{"title":"Research on PLC Technology of Electrical Engineering Automation Control Based on Artificial Intelligence","authors":"Haitao Yu, Yanfeng Xue","doi":"10.1109/ICKECS56523.2022.10060622","DOIUrl":"https://doi.org/10.1109/ICKECS56523.2022.10060622","url":null,"abstract":"In the current society, China's electrical engineering (EE) automation technology has made great progress, however, there are still many shortcomings, and it is necessary to continuously improve its automation control mode. Therefore, in order to effectively improve the quality of EE automation control technology, it is necessary to actively explore and apply the new PLC technology. In order to realize the effective application of EE automation control technology, it is necessary to analyze and study its specific implementation mode, and improve the operation quality of PCS through the reasonable use of artificial intelligence (AI) technology and PLC technology. The main purpose of this paper is to conduct research on PLC technology for EE automation control based on AI. In this paper, the research on AI and PLC technology is carried out, the selection principle of PLC is introduced in detail, the PLC system is set up for the hardware structure of PLC, and the system verification of the embedded soft PCS is done in the PCS test from the realization of its function, the realization of the underlying system and the tension system module, and the feasibility of the system can be proved by the experimental phenomenon. Through experimental verification and field application, the embedded soft PCS proposed in this paper meets the needs in the actual control process of the machine.","PeriodicalId":171432,"journal":{"name":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129804145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Brain Tumor De-noising MRI Image and Superpixel SLIC segmentation","authors":"Snehalatha Naik, S. Patil","doi":"10.1109/ICKECS56523.2022.10060174","DOIUrl":"https://doi.org/10.1109/ICKECS56523.2022.10060174","url":null,"abstract":"Human brain tumors are the most lethal type of cancer problems, a high level of precision and its non-invasive nature. Since MRI image is particularly well suited for brain tumor investigations due to its excellent contrast for soft tissue problems, non-invasive nature, high spatial resolution and ability to segment brain tumors; this is significant in the area of MRI. In this paper, the brain tumor is segmented with superpixels using a simple linear iterative cluster (SLIC). MRI image of the malignancy, which has significantly progressed, particularly in the stages of infection. Patients who are receiving therapy have much higher chances of survival than those who are not, especially early in the course of their illness. Brain tumor segmentation can be analyzed precisely with a magnetic resonance image (MRI), which gives a proper anatomical structural study. The pathological regions like cancer, multiple sclerosis lesions, can be viewed perfectly. Pixel-wise segmentation is being appeared in image segmentation to for a cluster. It can also be used to divide an image into various subregions. In the field of MRI brain tumor segmentation, is important because MRI are especially well suited for brain studies due to its high quality contrast for soft tissue.","PeriodicalId":171432,"journal":{"name":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129963227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Optimized Job Scheduling Mechanism for Mapreduce Framework Using DIW-WOA in Big Data","authors":"Vishal Kumar, Sumit Kushwaha","doi":"10.1109/ICKECS56523.2022.10059849","DOIUrl":"https://doi.org/10.1109/ICKECS56523.2022.10059849","url":null,"abstract":"For processing, storing, and managing huge amounts of data, big data has turned out to be famous. The most popular map reduce programming model is the open-source Hadoop. It executes the MapReduce (MR) programming model to process big data with MR jobs. Nevertheless, scheduling MR jobs across multiple nodes has been regarded as an optimization issue in spite of current endeavors toward ameliorating MR's performance. Hence, to carry out an MR Job scheduling centered on Completion Time (CT) and cost whilst meeting the security constraints, a new optimization algorithm like Decreasing Inertia Weight induced Whale Optimization Algorithm (DIW-WOA) is proposed. At first, for big data clustering, a Butterfly Optimization-centered K-Means clustering Algorithm (BO-KMA) is applied. At last, for scheduling the client's tasks or jobs to the optimized scheduler. The whale optimization algorithm is hybridized with inertia weight concept and finally DIW-WOA is employed. When weighed against the other well-known algorithms, the experimental outcomes exhibit that the proposed algorithms for data clustering, DS and Task Scheduling (TS) achieve better performance in terms of make-span and throughput. It can be incorporated into the Hadoop environment.","PeriodicalId":171432,"journal":{"name":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130030545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Methodology to Locate Image Falsification Using Adaptive Segmentation and Feature Extraction","authors":"T. Parameswaran, S. Kaushik, Yogesh","doi":"10.1109/ICKECS56523.2022.10059953","DOIUrl":"https://doi.org/10.1109/ICKECS56523.2022.10059953","url":null,"abstract":"The requirement for confirming and unwavering quality of computerized images, approving their substance and identifying fabrications is vital. Consequently, noteworthy space in advanced picture verification is Copy-move fraud recognition (CMFD). The Adaptive division technique is one to decide the duplicate move imitation location. The image is adaptively divided into non-covering and uneven fragments using the proposed versatile division computation technique. The component attentions are then extracted as piece determinations from apiece square, and the square choices are then harmonized with one another to identify the labelled component focuses, indicating the alleged fraud or falsification locations. To locate the falsification areas all the more accurately, the imitation district extraction algorithmic is utilized that substitutes the element focuses with little super pixels as highlight pieces so consolidates the neighboring blocks that have proportional shading alternatives into the component squares to get the joined locales. Finally, merge the localities and apply the morphological process to construct the classic faked areas.","PeriodicalId":171432,"journal":{"name":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130238950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of English Teaching Comprehensive Evaluation System Based on Improved GLR Algorithm","authors":"Jianxiang Wang, Caiyun Li, Yan Wang","doi":"10.1109/ICKECS56523.2022.10060737","DOIUrl":"https://doi.org/10.1109/ICKECS56523.2022.10060737","url":null,"abstract":"With the continuous development of campus network and information technology, computers have entered every corner of society, such as schools and families. The traditional teaching evaluation method is no longer suitable for the current teaching form that is developing rapidly. In order to adapt to the new situation and make full use of modern infrastructure, online teaching evaluation will become the mainstream form of school evaluation. This system adopts the B/S system structure and GLR algorithm, introduces each functional module, GLR algorithm, and comprehensive evaluation model of the system in detail, and then designs the software and hardware development environment of the system. Finally, through the B/S system structure and GLR The application of the algorithmic English teaching comprehensive evaluation syntax analyzer finally realizes the function of the teacher evaluation management module. The system test shows that the query evaluation data in the comprehensive English teaching evaluation of the system meets the requirements, and the modified evaluation data can be entered normally and the data can be deleted normally. The comprehensive evaluation data is calculated correctly, which further shows that the system has excellent applicable value.","PeriodicalId":171432,"journal":{"name":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129424539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual Digital Intelligent Technology in Enterprise Human Resource Management System","authors":"Ling Wu, Hao Jiang","doi":"10.1109/ICKECS56523.2022.10060789","DOIUrl":"https://doi.org/10.1109/ICKECS56523.2022.10060789","url":null,"abstract":"With the application and popularization of virtual digital intelligent technology, human resource management (HRM) system is playing a huge economic benefit, and its application can significantly enhance the competitiveness of enterprises. At present, most enterprises in China have used HRM system, but some management systems have not achieved the expected application effect. How to locate the actual needs of enterprises and how to successfully implement HRM system in enterprises and achieve the expected application effect are the problems faced by enterprises. This paper uses the virtual database established by virtual technology to realize the management of the system's human data, and then combines the digital technology in the HRM system's employee information management, attendance management, salary management and other modules for digital management, positioning the system function as dealing with trivial and redundant HRM transactions, and truly achieving “process”, thereby improving the overall work efficiency. Finally, through system testing, the system defects are corrected to make the HRM system meet the needs of enterprise users.","PeriodicalId":171432,"journal":{"name":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129594666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Operation Status Evaluation Monitoring System Based on Machine Learning Algorithm","authors":"Xing Huang, Jinkai Li, Yang Liang","doi":"10.1109/ICKECS56523.2022.10059633","DOIUrl":"https://doi.org/10.1109/ICKECS56523.2022.10059633","url":null,"abstract":"After decades of steady development, the Internet industry has become an important driving force for global economic and social development, and the scale of the network is growing. The evaluation and monitoring system of network operation status plays a vital role in ensuring the normal operation of the network, diagnosing network faults in time, and meeting the service needs of different users. The purpose of this paper is to study the network operation status evaluation and monitoring system based on machine learning algorithm, mainly to expound the background and importance of this topic, as well as the development status at home and abroad, mainly to study the software architecture of the network operation monitoring system in the IP network environment And monitoring architecture design and implementation, further theoretical research on background server load balancing technology, and a load balancing mechanism based on machine learning algorithm is proposed. The database business simulation results show that the database query time of the load balancer based on the genetic algorithm is about 3.3 seconds, while the load balancer based on the machine learning algorithm only needs 2.2 seconds, a reduction of nearly 0.9 seconds. It can be seen that machine learning algorithms also have great advantages in database query business.","PeriodicalId":171432,"journal":{"name":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129622155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Enterprise Management Decision Support System Based on Big Data Mining Technology","authors":"L. Duan","doi":"10.1109/ICKECS56523.2022.10060269","DOIUrl":"https://doi.org/10.1109/ICKECS56523.2022.10060269","url":null,"abstract":"With the rapid progress of computer management technology, many enterprises are making full use of network data. Convenient data analysis improves the efficiency of enterprise management decision-making. During this period, some Internet industries put forward the design approach of enterprise management decision-making system. On the basis of big data mining technology, the construction of management decision support system has become a research topic of many scholars. This paper puts forward the theory of big data mining. Finally, this paper explains the preparation for the operation of the system and the functions to be realized.","PeriodicalId":171432,"journal":{"name":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128537159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Wang, Yazhen Wang, Yang Yu, Zhongxing Pan, Rui Sun, Yuanyuan Kong, Chunfang Zhang
{"title":"Water Chemical Oxygen Demand Detection System Based on LASSO Algorithm","authors":"N. Wang, Yazhen Wang, Yang Yu, Zhongxing Pan, Rui Sun, Yuanyuan Kong, Chunfang Zhang","doi":"10.1109/ICKECS56523.2022.10060399","DOIUrl":"https://doi.org/10.1109/ICKECS56523.2022.10060399","url":null,"abstract":"With the increasingly serious water environment problems, water quality safety has attracted much attention from the society. At present, chemical oxygen demand (COD) is a common monitoring item in water quality monitoring. The purpose of this paper is to study the design of water chemical oxygen demand detection system based on LASSO algorithm. Design the development environment and usage of the whole system in general, and design and implement the display functions in detail. Finally, the monitoring data of the water quality chemical oxygen demand detection system is integrated, the pollutant attenuation is calculated, the pollutant attenuation model is established, and the pollutant attenuation value is calculated through the pollutant attenuation coefficient. From the water quality indicators, 10 available variables were screened for quantification, and the Lasso method was used to select the influencing factors. Finally, water temperature, pH, transparency, and electrical conductivity were determined. These four variables had the most significant impact on algal blooms.","PeriodicalId":171432,"journal":{"name":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128833549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison and Analysis of Grounding System Scheme of Intelligent Energy Station “Multi-station Fusion” Project based on CDEGS Simulation","authors":"Jiangmin Liu, Qiang Huang, Jianfeng Zhang","doi":"10.1109/ICKECS56523.2022.10059650","DOIUrl":"https://doi.org/10.1109/ICKECS56523.2022.10059650","url":null,"abstract":"This paper analyzed the earthing system of traditional stations such as substations, data centers, and energy storage stations, established the calculation boundary conditions and requirements of the earthing system. Through CDEGS modeling and simulation, the characteristics of the decentralized and the joint earthing system are compared and analyzed. The joint earthing system is recommended as the earthing scheme of the “multi-station integration” project; By taking appropriate reduction measures, the earth potential rise, step potential difference and touch potential difference meet the requirements of relevant boundary conditions, so as to improve the comprehensive energy efficiency and safety of smart energy stations. The results of this study have been piloted in some power grid projects, which is conducive to improving the comprehensive energy efficiency and reducing the construction and operation cost, and can provide reference cases and basis for the grounding system design of more smart energy station “multi-station integration” projects in the future.","PeriodicalId":171432,"journal":{"name":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","volume":"43 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120926409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}