首页 > 最新文献

2021 Innovations in Power and Advanced Computing Technologies (i-PACT)最新文献

英文 中文
Decentralized Secure Personal Health Record Monitoring System using Blockchain 使用区块链的分散安全个人健康记录监控系统
Pub Date : 2021-11-27 DOI: 10.1109/i-PACT52855.2021.9696931
A. V. Ramana, B. Kumar
Design of security systems for Personal Health Record (PHR) continuous to remain an active research area. Machine Learning and Big data on health care are used for prediction of data or diseases. But there is no traditional system which id used to secure the data and provide emergency access in emergency conditions. PHR is a private and secure record of any individual through which an individual could access, manage and share his/her health data. In hospital management systems, there is an opportunity of sharing PHRs by the hospitals, doctors or workers for his/her private profit so there is no secure record management for restricting the unauthorized access to providing details in emergency circumstances for accessing his/her PHR. The major goal of this project is to provide security to clinical data by a secure record management ledger and provide different levels of abstraction with limited access permissions using some granular access rules on smart contracts on PHR using blockchain. For emergency access we gave some permissioned access rules to the PHR dependent on emergency PHR information that patient can control access for the record using grant and revoke permissions to any doctor. We analyse the proposed framework's overall performance using Hyperledger fabric which is permissioned block chain dependent on security, privacy and accessibility and response time.
个人健康档案(PHR)安全系统的设计一直是一个活跃的研究领域。医疗保健领域的机器学习和大数据用于预测数据或疾病。但是,目前还没有传统的系统来保护数据,并在紧急情况下提供应急访问。PHR是任何个人的私人和安全记录,个人可以通过它访问、管理和分享他/她的健康数据。在医院管理系统中,医院、医生或工作人员有机会为了自己的私人利益而共享医疗记录,因此没有安全的记录管理来限制未经授权的访问,以便在紧急情况下提供详细信息以访问他/她的医疗记录。该项目的主要目标是通过安全的记录管理分类账为临床数据提供安全性,并在使用区块链的PHR智能合约上使用一些粒度访问规则提供不同级别的抽象和有限的访问权限。对于紧急访问,我们根据紧急PHR信息向PHR提供了一些允许的访问规则,患者可以使用授予和撤销对任何医生的权限来控制对记录的访问。我们使用基于安全性、隐私性、可访问性和响应时间的许可区块链Hyperledger fabric来分析所提出的框架的整体性能。
{"title":"Decentralized Secure Personal Health Record Monitoring System using Blockchain","authors":"A. V. Ramana, B. Kumar","doi":"10.1109/i-PACT52855.2021.9696931","DOIUrl":"https://doi.org/10.1109/i-PACT52855.2021.9696931","url":null,"abstract":"Design of security systems for Personal Health Record (PHR) continuous to remain an active research area. Machine Learning and Big data on health care are used for prediction of data or diseases. But there is no traditional system which id used to secure the data and provide emergency access in emergency conditions. PHR is a private and secure record of any individual through which an individual could access, manage and share his/her health data. In hospital management systems, there is an opportunity of sharing PHRs by the hospitals, doctors or workers for his/her private profit so there is no secure record management for restricting the unauthorized access to providing details in emergency circumstances for accessing his/her PHR. The major goal of this project is to provide security to clinical data by a secure record management ledger and provide different levels of abstraction with limited access permissions using some granular access rules on smart contracts on PHR using blockchain. For emergency access we gave some permissioned access rules to the PHR dependent on emergency PHR information that patient can control access for the record using grant and revoke permissions to any doctor. We analyse the proposed framework's overall performance using Hyperledger fabric which is permissioned block chain dependent on security, privacy and accessibility and response time.","PeriodicalId":335956,"journal":{"name":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121722755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
P&O MPPT Integrated PV Fed 15-Level Multi-Level Inverter P&O MPPT集成光伏馈电15级多电平逆变器
Pub Date : 2021-11-27 DOI: 10.1109/i-PACT52855.2021.9696580
P. Prasad, C. Dhanamjayulu
The Multi-Level Inverter is an essential device in renewable energy source applications for generating the high synthesized levels of output voltage at required quantity even though with help of low or medium voltage DC sources. Due to running out of non-renewable sources, these Multi-Level Inverters are playing the crucial role in modern DC to AC conversion systems for making renewable energy sources as alternative for non-renewable energy sources. These Multi Level Inverter mainly facing challenging consequences of Total Harmonic Distortions, switching losses and less efficiency, and these consequences has to overcome for developing reliable Multi-Level Inverter. In this paper a 15-Level Multi-Level Inverter topology is designed with renewable energy source application. In this methodology PV with P&O MPPT technique is used to fed the 15-Level Multi-Level Inverter. Due to improvised MPPT technique and pulses to the switches will implies to get smooth output voltage with less harmonic distortions. The switching losses are also less for this topology because of less switches are used, that causes less power losses and makes high overall efficiency. The proposed methodology with 15-Level Multi-Level Inverter is designed, simulated by using MATLAB/Simulink software and compared with existing MLI topologies. The simulation results will justify that the designed Multi-Level Inverter is reliable and efficient.
多级逆变器是可再生能源应用中必不可少的设备,即使在低压或中压直流电源的帮助下也能产生所需数量的高合成输出电压。由于不可再生能源的枯竭,这些多级逆变器在现代直流到交流转换系统中发挥着至关重要的作用,使可再生能源成为不可再生能源的替代品。多电平逆变器主要面临总谐波失真、开关损耗和效率低等问题,这些问题是开发可靠的多电平逆变器所必须克服的。本文设计了一种应用于可再生能源的15电平多电平逆变器拓扑结构。在该方法中,采用P&O - MPPT技术为15电平多电平逆变器供电。由于临时MPPT技术和脉冲开关将意味着得到平滑的输出电压和更小的谐波畸变。该拓扑的开关损耗也更小,因为使用的开关更少,导致的功率损耗更小,整体效率更高。采用MATLAB/Simulink软件对该方法进行了仿真,并与现有的多电平逆变器拓扑结构进行了比较。仿真结果证明了所设计的多级逆变器的可靠性和有效性。
{"title":"P&O MPPT Integrated PV Fed 15-Level Multi-Level Inverter","authors":"P. Prasad, C. Dhanamjayulu","doi":"10.1109/i-PACT52855.2021.9696580","DOIUrl":"https://doi.org/10.1109/i-PACT52855.2021.9696580","url":null,"abstract":"The Multi-Level Inverter is an essential device in renewable energy source applications for generating the high synthesized levels of output voltage at required quantity even though with help of low or medium voltage DC sources. Due to running out of non-renewable sources, these Multi-Level Inverters are playing the crucial role in modern DC to AC conversion systems for making renewable energy sources as alternative for non-renewable energy sources. These Multi Level Inverter mainly facing challenging consequences of Total Harmonic Distortions, switching losses and less efficiency, and these consequences has to overcome for developing reliable Multi-Level Inverter. In this paper a 15-Level Multi-Level Inverter topology is designed with renewable energy source application. In this methodology PV with P&O MPPT technique is used to fed the 15-Level Multi-Level Inverter. Due to improvised MPPT technique and pulses to the switches will implies to get smooth output voltage with less harmonic distortions. The switching losses are also less for this topology because of less switches are used, that causes less power losses and makes high overall efficiency. The proposed methodology with 15-Level Multi-Level Inverter is designed, simulated by using MATLAB/Simulink software and compared with existing MLI topologies. The simulation results will justify that the designed Multi-Level Inverter is reliable and efficient.","PeriodicalId":335956,"journal":{"name":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"1189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132060128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Identification System Simulator for Marine Applications 船用自动识别系统模拟器
Pub Date : 2021-11-27 DOI: 10.1109/i-PACT52855.2021.9696971
Naumi Krishna K Panicker, Nidhi Mittal, J. Qumar, D. Saravanan, J. Valarmathi
The Automatic Identification System (AIS) is one of the most successful maritime technologies which allows ships to autonomously communicate their positions and movements with one another, thereby playing a crucial role in collision avoidance. AIS is essentially a communication system that identifies and exchanges information such as the MMSI (Maritime Mobile Service Identities) number, navigation status, rate of turn, speed over ground, course, position, and etc with other maritime vessels and base stations. This paper aims at the development and implementation of a simulator that simulates AIS communication based on AIS standards, i.e., capturing the necessary AIS messages and displaying them on the chart plotters or live maps.
自动识别系统(AIS)是最成功的海事技术之一,它使船舶能够自主地相互通信其位置和运动,从而在避免碰撞中发挥关键作用。AIS本质上是一个通信系统,它识别和交换信息,如MMSI(海上移动服务标识)号码、导航状态、转弯速度、对地速度、航向、位置等,与其他海上船只和基站。本文旨在开发和实现一个基于AIS标准模拟AIS通信的模拟器,即捕获必要的AIS信息并将其显示在海图绘图仪或实时地图上。
{"title":"Automatic Identification System Simulator for Marine Applications","authors":"Naumi Krishna K Panicker, Nidhi Mittal, J. Qumar, D. Saravanan, J. Valarmathi","doi":"10.1109/i-PACT52855.2021.9696971","DOIUrl":"https://doi.org/10.1109/i-PACT52855.2021.9696971","url":null,"abstract":"The Automatic Identification System (AIS) is one of the most successful maritime technologies which allows ships to autonomously communicate their positions and movements with one another, thereby playing a crucial role in collision avoidance. AIS is essentially a communication system that identifies and exchanges information such as the MMSI (Maritime Mobile Service Identities) number, navigation status, rate of turn, speed over ground, course, position, and etc with other maritime vessels and base stations. This paper aims at the development and implementation of a simulator that simulates AIS communication based on AIS standards, i.e., capturing the necessary AIS messages and displaying them on the chart plotters or live maps.","PeriodicalId":335956,"journal":{"name":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130050509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of MPPT Integrated Solar Charger for Electric Vehicle Battery 电动汽车电池用MPPT集成太阳能充电器性能分析
Pub Date : 2021-11-27 DOI: 10.1109/i-PACT52855.2021.9696742
Siddarth S Menon, Rishabh Prasad, R. R. Singh
Finding alternative energy sources is critical due to rising global energy demand in a world where people are overly dependent on conventional energy sources which are very limited in quantity. The most preferred alternative energy supply is solar energy which is abundant everywhere. Solar energy can be easily captured by using PV Systems, which consists of PV cells and gives output in the form of electricity. These PV cells have a non-linear behaviour, and their power output is contingent on various factors like ambient temperature and solar irradiance. The efficient utilization of the output power from PV systems is still a big problem. To help solve this issue, techniques known as MPPT (maximum power point tracking) techniques were discovered to extract the output power of the solar PV array with high efficiency. People nowadays prefer EVs which runs on battery power because it is more cost-effective and produces low emissions when compared to the conventional internal combustion engine vehicles. And the best way to charge EVs is by using a solar PV system. In this paper, the performance of an MPPT-based solar EV battery charger is examined and compared to a standard solar EV battery charger under varying meteorological conditions.
由于人们过度依赖数量有限的传统能源,全球能源需求不断上升,寻找替代能源至关重要。最受欢迎的替代能源供应是太阳能,它到处都很丰富。使用光伏系统可以很容易地捕获太阳能,该系统由光伏电池组成,并以电力的形式输出。这些光伏电池具有非线性行为,其功率输出取决于各种因素,如环境温度和太阳辐照度。光伏发电系统输出功率的有效利用仍然是一个大问题。为了解决这一问题,人们发现了MPPT(最大功率点跟踪)技术,该技术可以高效地提取太阳能光伏阵列的输出功率。现在人们更喜欢电池驱动的电动汽车,因为与传统的内燃机汽车相比,它更具成本效益,排放更低。给电动汽车充电的最佳方式是使用太阳能光伏系统。本文研究了基于mpt的太阳能电动汽车电池充电器在不同气象条件下的性能,并与标准太阳能电动汽车电池充电器进行了比较。
{"title":"Performance Analysis of MPPT Integrated Solar Charger for Electric Vehicle Battery","authors":"Siddarth S Menon, Rishabh Prasad, R. R. Singh","doi":"10.1109/i-PACT52855.2021.9696742","DOIUrl":"https://doi.org/10.1109/i-PACT52855.2021.9696742","url":null,"abstract":"Finding alternative energy sources is critical due to rising global energy demand in a world where people are overly dependent on conventional energy sources which are very limited in quantity. The most preferred alternative energy supply is solar energy which is abundant everywhere. Solar energy can be easily captured by using PV Systems, which consists of PV cells and gives output in the form of electricity. These PV cells have a non-linear behaviour, and their power output is contingent on various factors like ambient temperature and solar irradiance. The efficient utilization of the output power from PV systems is still a big problem. To help solve this issue, techniques known as MPPT (maximum power point tracking) techniques were discovered to extract the output power of the solar PV array with high efficiency. People nowadays prefer EVs which runs on battery power because it is more cost-effective and produces low emissions when compared to the conventional internal combustion engine vehicles. And the best way to charge EVs is by using a solar PV system. In this paper, the performance of an MPPT-based solar EV battery charger is examined and compared to a standard solar EV battery charger under varying meteorological conditions.","PeriodicalId":335956,"journal":{"name":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130135261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cryptocurrency and Associated Bourse Analysis using Machine Learning and Knowledge Graphs 使用机器学习和知识图的加密货币和相关交易所分析
Pub Date : 2021-11-27 DOI: 10.1109/i-PACT52855.2021.9696998
S. S, Harshini Karthikeyan Aiyyer, Aditi Manthripragada
Data science has a goal to discover hidden patterns in raw data. This is exceptionally useful when discussing the stock market. The way crypto currency has taken over the world is something that wasn't predicted 20 years ago. It seems that regular market indicators aren't being implemented in the case of crypto currencies such as bit coin. Crypto currency seems to evade inflation as well. For analysts to perform analyses on these entities there are umpteen tools. One instance is the knowledge graph, which is a collection of interlinked descriptions of objects, events, or concepts. It puts data in context through linking and semantic metadata. Historical data present across many trading and finance websites enable analysts and enthusiasts to try machine learning and deep learning algorithms to predict the subsequent nature of that market. The paper has summarized and analyzed all the possible algorithms to prepare the data available regarding the lifetime and volatility of a currency state. A knowledge graph linking all the related information was also materialized along with a UML-style ontological graph is done to aid and support proper inference from the knowledge representation model.
数据科学的目标是发现原始数据中隐藏的模式。这在讨论股票市场时特别有用。加密货币席卷世界的方式是20年前无法预测的。对于比特币等加密货币,似乎没有实施常规的市场指标。加密货币似乎也避开了通货膨胀。分析师要对这些实体进行分析,有无数的工具。一个例子是知识图,它是对象、事件或概念的相互关联描述的集合。它通过链接和语义元数据将数据置于上下文中。许多交易和金融网站上的历史数据使分析师和爱好者能够尝试机器学习和深度学习算法来预测该市场的后续性质。本文总结和分析了所有可能的算法,以准备有关货币状态的寿命和波动性的可用数据。将所有相关信息连接在一起的知识图与uml风格的本体图一起物化,以帮助和支持从知识表示模型中进行适当的推理。
{"title":"Cryptocurrency and Associated Bourse Analysis using Machine Learning and Knowledge Graphs","authors":"S. S, Harshini Karthikeyan Aiyyer, Aditi Manthripragada","doi":"10.1109/i-PACT52855.2021.9696998","DOIUrl":"https://doi.org/10.1109/i-PACT52855.2021.9696998","url":null,"abstract":"Data science has a goal to discover hidden patterns in raw data. This is exceptionally useful when discussing the stock market. The way crypto currency has taken over the world is something that wasn't predicted 20 years ago. It seems that regular market indicators aren't being implemented in the case of crypto currencies such as bit coin. Crypto currency seems to evade inflation as well. For analysts to perform analyses on these entities there are umpteen tools. One instance is the knowledge graph, which is a collection of interlinked descriptions of objects, events, or concepts. It puts data in context through linking and semantic metadata. Historical data present across many trading and finance websites enable analysts and enthusiasts to try machine learning and deep learning algorithms to predict the subsequent nature of that market. The paper has summarized and analyzed all the possible algorithms to prepare the data available regarding the lifetime and volatility of a currency state. A knowledge graph linking all the related information was also materialized along with a UML-style ontological graph is done to aid and support proper inference from the knowledge representation model.","PeriodicalId":335956,"journal":{"name":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130425490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced Big Data Handling Architecture for Privacy Preservation of Cloud Data 面向云数据隐私保护的增强型大数据处理架构
Pub Date : 2021-11-27 DOI: 10.1109/i-PACT52855.2021.9696717
S. Gowri, J. Jabez, J. R. Raj, S. Srinivasulu, Sudha
The cloud is the leading technology in the IT world for storing and managing massive quantities of data. Protection and data privacy preservation are two of the most common concerns in big data. Confidential information must be secured from multiple unauthorized accesses in attempt to optimize its security. Different traditional cryptography algorithms have been used in the security of big data in the cloud to enhance privacy. Still, because of its reduced security, there are some privacy protection concerns. With the emergence of IoT-cloud-based devices, IoT has advanced significantly in the field of big data processing. The health-care system is one of the recent IoT-based Big data applications. To preserve the privacy of patient data, several studies are required. Data security and computing overheads are still major challenges in the IoT-cloud-based health system. To ensure the privacy of huge data, the ElGamal Elliptic Curve (EGEC) encryption technique is proposed. The results are analyzed and the comparison depicts the outperformance of the proposed system.
云是IT界用于存储和管理大量数据的领先技术。保护和数据隐私保护是大数据中最常见的两个问题。必须保护机密信息,防止多次未经授权的访问,以优化其安全性。不同的传统加密算法被用于云中的大数据安全,以增强隐私性。不过,由于安全性降低,存在一些隐私保护方面的担忧。随着物联网云设备的出现,物联网在大数据处理领域取得了显著进展。医疗保健系统是最近基于物联网的大数据应用之一。为了保护患者数据的隐私,需要进行几项研究。数据安全和计算开销仍然是基于物联网云的医疗系统面临的主要挑战。为了保证海量数据的保密性,提出了ElGamal椭圆曲线(EGEC)加密技术。对结果进行了分析和比较,描述了所提出系统的优越性能。
{"title":"An Enhanced Big Data Handling Architecture for Privacy Preservation of Cloud Data","authors":"S. Gowri, J. Jabez, J. R. Raj, S. Srinivasulu, Sudha","doi":"10.1109/i-PACT52855.2021.9696717","DOIUrl":"https://doi.org/10.1109/i-PACT52855.2021.9696717","url":null,"abstract":"The cloud is the leading technology in the IT world for storing and managing massive quantities of data. Protection and data privacy preservation are two of the most common concerns in big data. Confidential information must be secured from multiple unauthorized accesses in attempt to optimize its security. Different traditional cryptography algorithms have been used in the security of big data in the cloud to enhance privacy. Still, because of its reduced security, there are some privacy protection concerns. With the emergence of IoT-cloud-based devices, IoT has advanced significantly in the field of big data processing. The health-care system is one of the recent IoT-based Big data applications. To preserve the privacy of patient data, several studies are required. Data security and computing overheads are still major challenges in the IoT-cloud-based health system. To ensure the privacy of huge data, the ElGamal Elliptic Curve (EGEC) encryption technique is proposed. The results are analyzed and the comparison depicts the outperformance of the proposed system.","PeriodicalId":335956,"journal":{"name":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134099138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Controller Design For Detection of Various Power Thefts 检测各种电力盗窃的控制器设计
Pub Date : 2021-11-27 DOI: 10.1109/i-PACT52855.2021.9696752
S. Venkateswarlu, Divya Teja Ankireddy, N. Kumar, Rathaiah Meram, T. Prakash, Jarapala Siva Naik
Power theft is the serious unlawful methods in developing countries like India in order to avoid electricity charges. It is a major problem in every country and it must be avoided. So it is necessary to propose a system which can able to monitor the power theft and also location of theft occur. The proposed system must take required action during theft conditions. This paper describes the reliable approach to detect the power theft and to clear the fault in distribution lines. The developed control scheme require the readings of current and voltage values of house hold energy meter and transformer of distribution side. From the control design, if there is any voltage drop in load side because of power theft, the system automatically detects the power theft and locates the distance from the distribution line. So the circuit breaker got a signal from the controller simultaneously. The breaker blocks the electricity and it rechecks four times to remove the theft. In the paper, the theft is created artificially under various loads. Three different power thefts like R, RL and RLC are taken at three different tapping and percentage error is calculated from output and presented in tabular column. The proposed scheme is done in MATLAB/Simulink environment.
窃电是印度等发展中国家为逃避电费而采取的严重非法手段。这是每个国家的一个大问题,必须加以避免。因此,有必要设计一种既能监控窃电又能定位窃电发生位置的系统。建议的系统必须在盗窃情况下采取必要的行动。本文介绍了一种可靠的配电线路窃电检测和故障清除方法。所制定的控制方案需要户用电能表和配电侧变压器的电流、电压读数。从控制设计上看,如果负载侧因盗电而出现电压下降,系统会自动检测到盗电,并定位到离配电线路的距离。这样断路器就同时得到了控制器的信号。断路器切断电源,并重新检查四次以消除盗窃。在本文中,盗窃是在各种负载下人为制造的。三种不同的功率盗窃,如R, RL和RLC,在三种不同的攻丝下进行,并从输出中计算百分比误差,并以表格列形式呈现。该方案是在MATLAB/Simulink环境下完成的。
{"title":"Controller Design For Detection of Various Power Thefts","authors":"S. Venkateswarlu, Divya Teja Ankireddy, N. Kumar, Rathaiah Meram, T. Prakash, Jarapala Siva Naik","doi":"10.1109/i-PACT52855.2021.9696752","DOIUrl":"https://doi.org/10.1109/i-PACT52855.2021.9696752","url":null,"abstract":"Power theft is the serious unlawful methods in developing countries like India in order to avoid electricity charges. It is a major problem in every country and it must be avoided. So it is necessary to propose a system which can able to monitor the power theft and also location of theft occur. The proposed system must take required action during theft conditions. This paper describes the reliable approach to detect the power theft and to clear the fault in distribution lines. The developed control scheme require the readings of current and voltage values of house hold energy meter and transformer of distribution side. From the control design, if there is any voltage drop in load side because of power theft, the system automatically detects the power theft and locates the distance from the distribution line. So the circuit breaker got a signal from the controller simultaneously. The breaker blocks the electricity and it rechecks four times to remove the theft. In the paper, the theft is created artificially under various loads. Three different power thefts like R, RL and RLC are taken at three different tapping and percentage error is calculated from output and presented in tabular column. The proposed scheme is done in MATLAB/Simulink environment.","PeriodicalId":335956,"journal":{"name":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134304214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Autoencoder Architecture for Text Encryption 一种用于文本加密的混合自动编码器架构
Pub Date : 2021-11-27 DOI: 10.1109/i-PACT52855.2021.9696715
Unnikrishnan Menon, A. Menon, Atharva Hudlikar, A. Sharmila, P. Mahalakshmi
With the advent of modern computing technologies, there is a wide scope for introduction of advanced and highly secure encryption standards that cannot be rendered obsolete even when subjected to these techniques. This paper introduces one such encryption paradigm, implemented using autoencoders. The proposed algorithm trains an autoencoder to replicate an input 8-bit ASCII value and takes advantage of the bottle-neck architecture to encrypt the data in a way that can only be retrieved using the trained weights. Various analyses are utilized to exemplify the speed as well as security of the proposed cryptosystem.
随着现代计算技术的出现,引入先进和高度安全的加密标准的范围很广,即使受到这些技术的影响,这些标准也不会过时。本文介绍了一种使用自编码器实现的加密范例。提出的算法训练一个自动编码器来复制输入的8位ASCII值,并利用瓶颈架构以只能使用训练权值检索的方式加密数据。利用各种分析来举例说明所提出的密码系统的速度和安全性。
{"title":"A Hybrid Autoencoder Architecture for Text Encryption","authors":"Unnikrishnan Menon, A. Menon, Atharva Hudlikar, A. Sharmila, P. Mahalakshmi","doi":"10.1109/i-PACT52855.2021.9696715","DOIUrl":"https://doi.org/10.1109/i-PACT52855.2021.9696715","url":null,"abstract":"With the advent of modern computing technologies, there is a wide scope for introduction of advanced and highly secure encryption standards that cannot be rendered obsolete even when subjected to these techniques. This paper introduces one such encryption paradigm, implemented using autoencoders. The proposed algorithm trains an autoencoder to replicate an input 8-bit ASCII value and takes advantage of the bottle-neck architecture to encrypt the data in a way that can only be retrieved using the trained weights. Various analyses are utilized to exemplify the speed as well as security of the proposed cryptosystem.","PeriodicalId":335956,"journal":{"name":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130980561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Quandary in Data Protection and Rights to Privacy of AI Technology Adoption in Malaysia 马来西亚人工智能技术采用中数据保护和隐私权的困境
Pub Date : 2021-11-27 DOI: 10.1109/i-PACT52855.2021.9696803
Saslina Kamaruddin, Wan Rosalili Wan Rosli, Nadia Nabila Mohd Saufi, Ani Munirah Mohammad, Z. Hamin
Artificial Intelligence (AI) is increasingly taking hold throughout worldwide businesses. Since 2017, anticipated AI usage in Malaysia has increased by 32 percent due to innovative city projects and public safety and intelligent transportation applications. However, such AI development is afflicted by privacy and data breaches as the existing data protection regulation safeguards against unlawful commercial use of personal data. Recent developments reflect the failure of present legal mechanisms to address such infringements and effective data management and protection deficiencies. This study examines the legal concerns of privacy and data protection and problems associated with the use of AI in Malaysia. This research adopts a methodology of doctrinal research, a systematic method of legal reasoning, including analyzing primary and secondary resources. The findings imply that AI evolves, magnifying the ability to use personal information that may affect privacy. Thus, infringement of privacy and use of personal data without legal oversight or effective governance could result in privacy deprivation and abuse of personal data that might be used to perpetrate crimes
人工智能(AI)越来越多地在全球企业中占据主导地位。自2017年以来,由于创新的城市项目以及公共安全和智能交通应用,马来西亚的人工智能使用量预计增长了32%。然而,这种人工智能的发展受到隐私和数据泄露的影响,因为现有的数据保护条例是为了防止个人数据的非法商业使用。最近的事态发展反映了目前的法律机制未能处理这种侵权行为以及有效的数据管理和保护方面的缺陷。本研究探讨了隐私和数据保护的法律问题以及与马来西亚使用人工智能相关的问题。本研究采用理论研究的方法论,采用系统的法律推理方法,包括对一手资源和第二手资源的分析。研究结果表明,人工智能正在进化,放大了使用可能影响隐私的个人信息的能力。因此,在没有法律监督或有效治理的情况下侵犯隐私和使用个人数据可能导致隐私被剥夺和个人数据被滥用,从而可能被用于犯罪
{"title":"The Quandary in Data Protection and Rights to Privacy of AI Technology Adoption in Malaysia","authors":"Saslina Kamaruddin, Wan Rosalili Wan Rosli, Nadia Nabila Mohd Saufi, Ani Munirah Mohammad, Z. Hamin","doi":"10.1109/i-PACT52855.2021.9696803","DOIUrl":"https://doi.org/10.1109/i-PACT52855.2021.9696803","url":null,"abstract":"Artificial Intelligence (AI) is increasingly taking hold throughout worldwide businesses. Since 2017, anticipated AI usage in Malaysia has increased by 32 percent due to innovative city projects and public safety and intelligent transportation applications. However, such AI development is afflicted by privacy and data breaches as the existing data protection regulation safeguards against unlawful commercial use of personal data. Recent developments reflect the failure of present legal mechanisms to address such infringements and effective data management and protection deficiencies. This study examines the legal concerns of privacy and data protection and problems associated with the use of AI in Malaysia. This research adopts a methodology of doctrinal research, a systematic method of legal reasoning, including analyzing primary and secondary resources. The findings imply that AI evolves, magnifying the ability to use personal information that may affect privacy. Thus, infringement of privacy and use of personal data without legal oversight or effective governance could result in privacy deprivation and abuse of personal data that might be used to perpetrate crimes","PeriodicalId":335956,"journal":{"name":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131259127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Real-time Implementation of Delay Efficient DCT Based Hearing Aid Algorithm Using TMS320C5505 DSP Processor TMS320C5505 DSP处理器实时实现基于延迟高效DCT的助听器算法
Pub Date : 2021-11-27 DOI: 10.1109/i-PACT52855.2021.9696632
K. A. Swamy, Z. C. Alex, Prakash Ramachandran, T. L. Mathew, C. Sushma, N. Padmaja
In the case of sensorineural hearing loss, the hearing aid needs to amplify the audio signal selectively based and frequency and very sensitively based on the hearing threshold. In this paper, we proposed to implement a new 16-point Discrete Cosine Transform (DCT) base delay efficient algorithm for hearing aid applications. This proposed algorithm gives better matching error with smaller delay due to uniform resampling and recursive modification of hearing thresholds in an audiogram. Delay and matching error are the main parameters in analysing the performance of the hearing aid algorithm. Four audiograms with various degrees of hearing loss are used to test the suggested method. When compared to filter bank approaches, the suggested algorithm has a lower matching error and a faster response time. The proposed algorithm is implemented on a TMS320C5505 DSP processor to validate the simulation results.
在感音神经性听力损失的情况下,助听器需要根据听力阈值选择性地、频率地、非常灵敏地放大音频信号。在本文中,我们提出了一种新的16点离散余弦变换(DCT)基延迟高效算法,用于助听器应用。该算法通过均匀重采样和递归修改听力图的阈值,使匹配误差和延迟都得到了提高。延迟和匹配误差是分析助听器算法性能的主要参数。四种不同程度听力损失的听力图被用来测试建议的方法。与滤波器组方法相比,该算法具有较低的匹配误差和较快的响应速度。在TMS320C5505 DSP处理器上实现了该算法,验证了仿真结果。
{"title":"Real-time Implementation of Delay Efficient DCT Based Hearing Aid Algorithm Using TMS320C5505 DSP Processor","authors":"K. A. Swamy, Z. C. Alex, Prakash Ramachandran, T. L. Mathew, C. Sushma, N. Padmaja","doi":"10.1109/i-PACT52855.2021.9696632","DOIUrl":"https://doi.org/10.1109/i-PACT52855.2021.9696632","url":null,"abstract":"In the case of sensorineural hearing loss, the hearing aid needs to amplify the audio signal selectively based and frequency and very sensitively based on the hearing threshold. In this paper, we proposed to implement a new 16-point Discrete Cosine Transform (DCT) base delay efficient algorithm for hearing aid applications. This proposed algorithm gives better matching error with smaller delay due to uniform resampling and recursive modification of hearing thresholds in an audiogram. Delay and matching error are the main parameters in analysing the performance of the hearing aid algorithm. Four audiograms with various degrees of hearing loss are used to test the suggested method. When compared to filter bank approaches, the suggested algorithm has a lower matching error and a faster response time. The proposed algorithm is implemented on a TMS320C5505 DSP processor to validate the simulation results.","PeriodicalId":335956,"journal":{"name":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133082168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 Innovations in Power and Advanced Computing Technologies (i-PACT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1