首页 > 最新文献

2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)最新文献

英文 中文
Machine Learning in Banking Risk Management - A Brief Overview 银行风险管理中的机器学习-简要概述
Hafsa Shakeel, Hana Sharif, Faisal Rehman, Bilal Rasool, Azher Mahmood, Hadia Maqsood, Hina Kirn, C. Ali, Muhammad Bilal
The use of computer-based intelligence in business applications is growing. There have been numerous arrangements previously executed, and numerous more are being discovered. The global financial crisis has heightened the significance of risk management in banks, and there has been a persistent emphasis on how risks are perceived, evaluated, and taken. For the most part, the industry has concentrated on the improvement in financial bets and current difficulties. This paper has shown that the use of artificial intelligence (AI) in the administration of banking risk, grocery store risk, check card risk, and cash risk has been found. In any case, it doesn't appear to have much to do with the ongoing business sector-level discussions centered on both executive gambling and artificial intelligence. In different regions of bank risk, executives might see a significant advantage from an investigation of how, at any point, AI can be applied to individual issues.
基于计算机的智能在商业应用中的应用正在增长。以前已经执行了许多安排,还有更多的安排正在被发现。全球金融危机凸显了银行风险管理的重要性,人们一直强调如何感知、评估和承担风险。在很大程度上,该行业专注于改善金融投注和当前的困难。本文展示了人工智能(AI)在银行风险、杂货店风险、支票卡风险和现金风险管理中的应用。无论如何,这似乎与正在进行的以高管赌博和人工智能为中心的商业部门层面的讨论没有多大关系。在银行风险的不同领域,高管们可能会从调查如何在任何时候将人工智能应用于个别问题中看到显著的优势。
{"title":"Machine Learning in Banking Risk Management - A Brief Overview","authors":"Hafsa Shakeel, Hana Sharif, Faisal Rehman, Bilal Rasool, Azher Mahmood, Hadia Maqsood, Hina Kirn, C. Ali, Muhammad Bilal","doi":"10.1109/iCoMET57998.2023.10099339","DOIUrl":"https://doi.org/10.1109/iCoMET57998.2023.10099339","url":null,"abstract":"The use of computer-based intelligence in business applications is growing. There have been numerous arrangements previously executed, and numerous more are being discovered. The global financial crisis has heightened the significance of risk management in banks, and there has been a persistent emphasis on how risks are perceived, evaluated, and taken. For the most part, the industry has concentrated on the improvement in financial bets and current difficulties. This paper has shown that the use of artificial intelligence (AI) in the administration of banking risk, grocery store risk, check card risk, and cash risk has been found. In any case, it doesn't appear to have much to do with the ongoing business sector-level discussions centered on both executive gambling and artificial intelligence. In different regions of bank risk, executives might see a significant advantage from an investigation of how, at any point, AI can be applied to individual issues.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131794020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Media Competitive Analysis: A Case Study of Laptop Brands 社交媒体竞争分析:以笔记本电脑品牌为例
Taimoor Hassan, Abrar Ahmed, Mehmood Anwar, Muhammad Basit Ali Gilani, Muaz Ahmad Qureshi
Most enterprises adopted social media for marketing purposes. Traditional media resources about one decade ago are now a day's costly and less productive than social media. Companies that are using social media like Facebook to provide different services and therefore to interact with customers, users produce a valuable content which is available on Facebook free of cost. To enhance market capitalization, expand value and effectiveness analyze competitor business strengths and value. Businesses must monitor social media sites of their own to see customer's response on their products and their competitor's social media to analyze behavior of customers. To help Enterprises to evaluate social media large amount of user generated content into knowledgeable information, decision making and future planning and targets. In this article case study, we are presenting is based on text mining to analyze content on Facebook in the well know top Five laptop brands named HP, Dell, Microsoft Surface, Toshiba, and Lenovo. The outcome showed the power, analysis of social media and text mining value to enhance business from the data available on social media freely. There are also some suggestions and recommendations to help organizations to plan and develop their strategy for social media to enhance business.
大多数企业采用社交媒体进行营销。大约十年前的传统媒体资源现在比社交媒体更昂贵,效率也更低。公司利用Facebook等社交媒体提供不同的服务,从而与客户互动,用户产生有价值的内容,这些内容在Facebook上是免费的。分析竞争对手的业务优势和价值,提高市值,扩大价值和效益。企业必须监控自己的社交媒体网站,看看客户对自己产品的反应,以及竞争对手的社交媒体,以分析客户的行为。帮助企业将社交媒体上大量用户生成的内容评估为知识性信息、决策和未来规划与目标。在本文的案例研究中,我们将介绍基于文本挖掘来分析Facebook上五大知名笔记本电脑品牌(HP、Dell、Microsoft Surface、Toshiba和Lenovo)的内容。结果显示了社交媒体分析和文本挖掘价值的力量,可以从社交媒体上免费获得的数据中提升业务。也有一些建议和建议,以帮助组织计划和发展他们的社会媒体战略,以提高业务。
{"title":"Social Media Competitive Analysis: A Case Study of Laptop Brands","authors":"Taimoor Hassan, Abrar Ahmed, Mehmood Anwar, Muhammad Basit Ali Gilani, Muaz Ahmad Qureshi","doi":"10.1109/iCoMET57998.2023.10099132","DOIUrl":"https://doi.org/10.1109/iCoMET57998.2023.10099132","url":null,"abstract":"Most enterprises adopted social media for marketing purposes. Traditional media resources about one decade ago are now a day's costly and less productive than social media. Companies that are using social media like Facebook to provide different services and therefore to interact with customers, users produce a valuable content which is available on Facebook free of cost. To enhance market capitalization, expand value and effectiveness analyze competitor business strengths and value. Businesses must monitor social media sites of their own to see customer's response on their products and their competitor's social media to analyze behavior of customers. To help Enterprises to evaluate social media large amount of user generated content into knowledgeable information, decision making and future planning and targets. In this article case study, we are presenting is based on text mining to analyze content on Facebook in the well know top Five laptop brands named HP, Dell, Microsoft Surface, Toshiba, and Lenovo. The outcome showed the power, analysis of social media and text mining value to enhance business from the data available on social media freely. There are also some suggestions and recommendations to help organizations to plan and develop their strategy for social media to enhance business.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133892128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vehicle Detection using Artificial Intelligence based Algorithm in Intelligent Transportation Systems 智能交通系统中基于人工智能算法的车辆检测
Muhammad Waqar, M. Ishaq, M. Afzal, Shahzaib Iqbal
Intelligent transportation systems (ITS) are the future of inter- and intra-city mobility. ITS has several features, and vehicle detection is a crucial system component. This research paper implements the You Only Look Once (YOLO) algorithm, which is a neural network-based technique for detecting vehicles on roads and streets. The algorithm detects vehicles rapidly and accurately. The YOLO implementation of this study confirms the efficacy of this algorithm, detecting vehicles successfully in various scenarios. Vehicles are detected and displayed separately within boundary boxes. Our implementation of this method is limited to detecting up to five vehicles on a single road or street. The vehicles could be parked or waiting at a traffic signal for it to turn green. Vehicle tracking has increased the effectiveness of the system because it follows the vehicle's path until it disappears from the CCTV image. MATLAB simulations are used to validate the results of this study.
智能交通系统(ITS)是城市间和城市内交通的未来。ITS有几个特点,车辆检测是一个关键的系统组成部分。该研究论文实现了You Only Look Once (YOLO)算法,这是一种基于神经网络的技术,用于检测道路和街道上的车辆。该算法快速准确地检测车辆。本研究的YOLO实现验证了该算法的有效性,在各种场景下成功检测车辆。检测车辆并在边界框内单独显示。我们对这种方法的实施仅限于在一条道路或街道上检测最多五辆车。这些车辆可能正在停车或等待交通信号变绿。车辆跟踪增加了系统的有效性,因为它跟随车辆的路径,直到它从闭路电视图像中消失。通过MATLAB仿真验证了本文的研究结果。
{"title":"Vehicle Detection using Artificial Intelligence based Algorithm in Intelligent Transportation Systems","authors":"Muhammad Waqar, M. Ishaq, M. Afzal, Shahzaib Iqbal","doi":"10.1109/iCoMET57998.2023.10099381","DOIUrl":"https://doi.org/10.1109/iCoMET57998.2023.10099381","url":null,"abstract":"Intelligent transportation systems (ITS) are the future of inter- and intra-city mobility. ITS has several features, and vehicle detection is a crucial system component. This research paper implements the You Only Look Once (YOLO) algorithm, which is a neural network-based technique for detecting vehicles on roads and streets. The algorithm detects vehicles rapidly and accurately. The YOLO implementation of this study confirms the efficacy of this algorithm, detecting vehicles successfully in various scenarios. Vehicles are detected and displayed separately within boundary boxes. Our implementation of this method is limited to detecting up to five vehicles on a single road or street. The vehicles could be parked or waiting at a traffic signal for it to turn green. Vehicle tracking has increased the effectiveness of the system because it follows the vehicle's path until it disappears from the CCTV image. MATLAB simulations are used to validate the results of this study.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132492967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Method of Calculating the Coefficient of Asymmetry in the Negative Sequence 一种计算负序列不对称系数的新方法
Kholiddinov Ilkhombek Khosiljonovich, A. Saleem, A. Iqbal, Kholiddinova Mashkhurakhon Mutalibjon qizi, Eraliev Khojiakbar, M. Mateen
The objective of this research paper is to presents a new approach for calculating the coefficient of asymmetry in the negative sequence. Power supply failures caused by the coefficient of asymmetry in negative sequences is analyzed. In addition, due to the failure of power supplies the resulting economic damages in domestic and foreign practice are given. The analysis is based on the existing methods of calculating the coefficient of asymmetry of the negative sequence, and also the use of domestic devices for monitoring the quality of electricity of a separate power system is proposed. The results of measurements of distribution transformer of the Zangiata district are presented. The acquired results validate the proposed approach technique.
本文的研究目的是提出一种计算负数列不对称系数的新方法。分析了负序不对称系数引起的电源故障。此外,还介绍了国内外实践中由于电源故障所造成的经济损失。本文在现有的负序不对称系数计算方法的基础上,提出了利用国产装置监测独立电力系统的电能质量。介绍了桑吉亚塔地区配电变压器的实测结果。仿真结果验证了该方法的有效性。
{"title":"Novel Method of Calculating the Coefficient of Asymmetry in the Negative Sequence","authors":"Kholiddinov Ilkhombek Khosiljonovich, A. Saleem, A. Iqbal, Kholiddinova Mashkhurakhon Mutalibjon qizi, Eraliev Khojiakbar, M. Mateen","doi":"10.1109/iCoMET57998.2023.10099113","DOIUrl":"https://doi.org/10.1109/iCoMET57998.2023.10099113","url":null,"abstract":"The objective of this research paper is to presents a new approach for calculating the coefficient of asymmetry in the negative sequence. Power supply failures caused by the coefficient of asymmetry in negative sequences is analyzed. In addition, due to the failure of power supplies the resulting economic damages in domestic and foreign practice are given. The analysis is based on the existing methods of calculating the coefficient of asymmetry of the negative sequence, and also the use of domestic devices for monitoring the quality of electricity of a separate power system is proposed. The results of measurements of distribution transformer of the Zangiata district are presented. The acquired results validate the proposed approach technique.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134642820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Introducing VAIFU: A Virtual Agent for Introducing and Familiarizing Users in VR 介绍VAIFU:一个在VR中介绍和熟悉用户的虚拟代理
Muhammad Hasham Qazi, Muhammad Palize Qazi
This paper introduces VAIFU, a Virtual Agent for Introducing and Familiarizing Users in Virtual Reality. VAIFU is an interactive embodied conversational agent that allows for both speech interaction and physical interactions in Virtual Reality. The goal of VAIFU is to introduce and familiarize new users with the landscape of virtual reality. The paper discusses the system design, agent development, interaction methods, and natural language processing techniques that may be used in order to develop such an agent for immersive human-like social interactions and how these social features may be beneficial to users. The paper concludes with a pilot study and future work for further iterations of the project.
本文介绍了虚拟现实中用于介绍和熟悉用户的虚拟代理VAIFU。VAIFU是一个交互式的具体化会话代理,它允许在虚拟现实中进行语音交互和物理交互。VAIFU的目标是向新用户介绍和熟悉虚拟现实的景观。本文讨论了系统设计、智能体开发、交互方法和自然语言处理技术,这些技术可能用于开发这种身临其境的类人社交交互的智能体,以及这些社交功能如何对用户有益。本文以试点研究和项目进一步迭代的未来工作作为结论。
{"title":"Introducing VAIFU: A Virtual Agent for Introducing and Familiarizing Users in VR","authors":"Muhammad Hasham Qazi, Muhammad Palize Qazi","doi":"10.1109/iCoMET57998.2023.10099242","DOIUrl":"https://doi.org/10.1109/iCoMET57998.2023.10099242","url":null,"abstract":"This paper introduces VAIFU, a Virtual Agent for Introducing and Familiarizing Users in Virtual Reality. VAIFU is an interactive embodied conversational agent that allows for both speech interaction and physical interactions in Virtual Reality. The goal of VAIFU is to introduce and familiarize new users with the landscape of virtual reality. The paper discusses the system design, agent development, interaction methods, and natural language processing techniques that may be used in order to develop such an agent for immersive human-like social interactions and how these social features may be beneficial to users. The paper concludes with a pilot study and future work for further iterations of the project.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116425653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep learning-based video anonymization for security and privacy 基于深度学习的视频匿名安全性和隐私性
Jon Gunnar Fossum, Benjamin Normann Skinstad, Saira Yamin, M. Ullah, F. A. Cheikh
In recent years, the design of systems has been heavily influenced by concerns about privacy and security. Companies have been particularly affected by the introduction of GDPR, which requires them to consider the privacy of individuals when storing personal data or facing significant fines. To address this issue, we have proposed a system that can detect and censor faces in a way that prioritizes privacy. Our system can process videos and automatically identify and blur facial features. We have customized our implementation using Facebook's object detector, Detectron2, and further developed it to enable facial detection and censorship. To evaluate the effectiveness of our approach, we conducted statistical tests and a small user study using videos that our system had censored. The results suggest that our implementation can reliably blur facial features to the point where the censored individuals are unrecognizable.
近年来,系统的设计受到隐私和安全问题的严重影响。企业尤其受到《通用数据保护条例》(GDPR)引入的影响,该条例要求企业在存储个人数据时考虑个人隐私,否则将面临巨额罚款。为了解决这个问题,我们提出了一个系统,可以以一种优先考虑隐私的方式检测和审查人脸。我们的系统可以处理视频,自动识别和模糊面部特征。我们使用Facebook的对象检测器Detectron2定制了我们的实现,并进一步开发它以实现面部检测和审查。为了评估我们方法的有效性,我们进行了统计测试,并使用我们的系统审查过的视频进行了一个小型用户研究。结果表明,我们的实现可以可靠地模糊面部特征,使被审查的个人无法识别。
{"title":"Deep learning-based video anonymization for security and privacy","authors":"Jon Gunnar Fossum, Benjamin Normann Skinstad, Saira Yamin, M. Ullah, F. A. Cheikh","doi":"10.1109/iCoMET57998.2023.10099232","DOIUrl":"https://doi.org/10.1109/iCoMET57998.2023.10099232","url":null,"abstract":"In recent years, the design of systems has been heavily influenced by concerns about privacy and security. Companies have been particularly affected by the introduction of GDPR, which requires them to consider the privacy of individuals when storing personal data or facing significant fines. To address this issue, we have proposed a system that can detect and censor faces in a way that prioritizes privacy. Our system can process videos and automatically identify and blur facial features. We have customized our implementation using Facebook's object detector, Detectron2, and further developed it to enable facial detection and censorship. To evaluate the effectiveness of our approach, we conducted statistical tests and a small user study using videos that our system had censored. The results suggest that our implementation can reliably blur facial features to the point where the censored individuals are unrecognizable.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114321574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Review of Intrusion Detection Systems in Internet of Things Using ML and DL 基于ML和DL的物联网入侵检测系统综述
Ali Hussain, Hana Sharif, Faisal Rehman, Hina Kirn, Ashina Sadiq, M. Khan, Amjad Riaz, C. Ali, Adil Hussain Chandio
The rapid expansion of IoT technologies like smart sensors and home appliances is likely to have far-reaching consequences. Connectivity, ubiquitous presence, and low computational power are the hallmarks of IoT gadgets. The global tally of Internet of Things gadgets is on the rise. There has been an increase in IoT -based cyber-attack incidents due to the proliferation of these devices, which is much easier to do than with desktop computers. New methods of identifying attacks launched from compromised IoT devices are needed to help address this issue. In this scenario, the most effective method of detective control against attacks originating from IoT devices is the application of ML and DL techniques. The main aim of this research is to provide an overview of intrusion detection models as well as a comprehensive review of threats to IoT systems caused by compromised IoT devices.
智能传感器和家用电器等物联网技术的快速扩张可能会产生深远的影响。连接性、无处不在的存在和低计算能力是物联网设备的标志。物联网设备的全球数量正在上升。由于这些设备的激增,基于物联网的网络攻击事件有所增加,这比使用台式电脑要容易得多。需要新的方法来识别从受损物联网设备发起的攻击,以帮助解决这一问题。在这种情况下,对来自物联网设备的攻击进行检测控制的最有效方法是ML和DL技术的应用。本研究的主要目的是提供入侵检测模型的概述,以及由受损的物联网设备对物联网系统造成的威胁的全面审查。
{"title":"A Systematic Review of Intrusion Detection Systems in Internet of Things Using ML and DL","authors":"Ali Hussain, Hana Sharif, Faisal Rehman, Hina Kirn, Ashina Sadiq, M. Khan, Amjad Riaz, C. Ali, Adil Hussain Chandio","doi":"10.1109/iCoMET57998.2023.10099142","DOIUrl":"https://doi.org/10.1109/iCoMET57998.2023.10099142","url":null,"abstract":"The rapid expansion of IoT technologies like smart sensors and home appliances is likely to have far-reaching consequences. Connectivity, ubiquitous presence, and low computational power are the hallmarks of IoT gadgets. The global tally of Internet of Things gadgets is on the rise. There has been an increase in IoT -based cyber-attack incidents due to the proliferation of these devices, which is much easier to do than with desktop computers. New methods of identifying attacks launched from compromised IoT devices are needed to help address this issue. In this scenario, the most effective method of detective control against attacks originating from IoT devices is the application of ML and DL techniques. The main aim of this research is to provide an overview of intrusion detection models as well as a comprehensive review of threats to IoT systems caused by compromised IoT devices.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129113610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Competitive Numerical Model for Virus Transmission in a Computer Network 计算机网络中病毒传播的竞争数值模型
M. Ehsan, M. Rafiq, A. Raza
The transmission dynamics of computer viruses in a network can be modeled as a system of nonlinear differential equations. These nonlinear systems are usually complex to solve analytically. A competitive numerical method is always needed to handle such problems. This paper deals with designing and implementing a reliable numerical analysis to investigate the behavior of a malicious virus in a computer network. The proposed numerical procedure is intended to preserve the actual dynamics of computer viruses in all situations and for every choice of parameter value. The present work is also compared with existing techniques, which do not behave well in specific scenarios.
计算机病毒在网络中的传播动力学可以用非线性微分方程组来建模。这些非线性系统通常难于解析求解。处理这类问题总是需要一种竞争性的数值方法。本文设计并实现了一种可靠的数值分析方法来研究计算机网络中恶意病毒的行为。所提出的数值程序旨在保留计算机病毒在所有情况下和每种参数值选择下的实际动态。目前的工作还与现有的技术进行了比较,这些技术在特定情况下表现不佳。
{"title":"A Competitive Numerical Model for Virus Transmission in a Computer Network","authors":"M. Ehsan, M. Rafiq, A. Raza","doi":"10.1109/iCoMET57998.2023.10099088","DOIUrl":"https://doi.org/10.1109/iCoMET57998.2023.10099088","url":null,"abstract":"The transmission dynamics of computer viruses in a network can be modeled as a system of nonlinear differential equations. These nonlinear systems are usually complex to solve analytically. A competitive numerical method is always needed to handle such problems. This paper deals with designing and implementing a reliable numerical analysis to investigate the behavior of a malicious virus in a computer network. The proposed numerical procedure is intended to preserve the actual dynamics of computer viruses in all situations and for every choice of parameter value. The present work is also compared with existing techniques, which do not behave well in specific scenarios.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129584473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a Buck Converter with an Analogue PI Controller for Wide Load Range Applications 带模拟PI控制器的宽负载范围Buck变换器的设计
Muskan Adeel, Umar Fayyaz, U. Rafi, Muhammad Umar Farooq
Efficient buck converters are crucial for achieving optimal performance, reliability, and cost-effectiveness in a wide range of electronic devices and systems. Buck converters are widely used in a variety of applications where a stable, low-voltage DC output is required. Designing an efficient buck converter requires a careful balance of trade-offs between cost, performance, size, weight, and other factors. In this paper, the efficiency of the Buck converter is increased through the PI controller using an operational amplifier (Op-Amp), also known as an analog PI controller. The performance of the proposed model of the analog PI controller is further compared with the digital buck converter. The stable control system is applied on the Buck converter to decrease output voltage up to 50% w.r.t input voltage. Pulse width modulation (PWM) is used in the proposed model to control variations in waves. The design has been simulated at SIMULINK and PROTEUS8 with the same results.
高效降压变换器对于在广泛的电子设备和系统中实现最佳性能、可靠性和成本效益至关重要。Buck变换器广泛用于各种需要稳定的低压直流输出的应用中。设计一个高效的降压变换器需要在成本、性能、尺寸、重量和其他因素之间进行仔细的权衡。在本文中,Buck转换器的效率是通过使用运算放大器(Op-Amp)的PI控制器来提高的,也称为模拟PI控制器。并将所提出的模拟PI控制器模型与数字降压变换器的性能进行了比较。稳定控制系统应用于Buck变换器上,可使输出电压降低50%。该模型采用脉宽调制(PWM)来控制波形的变化。该设计在SIMULINK和PROTEUS8上进行了仿真,得到了相同的结果。
{"title":"Design of a Buck Converter with an Analogue PI Controller for Wide Load Range Applications","authors":"Muskan Adeel, Umar Fayyaz, U. Rafi, Muhammad Umar Farooq","doi":"10.1109/iCoMET57998.2023.10099295","DOIUrl":"https://doi.org/10.1109/iCoMET57998.2023.10099295","url":null,"abstract":"Efficient buck converters are crucial for achieving optimal performance, reliability, and cost-effectiveness in a wide range of electronic devices and systems. Buck converters are widely used in a variety of applications where a stable, low-voltage DC output is required. Designing an efficient buck converter requires a careful balance of trade-offs between cost, performance, size, weight, and other factors. In this paper, the efficiency of the Buck converter is increased through the PI controller using an operational amplifier (Op-Amp), also known as an analog PI controller. The performance of the proposed model of the analog PI controller is further compared with the digital buck converter. The stable control system is applied on the Buck converter to decrease output voltage up to 50% w.r.t input voltage. Pulse width modulation (PWM) is used in the proposed model to control variations in waves. The design has been simulated at SIMULINK and PROTEUS8 with the same results.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117157834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
iCoMET 2023 Organizer
{"title":"iCoMET 2023 Organizer","authors":"","doi":"10.1109/icomet57998.2023.10099254","DOIUrl":"https://doi.org/10.1109/icomet57998.2023.10099254","url":null,"abstract":"","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126775754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1