2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT)最新文献

筛选
英文 中文
Analysis of IoT Big Weather Data For Early Flood Forecasting System 面向洪水早期预报系统的物联网大天气数据分析
J. M. Antony Sylvia, M. Pushpa Rani, B. Aremu
{"title":"Analysis of IoT Big Weather Data For Early Flood Forecasting System","authors":"J. M. Antony Sylvia, M. Pushpa Rani, B. Aremu","doi":"10.1109/icecct52121.2021.9616941","DOIUrl":"https://doi.org/10.1109/icecct52121.2021.9616941","url":null,"abstract":"Due to technological advancements, the Internet of Things (IoT) has been extensively used in a number of environments during this period. The IoT is being utilized successfully, particularly in the field of weather monitoring. As a result, IoT weather sensors generate massive amounts of weather data on a regular basis. This research aims to efficiently analyze the massive amounts of data generated by IoT climate sensors to develop an effective early flood forecasting system. Numerous methods for forecasting floods using historical data have been invented. However, all of these methodologies are becoming inefficient as a result of climate change and the volume of the data. This research provides a methodology for extracting strongly correlated weather features in order to reduce the error in weather forecasts caused by data volume and climate change. The Feed-Forward Artificial Neural Network (FFANN) is used to forecast early rainfall and floods. Furthermore, Chennai has been chosen as the study area for this research. Finally, two experiments are conducted to demonstrate this early flood forecasting system's prediction accuracy and training efficiency. The experimental results demonstrate that the proposed flood forecasting system outperforms recently developed systems in terms of accuracy and training efficiency.","PeriodicalId":155129,"journal":{"name":"2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124069775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Load forecasting by the Main grid controller using ANN and the implementation of demand response using Micro-controller 主电网负荷预测采用人工神经网络,需求响应采用微控制器实现
Seema P N, Gopika Korambil Gopalan, M. Nair
{"title":"Load forecasting by the Main grid controller using ANN and the implementation of demand response using Micro-controller","authors":"Seema P N, Gopika Korambil Gopalan, M. Nair","doi":"10.1109/icecct52121.2021.9616839","DOIUrl":"https://doi.org/10.1109/icecct52121.2021.9616839","url":null,"abstract":"The electric power system is undergoing a wide range of transformation to overcome the shortcomings of the conventional grid system. A smart grid is a modernized version of existing grid which incorporates both electrical and digital networks together. Smart grid is a self healing electrical network which monitors, control and analysis various data using digital technology and can take control actions based on the variations in data. This system can provide clean and sustainable power supply to the consumer and allows the consumer to take part in energy transfer. Smart micro grid is a localized version of smart grid which is limited by electrical and geometrical constraints. To reduce the complexities while opting for a centralized control scheme in a smart micron grid here we are using a hierarchical level control approach. The control levels are classified into primary, secondary and tertiary level control which are associated with smart meter, local micro grid controller and a main grid controller. In this work we are concentrating mainly on tertiary level controller which implies that main grid controller gains the control over consumer premises when the consumption level of consumer increases beyond the predefined limits. This demand response management was done in Mplab using micro controllers. Load forecasting is done in tertiary controller using ANN technique in Matlab.","PeriodicalId":155129,"journal":{"name":"2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121313800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Attack and Anomaly Prediction in IoT Networks using Machine Learning Approaches 使用机器学习方法的物联网网络攻击和异常预测
Binu P.K, K. M, Sreehari M. V
{"title":"Attack and Anomaly Prediction in IoT Networks using Machine Learning Approaches","authors":"Binu P.K, K. M, Sreehari M. V","doi":"10.1109/icecct52121.2021.9616794","DOIUrl":"https://doi.org/10.1109/icecct52121.2021.9616794","url":null,"abstract":"Cyber-attacks are becoming a very common problem we face in IoT networks nowadays. These attacks mainly target the comparatively less powerful IoT and gateway devices so that the attacker can compromise the device much faster. As the IoT infrastructure is getting exponential growth recently, the attacks are also getting the same pace. Based on various studies, almost 90% of attacks targeting IoT networks are Denial of Service (DoS) or Distributed Denial of Service (DDoS). So, like any other aspect, security is an inevitable part of IoT networks and devices because this is now deployed in highly critical areas like space technology, healthcare, smart cities, etc. Understanding these attacks, their behavior pattern, and their defense mechanisms will help to implement a highly safe and secure IoT infrastructure. The system proposed here is a prototype model for detecting the most common DoS attacks at the gateway device itself using the Machine Learning approach. ML approaches can recognize the behavior pattern of the attacks based on the previously trained data and can make efficient predictions with a high accuracy factor. This will help us to take proper countermeasures to protect our IoT network from such potential attacks. The need for a safe and secure IoT ecosystem is an important need for today and especially in the future.","PeriodicalId":155129,"journal":{"name":"2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116925414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Summary Generation Using Deep Learning 使用深度学习生成摘要
Perpetua F. Noronha, Madhu Bhan
{"title":"Summary Generation Using Deep Learning","authors":"Perpetua F. Noronha, Madhu Bhan","doi":"10.1109/ICECCT52121.2021.9616945","DOIUrl":"https://doi.org/10.1109/ICECCT52121.2021.9616945","url":null,"abstract":"Summarization is the process of converting any given long text into a lossy compressed version while preserving the overall essence and meaning of the original given text. A problem in natural language processing is the task of summarizing a voluminous text. This research, lays emphasis on abstractive summarization of the text, a process which generates a coherent, short and meaningful text by learning the context from given input source text. This work is a preliminary attempt to generate abstractive summary. The proposed work uses the Attentional Encoder and Decoder based Sequence to Sequence Recurrent Neural Network model. The proposed research’s primary objective is to get insights on the working of the mentioned Sequence architecture and the intricacies of different subcomponents of the encoders and the decoders architecture working together so as to give a particular end result. The scope of this paper covers an experimentation of performing text summarization process using Encoder and Decoder based Sequential Learning Recurrent Neural Network design. Satisfactory summary results are obtained after the model is experimented and analyzed on the Amazon Fine Food reviews.","PeriodicalId":155129,"journal":{"name":"2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117113516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PMU Based Realtime Fault Detection Algorithm for Transmission Line Faults 基于PMU的传输线故障实时检测算法
V. Vishal, P. S. Shenil
{"title":"PMU Based Realtime Fault Detection Algorithm for Transmission Line Faults","authors":"V. Vishal, P. S. Shenil","doi":"10.1109/ICECCT52121.2021.9616969","DOIUrl":"https://doi.org/10.1109/ICECCT52121.2021.9616969","url":null,"abstract":"Phasor Measurement Units (PMU) have become the backbone of advanced power system monitering due to the unprecedented level of detail it offers when compared to the conventional power system measurement and telemetry. Monitoring of transmission lines using PMU can give insights into power system phenomenon like loss of stability, faults and load encroachments. In this paper an algorithm based on equivalent power factor angle (EPFA) for fault detection is discussed. This algorithm is helpful in understanding the presence of fault which can in turn be used for the design of backup protection algorithms using PMU based measurements. IEEE 9 bus system is used to simulate faults and the EPFA at one of the buses is computed. Fourier coefficients of the EPFA so computed forms the input to train support vector machine (SVM) which is used as a binary classifier to detect the presence of fault. The developed svm has been validated for fault detection effectiveness with case studies.","PeriodicalId":155129,"journal":{"name":"2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117266195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Comparison of PSO, SA and GA tuned PID Controller for Ball Balancer Arrangement 球平衡器布置的PSO、SA和GA整定PID控制器的设计与比较
Apoorv Surana, B. Bhushan
{"title":"Design and Comparison of PSO, SA and GA tuned PID Controller for Ball Balancer Arrangement","authors":"Apoorv Surana, B. Bhushan","doi":"10.1109/ICECCT52121.2021.9616686","DOIUrl":"https://doi.org/10.1109/ICECCT52121.2021.9616686","url":null,"abstract":"This paper presents design and control of a 2D Ball Balancer Arrangement using PID controller tuned with Particle Swarm Optimization (PSO), Simulated Annealing (SA) and Genetic algorithm (GA). The paper also compares the results of proposed control techniques with Classical PID controller. The Ball Balancer Arrangement is a non-linear system with complex plant transfer function. Classical control method such as Classical PID is able to control the Ball Balancer Arrangement but performance is dependent on human expertise. PSO, SA and GA are heuristic algorithms which can find the best solution without the need of human experience. Heuristic algorithms improve the solution in every iteration based on cost function minimization. The comparative analysis of PSO, SA and GA tuned PID is shown in terms of delay time, rise time, and settling time. The designing and simulation have been successfully performed in MATLAB/ Simulink environment.","PeriodicalId":155129,"journal":{"name":"2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115749029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Quantum Computing: Challenges and Opportunities 量子计算:挑战与机遇
Sachin Aralikatti
{"title":"Quantum Computing: Challenges and Opportunities","authors":"Sachin Aralikatti","doi":"10.1109/ICECCT52121.2021.9616647","DOIUrl":"https://doi.org/10.1109/ICECCT52121.2021.9616647","url":null,"abstract":"Quantum computing is considered as good mixture of quantum physics, computer science and information theories. This paper introduces fundamentals needed to understand different layers associated with quantum computing some of them are superposition, entanglement, quantum gates and circuit models like Grover’s algorithm, Shor’s algorithm. The detailed discussion along with matrix representation of quantum gates and fault tolerant Calculation and quantum error correction (QEC) technique, followed by steps involved in simulator design is introduced. Thereafter, it will elaborate hurdles encounter in constructing a quantum computer like Constructing, verification, architecture, quantum error correction, compiler and programming issues and special focus is given on the different layers involved in construction of Q-Algorithm. Finally some of the applications like quantum cryptography is discussed.","PeriodicalId":155129,"journal":{"name":"2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114561748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chronological Poor and Rich Tunicate Swarm Algorithm integrated Deep Maxout Network for human action and abnormality detection 时序贫富被囊虫群算法将深度Maxout网络集成到人类行为和异常检测中
Bhagya Jyothi K L, Vasudeva
{"title":"Chronological Poor and Rich Tunicate Swarm Algorithm integrated Deep Maxout Network for human action and abnormality detection","authors":"Bhagya Jyothi K L, Vasudeva","doi":"10.1109/ICECCT52121.2021.9616637","DOIUrl":"https://doi.org/10.1109/ICECCT52121.2021.9616637","url":null,"abstract":"Human behavior has always been a significant parameter in social interaction and human activity recognition is a major clue that eases the analysis of human character. In recent decades, researchers have gained more attention towards human activity detection that plays a huge part in different domains, like intelligent video surveillance, and human computer communication in order to improve security level. In order to recognize the human action from videos, effective features are required. However, extraction of effective features is still resembles as a challenging process due to changes occurred in human action. In order to counterpart such limitations, this article proposes an effective strategy for human action recognition and abnormality detection using Chronological Poor and Rich Tunicate Swarm Algorithm (CPRTSA)-based Deep Maxout Network. However, the human action recognition and abnormality detection is performed using same Deep Maxout Network, where the network classifier is trained using proposed CPRTSA. The proposed approach provides better accuracy in terms of human action recognition with higher efficiency and the proposed CPRTSA achieved a maximum accuracy of 0.959, maximum sensitivity of 0.963, and a maximum specificity of 0.965.","PeriodicalId":155129,"journal":{"name":"2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114605953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Usual and Unusual Human Activity Recognition in Video using Deep Learning and Artificial Intelligence for Security Applications 使用深度学习和人工智能进行安全应用的视频中常见和不寻常的人类活动识别
Ajeet Sunil, M. Sheth, Shreyas E, Mohana
{"title":"Usual and Unusual Human Activity Recognition in Video using Deep Learning and Artificial Intelligence for Security Applications","authors":"Ajeet Sunil, M. Sheth, Shreyas E, Mohana","doi":"10.1109/ICECCT52121.2021.9616791","DOIUrl":"https://doi.org/10.1109/ICECCT52121.2021.9616791","url":null,"abstract":"The main objective of Human Activity Recognition (HAR) is to detect various activities in video frames. Video surveillance is an import application for various security reasons, therefore it is essential to classify activities as usual and unusual. This paper implements the deep learning model that has the ability to classify and localize the activities detected using a Single Shot Detector (SSD) algorithm with a bounding box, which is explicitly trained to detect usual and unusual activities for security surveillance applications. Further this model can be deployed in public places to improve safety and security of individuals. The SSD model is designed and trained using transfer learning approach. Performance evaluation metrics are visualised using Tensor Board tool. This paper further discusses the challenges in real-time implementation.","PeriodicalId":155129,"journal":{"name":"2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126013185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Relay coordination in DG integrated system DG集成系统中的继电器协调
S. John, M. Ebenezer
{"title":"Relay coordination in DG integrated system","authors":"S. John, M. Ebenezer","doi":"10.1109/icecct52121.2021.9616874","DOIUrl":"https://doi.org/10.1109/icecct52121.2021.9616874","url":null,"abstract":"Distributed generators (DGs) are integrated into the distribution network inorder to reduce power loss, voltage profile improvement, reduction of operation cost and to reduce environmental impacts by conventional power stations. When DGs are integrated into the network and also when network topology is changed, the existing protection system fails to operate properly. The relay miscoordination can be overcome by updating the settings of protection system. In this work, load flow analysis and short circuit analysis for the power system network are done and load current, maximum and minimum possible fault currents are computed. Effect of DG in protection system of a distribution network is observed. Variation in fault current with respect to system factors is analysed. An adaptive overcurrent relay is modelled using Arduino UNO. Particle Swarm Optimisation is done to find out the optimum settings of relays. Relay coordination is done in a four bus system, IEEE 14 bus system and IEEE 13 bus system using the optimal values.","PeriodicalId":155129,"journal":{"name":"2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126070312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信