-IoT solutions.","PeriodicalId":211704,"journal":{"name":"2021 International Conference on Computational Performance Evaluation (ComPE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123925361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Speed Control of Brushless Doubly-fed Reluctance Generator under MTPIA and UPPF Conditions for Wind Power Application 风电无刷双馈磁阻发电机在MTPIA和upppf条件下的转速控制
Pub Date : 2021-12-01 DOI: 10.1109/ComPE53109.2021.9751877
M. Kumar, S. Das
Two specific conditions, such as maximum torque per inverter ampere (MTPIA) and unity primary power factor (UPPF) are considered in the present work for a comparative performance analysis while speed control of brushless doubly-fed reluctance generator (BDFRG) using primary field-oriented control (PFOC). The study is based on the active power, reactive power, and power factor of both the stator windings of BDFRG in super-synchronous, synchronous, and sub-synchronous speed zones. The study also deals with the assessment of the minimum rating of the inverter required in both the conditions for successful operations. The relevant studies are done in MATLAB/Simulink. The prima facie objective of the present work is to affirm the candidature of BDFRG in wind power generation.
本文考虑了单位逆变器安培最大转矩(MTPIA)和单位一次功率因数(UPPF)两个特定条件,对采用一次磁场定向控制(PFOC)控制无刷双馈磁阻发电机(BDFRG)速度的性能进行了比较分析。本研究基于BDFRG定子绕组在超同步、同步和次同步速度区的有功功率、无功功率和功率因数。该研究还涉及在两种条件下成功运行所需的逆变器的最小额定值的评估。相关研究在MATLAB/Simulink中完成。本研究的主要目的是确认BDFRG在风力发电中的候选性。
{"title":"Speed Control of Brushless Doubly-fed Reluctance Generator under MTPIA and UPPF Conditions for Wind Power Application","authors":"M. Kumar, S. Das","doi":"10.1109/ComPE53109.2021.9751877","DOIUrl":"https://doi.org/10.1109/ComPE53109.2021.9751877","url":null,"abstract":"Two specific conditions, such as maximum torque per inverter ampere (MTPIA) and unity primary power factor (UPPF) are considered in the present work for a comparative performance analysis while speed control of brushless doubly-fed reluctance generator (BDFRG) using primary field-oriented control (PFOC). The study is based on the active power, reactive power, and power factor of both the stator windings of BDFRG in super-synchronous, synchronous, and sub-synchronous speed zones. The study also deals with the assessment of the minimum rating of the inverter required in both the conditions for successful operations. The relevant studies are done in MATLAB/Simulink. The prima facie objective of the present work is to affirm the candidature of BDFRG in wind power generation.","PeriodicalId":211704,"journal":{"name":"2021 International Conference on Computational Performance Evaluation (ComPE)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128373502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep learning offering resilience from trending cyber-attacks, a review 深度学习提供抵御网络攻击的能力
Pub Date : 2021-12-01 DOI: 10.1109/ComPE53109.2021.9752099
S. Khanday, Hoor Fatima, N. Rakesh
During the Covid-19 pandemic world has witnessed the rise of cyber-attacks, especially during the Lockdown time course announced by the countries throughout the world, when almost every aspect of life changed the routine from offline to online. Protecting and securing information resources during pandemics has been a top priority for the modern computing world, with databases, banking, E-commerce and mailing services, etc. being the eye-catching credentials to the attackers. Apart from cryptography, machine learning and deep learning can offer an enormous amount of help in testing, training, and extracting negligible information from the data sets. Deep learning and machine learning have many methods and models in the account to detect and classify the different versions of cyber-attacks occasionally, from the datasets. Some of the most common deep learning methods inspired by the neural networks are Recurrent Neural Networks, Convolutional Neural Networks, Deep Belief Networks, Deep Boltzman Networks, Autoencoders, and Stacked Auto-encoders. Also counting machine learning algorithms into the account, there is a vast variety of algorithms that are meant to perform classification and regression. The survey will provide some of the most important deep learning and machine learning architectures used for Cyber-security and can offer protective services against cyber-attacks. The paper is a survey about various categories of cyber-attacks with a timeline of different attacks that took place in India and some of the other countries in the world. The final section of the report is about what deep learning methods can offer for developing and improving the security policies and examining vulnerabilities of an information system.
在2019冠状病毒病大流行期间,世界目睹了网络攻击的增加,特别是在世界各国宣布的封锁期间,几乎生活的各个方面都从线下转向线上。在大流行期间保护和保护信息资源一直是现代计算世界的首要任务,数据库、银行、电子商务和邮件服务等是攻击者最引人注目的凭据。除了密码学,机器学习和深度学习可以在测试、训练和从数据集中提取可忽略不计的信息方面提供大量帮助。深度学习和机器学习有许多方法和模型,可以偶尔从数据集中检测和分类不同版本的网络攻击。受神经网络启发的一些最常见的深度学习方法是循环神经网络、卷积神经网络、深度信念网络、深度玻尔兹曼网络、自编码器和堆叠自编码器。再算上机器学习算法,还有各种各样的算法用来执行分类和回归。该调查将提供一些用于网络安全的最重要的深度学习和机器学习架构,并可以提供针对网络攻击的保护服务。这篇论文是一篇关于各种类型的网络攻击的调查,并给出了发生在印度和世界上其他一些国家的不同攻击的时间轴。报告的最后一部分是关于深度学习方法可以为开发和改进安全策略以及检查信息系统的漏洞提供什么。
{"title":"Deep learning offering resilience from trending cyber-attacks, a review","authors":"S. Khanday, Hoor Fatima, N. Rakesh","doi":"10.1109/ComPE53109.2021.9752099","DOIUrl":"https://doi.org/10.1109/ComPE53109.2021.9752099","url":null,"abstract":"During the Covid-19 pandemic world has witnessed the rise of cyber-attacks, especially during the Lockdown time course announced by the countries throughout the world, when almost every aspect of life changed the routine from offline to online. Protecting and securing information resources during pandemics has been a top priority for the modern computing world, with databases, banking, E-commerce and mailing services, etc. being the eye-catching credentials to the attackers. Apart from cryptography, machine learning and deep learning can offer an enormous amount of help in testing, training, and extracting negligible information from the data sets. Deep learning and machine learning have many methods and models in the account to detect and classify the different versions of cyber-attacks occasionally, from the datasets. Some of the most common deep learning methods inspired by the neural networks are Recurrent Neural Networks, Convolutional Neural Networks, Deep Belief Networks, Deep Boltzman Networks, Autoencoders, and Stacked Auto-encoders. Also counting machine learning algorithms into the account, there is a vast variety of algorithms that are meant to perform classification and regression. The survey will provide some of the most important deep learning and machine learning architectures used for Cyber-security and can offer protective services against cyber-attacks. The paper is a survey about various categories of cyber-attacks with a timeline of different attacks that took place in India and some of the other countries in the world. The final section of the report is about what deep learning methods can offer for developing and improving the security policies and examining vulnerabilities of an information system.","PeriodicalId":211704,"journal":{"name":"2021 International Conference on Computational Performance Evaluation (ComPE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130402739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exudate Detection with Improved U-Net Using Fundus Images 基于眼底图像的改进U-Net渗出物检测
Pub Date : 2021-12-01 DOI: 10.1109/ComPE53109.2021.9752239
N. Mohan, R. Murugan, Tripti Goel, Parthapratim Roy
Diabetic retinopathy (DR) is a chronic disease leading cause of blindness. One of the primary symptoms of DR is exudates (EX). The EX is a condition in which proteins, lipids, water leaked to retinal areas causes vision impairment. The two types of EX are hard EX and soft EX based on their appearance and leakage consistency. Early intervention of DR diminishes the likelihood of vision loss. Therefore, an automated technique is required. We present a novel U-Net model that detects both soft and hard EX in this paper. The proposed model is implemented in two stages. Preprocessing of fundus images is included in the first. The custom residual blocks-based designed network is the second phase. The model is tested on two benchmark databases available publicly IDRiD and e-Ophtha. The results achieved using the proposed approach are better than other approaches.
糖尿病视网膜病变(DR)是一种导致失明的慢性疾病。DR的主要症状之一是渗出物(EX)。EX是一种蛋白质、脂质和水泄漏到视网膜区域导致视力受损的疾病。根据外型和泄漏稠度的不同,可分为硬外型和软外型。早期干预DR可降低视力丧失的可能性。因此,需要一种自动化技术。本文提出了一种新的U-Net模型,可以同时检测软、硬EX。该模型分两个阶段实现。首先对眼底图像进行预处理。基于自定义剩余块的设计网络是第二阶段。该模型在IDRiD和e-Ophtha两个公开的基准数据库上进行了测试。使用该方法获得的结果优于其他方法。
{"title":"Exudate Detection with Improved U-Net Using Fundus Images","authors":"N. Mohan, R. Murugan, Tripti Goel, Parthapratim Roy","doi":"10.1109/ComPE53109.2021.9752239","DOIUrl":"https://doi.org/10.1109/ComPE53109.2021.9752239","url":null,"abstract":"Diabetic retinopathy (DR) is a chronic disease leading cause of blindness. One of the primary symptoms of DR is exudates (EX). The EX is a condition in which proteins, lipids, water leaked to retinal areas causes vision impairment. The two types of EX are hard EX and soft EX based on their appearance and leakage consistency. Early intervention of DR diminishes the likelihood of vision loss. Therefore, an automated technique is required. We present a novel U-Net model that detects both soft and hard EX in this paper. The proposed model is implemented in two stages. Preprocessing of fundus images is included in the first. The custom residual blocks-based designed network is the second phase. The model is tested on two benchmark databases available publicly IDRiD and e-Ophtha. The results achieved using the proposed approach are better than other approaches.","PeriodicalId":211704,"journal":{"name":"2021 International Conference on Computational Performance Evaluation (ComPE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128754052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Multiplayer Shooting Game Based Simulation For Defence Training 基于模拟防御训练的多人射击游戏
Pub Date : 2021-12-01 DOI: 10.1109/ComPE53109.2021.9752429
Pawan Jindal, V. Khemchandani, Sushil Chandra, Vishal Pandey
Creating environments and dangerous scenarios for physical training is very difficult and has a very high cost in terms of money and men’s power.Virtual Reality is a technology that simulates real-life experiences and allows people to don their own cyber avatars in a virtual world and interact with it like they would in the real world. The application of VR technology in the defence paradigm is to make trainees and officers better at using equipment, navigating a mode of transport, gaining experience of potential combat situations, medical training and more. One of the advantages of VR training in defence is that it offers the functionality to immerse users in a virtual yet safe world.Our immersive system provides an intuitive way for the users to interact with the VR or AR world by physically moving around the real world and aiming freely with tangible objects. This encourages physical interaction between the players as they compete or collaborate with other players. We present a new immersive multiplayer simulation game developed for defence training. We developed three game environments which are Combat situation, Bomb defusal, and Hostage rescue, and players can see their performance based on previously played games.
为体育训练创造环境和危险的场景是非常困难的,而且在金钱和人力方面的成本非常高。虚拟现实是一种模拟现实生活体验的技术,允许人们在虚拟世界中扮演自己的网络化身,并像在现实世界中一样与之互动。虚拟现实技术在国防范例中的应用是为了使受训人员和军官更好地使用设备,导航运输模式,获得潜在战斗情况的经验,医疗训练等等。虚拟现实防御训练的优势之一是,它提供了将用户沉浸在虚拟但安全的世界中的功能。我们的沉浸式系统为用户提供了一种直观的方式,通过在现实世界中移动,自由瞄准有形物体,与VR或AR世界进行交互。这鼓励玩家在与其他玩家竞争或合作时进行身体互动。我们提出了一个新的沉浸式多人模拟游戏开发防御训练。我们开发了三个游戏环境,分别是战斗情境、拆除炸弹和解救人质,玩家可以根据之前玩过的游戏来判断自己的表现。
{"title":"A Multiplayer Shooting Game Based Simulation For Defence Training","authors":"Pawan Jindal, V. Khemchandani, Sushil Chandra, Vishal Pandey","doi":"10.1109/ComPE53109.2021.9752429","DOIUrl":"https://doi.org/10.1109/ComPE53109.2021.9752429","url":null,"abstract":"Creating environments and dangerous scenarios for physical training is very difficult and has a very high cost in terms of money and men’s power.Virtual Reality is a technology that simulates real-life experiences and allows people to don their own cyber avatars in a virtual world and interact with it like they would in the real world. The application of VR technology in the defence paradigm is to make trainees and officers better at using equipment, navigating a mode of transport, gaining experience of potential combat situations, medical training and more. One of the advantages of VR training in defence is that it offers the functionality to immerse users in a virtual yet safe world.Our immersive system provides an intuitive way for the users to interact with the VR or AR world by physically moving around the real world and aiming freely with tangible objects. This encourages physical interaction between the players as they compete or collaborate with other players. We present a new immersive multiplayer simulation game developed for defence training. We developed three game environments which are Combat situation, Bomb defusal, and Hostage rescue, and players can see their performance based on previously played games.","PeriodicalId":211704,"journal":{"name":"2021 International Conference on Computational Performance Evaluation (ComPE)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126001107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Graph Based Extractive News Articles Summarization Approach leveraging Static Word Embeddings 利用静态词嵌入的基于图的新闻文章摘要提取方法
Pub Date : 2021-12-01 DOI: 10.1109/ComPE53109.2021.9752056
Utpal Barman, Vishal Barman, Mustafizur Rahman, Nawaz Khan Choudhury
With enormous and voluminous data being generated on a regular basis at an exponential speed, there is a demanding need for concise and relevant information to be available for the masses. Traditionally, lengthy textual contents are manually summarized by Linguists or Domain Experts, which are highly time consuming and unfairly biased. There is a dire need for Automatic Text Summarization approaches to be introduced in this broad spectrum. Extractive Summarization is one such approach where the salient information or excerpts are identified from a source and extracted to generate a concise summary. TextRank is an unsupervised extractive summarization technique incorporating graph-based ranking of extracted texts and finding the most relevant excerpts to generate a concise summary. In this paper, the prospects of a domain agnostic algorithm like TextRank for various domains of News Article Summarization are explored, exploring its efficiency in domain specific tasks and conveniently drawing various insights. NLP based pre-processing approaches and Static Word Embeddings were leveraged with semantic cosine similarity for the efficient ranking of textual data and performance evaluation on various domains of BBC News Articles Summarization datasets through ROUGE metrics. A commendable ROUGE score is achieved.
由于大量的数据正以指数级的速度定期产生,因此迫切需要为大众提供简明和相关的信息。传统上,冗长的文本内容是由语言学家或领域专家手动总结的,这既耗时又不公平。在这个广泛的范围内,迫切需要引入自动文本摘要方法。摘要摘要就是这样一种方法,从一个来源中识别出重要的信息或摘录,并从中提取出一个简明的摘要。TextRank是一种无监督的摘录摘要技术,结合了基于图的摘录文本排序,并找到最相关的摘录以生成简洁的摘要。本文探讨了面向新闻文章摘要各个领域的TextRank等领域不可知算法的发展前景,探索了其在特定领域任务中的效率,并方便地得出各种见解。利用基于自然语言处理的预处理方法和静态词嵌入的语义余弦相似度,通过ROUGE指标对BBC新闻文章摘要数据集的各个领域进行有效的文本数据排序和性能评估。达到了值得称赞的ROUGE分数。
{"title":"Graph Based Extractive News Articles Summarization Approach leveraging Static Word Embeddings","authors":"Utpal Barman, Vishal Barman, Mustafizur Rahman, Nawaz Khan Choudhury","doi":"10.1109/ComPE53109.2021.9752056","DOIUrl":"https://doi.org/10.1109/ComPE53109.2021.9752056","url":null,"abstract":"With enormous and voluminous data being generated on a regular basis at an exponential speed, there is a demanding need for concise and relevant information to be available for the masses. Traditionally, lengthy textual contents are manually summarized by Linguists or Domain Experts, which are highly time consuming and unfairly biased. There is a dire need for Automatic Text Summarization approaches to be introduced in this broad spectrum. Extractive Summarization is one such approach where the salient information or excerpts are identified from a source and extracted to generate a concise summary. TextRank is an unsupervised extractive summarization technique incorporating graph-based ranking of extracted texts and finding the most relevant excerpts to generate a concise summary. In this paper, the prospects of a domain agnostic algorithm like TextRank for various domains of News Article Summarization are explored, exploring its efficiency in domain specific tasks and conveniently drawing various insights. NLP based pre-processing approaches and Static Word Embeddings were leveraged with semantic cosine similarity for the efficient ranking of textual data and performance evaluation on various domains of BBC News Articles Summarization datasets through ROUGE metrics. A commendable ROUGE score is achieved.","PeriodicalId":211704,"journal":{"name":"2021 International Conference on Computational Performance Evaluation (ComPE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127256057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Combined Frequency and Voltage Control of a Deregulated Hydro-Thermal Power System employing FA based Industrial Controller 基于FA的工业控制器对无调节水火发电系统的频压联合控制
Pub Date : 2021-12-01 DOI: 10.1109/ComPE53109.2021.9752331
Pachunoori Anusha, Sanjib Patra, Ayanava Roy, D. Saha
This technical write-up emphasizes on combined regulation of frequency - voltage in a restructured renewable energy integrated power system under PoolCo and bilateral transactions. A two area coordinated modeling of area load frequency control (ALFC) and automatic voltage regulator (AVR) is carried out in presence of thermal, hydro, systems. Non linearities are incorporated to get a realistic insight with scheduled delay, rate constraint, and dead band. A powerful algorithm namely Firefly Algorithm based Industrial controllers serve the purpose of classical controller as Secondary control in the considered two area power system. Selection of best secondary controller among integral (I), proportional-integral (PI) and proportional-integral - derivative (PID) controller is carried out based on a fair comparison under Pool Co Transaction Scenario. PID controller serves better. Further investigations are carried out with excitation in AVR loop along with step load perturbation at ALFC in both control areas. PID outperforms I and PI in stabilizing the system responses such as frequency deviation, tie-power deviation and voltage deviations.
这篇技术文章强调了在PoolCo和双边交易下重组可再生能源综合电力系统的频率-电压联合调节。针对热力、水电系统,建立了区域负荷频率控制(ALFC)和自动电压调节(AVR)的两区域协调模型。非线性的加入,以获得实际的洞察调度延迟,速率约束和死区。基于萤火虫算法的工业控制器是一种功能强大的算法,在考虑的两区电力系统中起到了经典控制器作为二次控制的作用。在Pool Co交易场景下,通过公平比较,从积分(I)、比例积分(PI)和比例积分微分(PID)控制器中选择最佳二级控制器。PID控制器效果更好。进一步的研究是在AVR回路中进行激励,并在两个控制区的ALFC处进行阶跃负载摄动。PID在稳定频率偏差、功率偏差、电压偏差等系统响应方面优于I和PI。
{"title":"Combined Frequency and Voltage Control of a Deregulated Hydro-Thermal Power System employing FA based Industrial Controller","authors":"Pachunoori Anusha, Sanjib Patra, Ayanava Roy, D. Saha","doi":"10.1109/ComPE53109.2021.9752331","DOIUrl":"https://doi.org/10.1109/ComPE53109.2021.9752331","url":null,"abstract":"This technical write-up emphasizes on combined regulation of frequency - voltage in a restructured renewable energy integrated power system under PoolCo and bilateral transactions. A two area coordinated modeling of area load frequency control (ALFC) and automatic voltage regulator (AVR) is carried out in presence of thermal, hydro, systems. Non linearities are incorporated to get a realistic insight with scheduled delay, rate constraint, and dead band. A powerful algorithm namely Firefly Algorithm based Industrial controllers serve the purpose of classical controller as Secondary control in the considered two area power system. Selection of best secondary controller among integral (I), proportional-integral (PI) and proportional-integral - derivative (PID) controller is carried out based on a fair comparison under Pool Co Transaction Scenario. PID controller serves better. Further investigations are carried out with excitation in AVR loop along with step load perturbation at ALFC in both control areas. PID outperforms I and PI in stabilizing the system responses such as frequency deviation, tie-power deviation and voltage deviations.","PeriodicalId":211704,"journal":{"name":"2021 International Conference on Computational Performance Evaluation (ComPE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126642870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Image Translation using Generative Adversarial Networks for Smoke Detection 生成对抗网络对烟雾检测图像翻译的影响
Pub Date : 2021-12-01 DOI: 10.1109/ComPE53109.2021.9751797
Atharva Bankar, Rishabh Shinde, S. Bhingarkar
Computer vision is a top-tier domain of the technological world that is responsible for automating the visual systems from healthcare to self-driving vehicles. With a reputation for surpassing human intelligence, it can be implemented in various trigger systems like wildfire smoke detection where the emission of smoke as a result of wildfire is fairly unpredictable.Low contrast and brightness have a detrimental effect on computer vision tasks. We present a novel approach to detect forest wildfire smoke, using image translation for converting nighttime images to day time which eliminates the confusion between smoke, cloud, and fog. This translation aids the YOLOv5 object detection algorithm to detect the smoke with the same aptness irrespective of time and lighting conditions. This paper demonstrates that the object detection model performs better on the images translated to day time with a better confidence score as compared to the corresponding nighttime images.
计算机视觉是技术领域的顶级领域,负责从医疗保健到自动驾驶汽车的视觉系统自动化。凭借超越人类智能的声誉,它可以在各种触发系统中实施,例如野火烟雾探测,其中由于野火而产生的烟雾是相当不可预测的。低对比度和亮度对计算机视觉任务有不利影响。我们提出了一种检测森林野火烟雾的新方法,使用图像转换将夜间图像转换为白天图像,从而消除了烟雾,云和雾之间的混淆。这种转换有助于YOLOv5物体检测算法在任何时间和光照条件下都能同样准确地检测烟雾。本文证明,与相应的夜间图像相比,目标检测模型在转换为白天的图像上表现更好,置信度得分更高。
{"title":"Impact of Image Translation using Generative Adversarial Networks for Smoke Detection","authors":"Atharva Bankar, Rishabh Shinde, S. Bhingarkar","doi":"10.1109/ComPE53109.2021.9751797","DOIUrl":"https://doi.org/10.1109/ComPE53109.2021.9751797","url":null,"abstract":"Computer vision is a top-tier domain of the technological world that is responsible for automating the visual systems from healthcare to self-driving vehicles. With a reputation for surpassing human intelligence, it can be implemented in various trigger systems like wildfire smoke detection where the emission of smoke as a result of wildfire is fairly unpredictable.Low contrast and brightness have a detrimental effect on computer vision tasks. We present a novel approach to detect forest wildfire smoke, using image translation for converting nighttime images to day time which eliminates the confusion between smoke, cloud, and fog. This translation aids the YOLOv5 object detection algorithm to detect the smoke with the same aptness irrespective of time and lighting conditions. This paper demonstrates that the object detection model performs better on the images translated to day time with a better confidence score as compared to the corresponding nighttime images.","PeriodicalId":211704,"journal":{"name":"2021 International Conference on Computational Performance Evaluation (ComPE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122767258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Early Mortality Risk Prediction in Covid-19 Patients Using an Ensemble of Machine Learning Models 基于机器学习模型集合的Covid-19患者早期死亡风险预测
Pub Date : 2021-12-01 DOI: 10.1109/ComPE53109.2021.9751945
Harsh Walia, J. S.
COVID-19, which is subsequently named as SARS-CoV-2, First Human case was found in the City of Wuhan, from China, in Dec 2019. After that, the World health organization (WHO) has declared Coronavirus as a Pandemic on 11th March 2020. In this study, our primary aim is to Detect the Severe Covid-19 patient in the Early Stages by looking at the information on admission laboratory values, demographics, comorbidities, admission medications, admission supplementary oxygen orders, discharge, and mortality. 4711 patient’s dataset with confirmed SARS-CoV-2 infections are included in the study. Each Patient has total of 85 Features in the Dataset. So, we have Filtered the Top Best 35 features out of 85 features from the Dataset using the seven different feature Selection algorithm and taken the most common features out from the different feature Selection algorithm. After selecting the top most essential features, we have applied around 17 different kinds of ML models like Linear Regression, Logistic regression, SVM, LinearSVC, MLP-Classifier, Decision Tree Classifier, Gradient Boosting Classifier, AdaBoost, Random Forest, XGBoost, LightGBM Classifier, Ridge Classifier, Bagging Classifier, ExtraTreeClassifier, KNN, Naive Bayes, Neural network with Keras, and finally, a Voting Classifier which is the ensemble of all the Top Models from the above-mentioned Models. Finally, all Models are Compared on the basis of Area under the receiver operating characteristic (AUC) & get the best AUC as 0.89.
COVID-19,后来被命名为SARS-CoV-2,于2019年12月在中国武汉市发现了首例人类病例。此后,世界卫生组织(世卫组织)于2020年3月11日宣布冠状病毒为大流行。在这项研究中,我们的主要目的是通过查看入院实验室值、人口统计学、合并症、入院药物、入院补充氧单、出院和死亡率等信息,在早期发现重症Covid-19患者。4711例确诊的SARS-CoV-2感染患者的数据集被纳入研究。每个患者在数据集中共有85个特征。因此,我们使用七种不同的特征选择算法从数据集中的85个特征中筛选出了最好的35个特征,并从不同的特征选择算法中提取了最常见的特征。在选择了最重要的特征后,我们应用了大约17种不同的ML模型,如线性回归,逻辑回归,SVM,线性svc, mlp分类器,决策树分类器,梯度增强分类器,AdaBoost,随机森林,XGBoost, LightGBM分类器,Ridge分类器,Bagging分类器,extratreecclassifier, KNN,朴素贝叶斯,神经网络与Keras,最后,一个投票分类器,它是上述模型中所有顶级模型的集合。最后,根据接收机工作特性下面积(Area under the receiver operating characteristic, AUC)对各模型进行比较,得到最佳AUC为0.89。
{"title":"Early Mortality Risk Prediction in Covid-19 Patients Using an Ensemble of Machine Learning Models","authors":"Harsh Walia, J. S.","doi":"10.1109/ComPE53109.2021.9751945","DOIUrl":"https://doi.org/10.1109/ComPE53109.2021.9751945","url":null,"abstract":"COVID-19, which is subsequently named as SARS-CoV-2, First Human case was found in the City of Wuhan, from China, in Dec 2019. After that, the World health organization (WHO) has declared Coronavirus as a Pandemic on 11th March 2020. In this study, our primary aim is to Detect the Severe Covid-19 patient in the Early Stages by looking at the information on admission laboratory values, demographics, comorbidities, admission medications, admission supplementary oxygen orders, discharge, and mortality. 4711 patient’s dataset with confirmed SARS-CoV-2 infections are included in the study. Each Patient has total of 85 Features in the Dataset. So, we have Filtered the Top Best 35 features out of 85 features from the Dataset using the seven different feature Selection algorithm and taken the most common features out from the different feature Selection algorithm. After selecting the top most essential features, we have applied around 17 different kinds of ML models like Linear Regression, Logistic regression, SVM, LinearSVC, MLP-Classifier, Decision Tree Classifier, Gradient Boosting Classifier, AdaBoost, Random Forest, XGBoost, LightGBM Classifier, Ridge Classifier, Bagging Classifier, ExtraTreeClassifier, KNN, Naive Bayes, Neural network with Keras, and finally, a Voting Classifier which is the ensemble of all the Top Models from the above-mentioned Models. Finally, all Models are Compared on the basis of Area under the receiver operating characteristic (AUC) & get the best AUC as 0.89.","PeriodicalId":211704,"journal":{"name":"2021 International Conference on Computational Performance Evaluation (ComPE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129590183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2021 International Conference on Computational Performance Evaluation (ComPE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1