2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)最新文献

筛选
英文 中文
Optimal Feedback Loop Algorithm for Automatic Control of Ultrasonic Gas Flowmeter 超声气体流量计自动控制的最优反馈回路算法
2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS) Pub Date : 2023-02-02 DOI: 10.1109/ICAIS56108.2023.10073731
Huijie Liu
{"title":"Optimal Feedback Loop Algorithm for Automatic Control of Ultrasonic Gas Flowmeter","authors":"Huijie Liu","doi":"10.1109/ICAIS56108.2023.10073731","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073731","url":null,"abstract":"At present, the signal detection principle of the ultrasonic flowmeter can be roughly divided into propagation velocity difference method, the beam shift method, the Doppler method, correlation method, spatial filtering method and noise method, and hence, the proper selection of the methods will be essential for the success of the modelling. This paper then studies the optimal feedback loop algorithm for the automatic control of ultrasonic gas flowmeter. Firstly, the ultrasonic gas flow measurement principle is introduced, considering that the time difference measurement principle will use the movement time difference of ultrasonic waves in the case of forward flow and reverse flow to measure gas flow. Secondly, realization of the intelligent ultrasonic gas flow measuring system is studied. Here, the Butterworth filters are considered to maintain the useful ultrasonic signal in a proper frequency range by removing high and low frequency noise. Finally, the optimal feedback loop is considered to finalize the model. The proposed experiment will provide the high-speed comparison of signal waveform simulation to show the visualized performance and then, the error comparison analysis in conducted to test the performance under different flow rate.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129025874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Two -Wheeler Hybrid Electric Vehicle using Series Parallel Configuration 采用串并联结构的两轮混合动力汽车设计
2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS) Pub Date : 2023-02-02 DOI: 10.1109/ICAIS56108.2023.10073870
Sandip Shankar Yeole, Sandeep Vasant Kolhe, R. Bibave, Vijay Shivaji Chavan, Bhushan Bhaurao Kadam, Vaibhav Sakharam Bodhe
{"title":"Design of Two -Wheeler Hybrid Electric Vehicle using Series Parallel Configuration","authors":"Sandip Shankar Yeole, Sandeep Vasant Kolhe, R. Bibave, Vijay Shivaji Chavan, Bhushan Bhaurao Kadam, Vaibhav Sakharam Bodhe","doi":"10.1109/ICAIS56108.2023.10073870","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073870","url":null,"abstract":"In India two wheelers are most common mode of transport to a majority of people because of its’s affordability. Though they are also a major cause of pollution almost 20% of total pollution (which is 10% more than the pollution by cars) and increase in demand and supply gap of oil, which was 6 million barrel per day back in 2020 which is estimated to increase by 14.4 million barrels. All of this can be minimized by simply replacing IC engine vehicles by pure electric or Hybrid electric vehicles for two wheelers. This paper discusses the idea of simulation of HEV two-wheeler using power split to interchange power between the IC engine and motor and provide a balanced output to the","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130369875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proving Ownership of Privacy-Protected Cloud Storage Devices 证明受隐私保护的云存储设备的所有权
2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS) Pub Date : 2023-02-02 DOI: 10.1109/ICAIS56108.2023.10073830
Sri Teja Chadalawada, Keerthana Mandadi, Jahnavi Machupally, Vippala Indra Sena Reddy, B. T. Reddy, A. V. Praveen Krishna
{"title":"Proving Ownership of Privacy-Protected Cloud Storage Devices","authors":"Sri Teja Chadalawada, Keerthana Mandadi, Jahnavi Machupally, Vippala Indra Sena Reddy, B. T. Reddy, A. V. Praveen Krishna","doi":"10.1109/ICAIS56108.2023.10073830","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073830","url":null,"abstract":"Systems for cloud storage is growing in popularity. Deduplication, a promising procedure collects only a single replica of recurring data there by reduces cost of cloud storages. Client-side deduplication makes an effort to locate existing deduplication opportunities prior to uploading at the client and avoid using server capacity to upload duplicates of already-existing data. This work, provides mechanism to overcome vulnerabilities and take advantage of client-side deduplication, giving an attacker access to other users' files of any size based on relatively weak hash signatures. More specifically, an attacker who is aware of a file's hash signature can persuade a storage service that it is the rightful owner of the file, at which point the intruder is allowed to acquire the entire file by the server. Proofs-of-ownership (PoWs), that allow a user to effectively prove to a host that the user genuinely owns a file instead of only giving a short summary of it. This work defines the principle of proof-of-ownership under strong security standards and strict efficiency constraints. Then, relying on popular encryption techniques and hash function, this study provides and assess security-related methodologies.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127027002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convergence Analysis of Music Technology: From Audio Digital Watermarking to Denoising Algorithm 音乐技术的收敛性分析:从音频数字水印到去噪算法
2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS) Pub Date : 2023-02-02 DOI: 10.1109/ICAIS56108.2023.10073797
Liu Zhan
{"title":"Convergence Analysis of Music Technology: From Audio Digital Watermarking to Denoising Algorithm","authors":"Liu Zhan","doi":"10.1109/ICAIS56108.2023.10073797","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073797","url":null,"abstract":"In the recent time, the efficient processing of music (or audio) signal considering the safety and performance has been the research hotspot. This study performs a convergence analysis of music technology from the audio digital watermarking to the denoising algorithm. Traditional music information processing methods are more focused on a single processing perspective, that is, improve the signal quality or signal security guarantee, respectively. The comprehensive tool for the analysis is lacking. Hence, this paper firstly proposes a novel audio digital watermarking algorithm considering the QR decomposition and DWT to construct the efficient scenario. Then, the novel denoising algorithm is studied. The reconstructed signal after hard threshold processing has disadvantages such as the discontinuity, oscillation and distortion. Then, the wavelet analysis model is applied into the algorithm to find the optimal value of threshold. After these 2 major innovations, the whole system is then constructed and implemented with experiment. The experimental data of the stereo modulator calibration method is scientific, and the overall experiment has certain robustness.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127032002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of DDoS Attacks using Artificial Gorilla Troops Optimizer based Deep Learning Model 基于深度学习模型的人工大猩猩部队优化器DDoS攻击检测
2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS) Pub Date : 2023-02-02 DOI: 10.1109/ICAIS56108.2023.10073935
S. Govindaraju, Rajrupa Metia, P. Girija, K. Baranitharan, M. Indirani, M. R.
{"title":"Detection of DDoS Attacks using Artificial Gorilla Troops Optimizer based Deep Learning Model","authors":"S. Govindaraju, Rajrupa Metia, P. Girija, K. Baranitharan, M. Indirani, M. R.","doi":"10.1109/ICAIS56108.2023.10073935","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073935","url":null,"abstract":"The importance of security has skyrocketed alongside the adoption of Internet of Things (IoT) services. Software-defined networking (S DN) provides a means of securely managing IoT devices, which were exposed in a current distributed denial-of-service (DDoS) attack. Many IoT devices unwittingly contributed to the DDoS attack. DDoS attacks, one of the most common types of cyberattack, are particularly pernicious since they can cripple a network’s ability to function and render many of its services inaccessible to users. This research used optimised deep learning-based models to detect DDoS in SDN. At first, the dataset’s normal and DDoS attack traffic characteristics were gathered from the SDN. The models are recommended to be simpler, easier to read, and to have a shorter training period when using an NSL-KDD dataset for feature selection approaches. Real-time DDoS attack detection in SDN is proposed in this research using an Long Short-Term Memory (LS TM) models. High accuracy in classification is achieved by utilising an artificial gorilla troop optimizer to pick the features of NSL-KDD. Using less time and material, the proposed IDS was able to achieve a detection accuracy of 97.59%. These findings provide encouraging evidence that DDoS attack detection in SDN could benefit from the use of deep learning and feature selection techniques, which could significantly reduce processing loads and runtimes.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121294514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Combined Architecture of Image Processing Techniques and Deep Neural Network for the Classification of Corn Plant Diseases 图像处理技术与深度神经网络相结合的玉米病害分类体系结构
2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS) Pub Date : 2023-02-02 DOI: 10.1109/ICAIS56108.2023.10073762
Rahul Kumar Vh, Thamizhamuthu R
{"title":"A Combined Architecture of Image Processing Techniques and Deep Neural Network for the Classification of Corn Plant Diseases","authors":"Rahul Kumar Vh, Thamizhamuthu R","doi":"10.1109/ICAIS56108.2023.10073762","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073762","url":null,"abstract":"Agriculture is the economic backbone of a number of countries. The agriculture sector considerably contributes to the overall GDP of a growing nation like India. Corn (Zea Mays) is one of the principal crops farmed in the nation. It is a significant food source and a critical raw element for several businesses. Plant diseases are a severe setback that all farmers endure. These illnesses lead to a drop in yield, a serious concern since the gap between demand and supply keeps rising. This research describes an architecture that utilizes Image Processing Techniques and Deep Learning. The suggested architecture employs the Non-Local Means method for noise reduction, Unsupervised Wiener filter, and Entropy to accomplish picture pre-processing. It uses Otsu’s Morphology and Canny Edge detection Method for picture segmentation. A histogram of Oriented Gradients is utilized for feature extraction, and Deep Convolutional Neural Network categorizes the illness.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116273822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Prototype for PV based Water Pumping Solutions 基于光伏的高效抽水解决方案原型
2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS) Pub Date : 2023-02-02 DOI: 10.1109/ICAIS56108.2023.10073705
Kalaiarasi N, Akshaya Ravichandran, Swathipurna Sahoo
{"title":"An Efficient Prototype for PV based Water Pumping Solutions","authors":"Kalaiarasi N, Akshaya Ravichandran, Swathipurna Sahoo","doi":"10.1109/ICAIS56108.2023.10073705","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073705","url":null,"abstract":"This paper discusses the Cuk and Zeta converter-fed BLDC motors based on power factor correction. The comparative study is based on parameters like torque, stator current, power factor, and rotor speed of both converter-fed BLDC drives. The DC link voltage of the Voltage Source Inverter (VSI) is maintained constant in traditional PFC converter designs. This PFC converter’s primary drawback was complicated control, which necessitates a significant number of sensors. The proposed DC-DC converter follows the voltage follower approach in continuous conduction mode (CCM) to improve the power factor. Also, it helps to reduce switching losses and the stress on power devices. Low-frequency switching is utilized in the VSI to control the speed of the motor by changing the dc bus voltage. The switching loss of VSI is reduced by adopting fundamental frequency switching. This improves the efficiency of the system. Electronic commutation of the BLDC motor helps to eliminate the sensors required for the measurement of DC link voltage and phase currents. The proposed system with proportional-integral (PI) control provides a profitable solution for low-power applications. The performance of converters fed by BLDC motors is studied using MATLAB simulation. The results from Simulink show that the Cuk converter’s performance is better than the Zeta converter. So, the prototype hardware of the suggested model, i.e., the Cuk converter-fed BLDC motor, is implemented.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121509963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systematic Review on on-Air Hand Doodle System for the Purpose of Authentication 以认证为目的的无线手写涂鸦系统综述
2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS) Pub Date : 2023-02-02 DOI: 10.1109/ICAIS56108.2023.10073858
Sathya D, Chaithra V, Srividya Adiga, Srujana G, P. M
{"title":"Systematic Review on on-Air Hand Doodle System for the Purpose of Authentication","authors":"Sathya D, Chaithra V, Srividya Adiga, Srujana G, P. M","doi":"10.1109/ICAIS56108.2023.10073858","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073858","url":null,"abstract":"Air-drawing for authentication or gesture recognition is vastly studied such that new methods for the character drawn can be identified with better accuracy and be independent of any hardware components such as gloves to detect the fingertip movement or any wearable sensor or using any external pen. This article surveys how air-writing is done. Some of them include using fingertips as a pen and having the trained CNN model against it using the techniques DNST and Bi-LSTM for the regression and hand gesture identification and classification. This system had an overall accuracy of 88 percentage. Another system solves the air-writing issue by using deep learning architecture, by executing it on 3D space where the next evolution is numerical digits structured into multiple dimensions time-series extracted from a sensor called LMC. In another system, wi-write recognizes hand writing mainly to overcome blurred vision and neurological diseases in people, this will use COTS WiFi but is a device-free handwriting recognition system. In many other systems deep learning models are used and those parameters can be used to achieve higher recognition rate for example 98 percentage above.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121568755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANN Based Static Var Compensator For Improved Power System Security 基于神经网络的静态无功补偿提高电力系统安全性
2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS) Pub Date : 2023-02-02 DOI: 10.1109/ICAIS56108.2023.10073700
Rushali L. Kapse, V. Chandrakar
{"title":"ANN Based Static Var Compensator For Improved Power System Security","authors":"Rushali L. Kapse, V. Chandrakar","doi":"10.1109/ICAIS56108.2023.10073700","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073700","url":null,"abstract":"The main aim of this article is to determine the effective control signal for the function of damping oscillation by using Multilayer Feed Forward Network(MLFN) based SVC. MLFN based SVC is designed to achieve reduce settling time of response of different parameters during large and sudden disturbance in multimachine power system. The comparative analysis of proposed ANN based SVC with PI based SVC using MATLAB environment for testing and validation.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"58 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113986759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and Simulation of Selfish Mining Attacks in Blockchain Network using Evolutionary Game Theory 基于进化博弈论的区块链网络自私挖矿攻击建模与仿真
2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS) Pub Date : 2023-02-02 DOI: 10.1109/ICAIS56108.2023.10073670
K. R, K. Pitchai
{"title":"Modeling and Simulation of Selfish Mining Attacks in Blockchain Network using Evolutionary Game Theory","authors":"K. R, K. Pitchai","doi":"10.1109/ICAIS56108.2023.10073670","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073670","url":null,"abstract":"This paper presents a method of attacking proof of work consensus based on selfish mining. The current mitigation strategies for the blockchain network's egotistical mining are not self-sufficient after a certain number of generations. Additionally, these solutions do not address the network nodes' cooperative and defector behavior. Additionally, more blocks from self-centered nodes are added to the blockchain in this development. This study analyzes to what extent these risks may affect cryptocurrency extraction. Minority mining pools keep some blocks private by deviating from the original mining protocol. An attacking collection aims to increase revenue by wasting other miners' computing power. By adopting a novel approach in this study. To determine whether such attacks are profitable. Using the interaction between pools in this model, mining strategies can be derived using game theory. By analyzing the relative revenue rather than the monetary award, this model simulates the game for a Bitcoin blockchain. This illustrates the usefulness of considering the cost of a strategy when discussing the potential outcomes of selfish mining strategies. The author highlights scenarios where the system might be compromised based on the way the parameters are set up in the game.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115943882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信