2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)最新文献

筛选
英文 中文
Autonomous Underwater Robotic Electric Vehicles for Inter-Robot Line-of-Sight Tracking and Range Communication 用于机器人间视线跟踪和距离通信的自主水下机器人电动车辆
A. Raveendra, R. Shanmugasundaram, J. Sailaja, G. Boosa, I. Prasanth, Ashish Verma
{"title":"Autonomous Underwater Robotic Electric Vehicles for Inter-Robot Line-of-Sight Tracking and Range Communication","authors":"A. Raveendra, R. Shanmugasundaram, J. Sailaja, G. Boosa, I. Prasanth, Ashish Verma","doi":"10.1109/ICECCT56650.2023.10179670","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179670","url":null,"abstract":"The use of underwater robotic vehicles (URVs) for scientific inspection of the deep sea, oceanographic mapping, littoral survey, exploitation of underwater resources, protection of the marine environment, and so on, has grown dramatically in recent years. An underwater robot is more difficult to design than a vehicle for use on land or in space. In order to circumvent this issue, we offer a hybrid optimization approach for AUV path planning in an obstacle-filled environment subject to communication limitations. To coordinate several AUVs in a fixed topology environment, a PD controller is employed. A remotely operated underwater vehicle (ROV) is a type of submersible underwater vehicle that can operate without human intervention. It is controlled by an on board computer to perform assigned tasks. Due to the intricacy of the AUV motion control problem, a simulation environment was built in MATLAB/SIMULINK utilising the specifications of the widely used INFANTE AUV. The simulation studies have analysed the control performances under a variety of motion control scenarios, including coordination control, path tracking, and obstacle avoidance.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129122640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FPGA Implementation of High Speed Convolutional Encoder and Viterbi Decoder for Software Defined Radio 软件无线电高速卷积编码器和维特比解码器的FPGA实现
Hanchinal Punit Basavaraj, Pappa M
{"title":"FPGA Implementation of High Speed Convolutional Encoder and Viterbi Decoder for Software Defined Radio","authors":"Hanchinal Punit Basavaraj, Pappa M","doi":"10.1109/ICECCT56650.2023.10179840","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179840","url":null,"abstract":"Attenuation, interference, noise, and distortion affect any wireless communication system's data transfer, making it more difficult for the receiver to receive precise data. Convolution encoder is used to fix errors at the receiver end. Software defined radio may adjust to different encoding and modulation schemes by changing its configuration. In this work, convolutional encoding with a 1/2 code rate and a 3 length constraint is proposed. The updated Viterbi decoder architecture optimizes the key route, enabling higher speeds. MATLAB is used for simulation to verify the Viterbi design. Verilog HDL for RTL coding and a Xilinx Spartan Series FPGA is used in the implementation. ModelSim and Vivado are used for functional and timings simulations.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129138029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of AI/ML in Network-Slicing-Based Infrastructure of the Next-Generation Wireless Networking Systems AI/ML在下一代无线网络系统基于网络切片的基础设施中的应用
A. Haldorai, Ravishankar. C. V, Q. Mahdi, P. Devasudha
{"title":"Application of AI/ML in Network-Slicing-Based Infrastructure of the Next-Generation Wireless Networking Systems","authors":"A. Haldorai, Ravishankar. C. V, Q. Mahdi, P. Devasudha","doi":"10.1109/ICECCT56650.2023.10179649","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179649","url":null,"abstract":"The future iteration of cellular networking systems will be very dynamical and variable due to the incorporation of telecommunications with varying sizes, diverse wireless access, and connectivity resources. Emergent applications e.g., machine-to-machines communications, industrial automations and autonomous driving, have more complex requirements based on latency and reliability. The complex requirements pose critical issues to resource orchestration, management of networks, and architecture design in next-generation wireless networking systems. Beginning with demonstrating these issues, this research contributions focusses on providing a critical understanding on the general infrastructure of the next-generation wireless networking systems and research directions under this general infrastructure. The first part of our discussion introduces infrastructure centered on network slicing and specifies location and the reason as to why AI should be deployed there. Generally, this research defines the potentials and benefits of artificial intelligence-based methods in the study of next-generation wireless networking systems.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122384460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Five Level Cascaded Multilevel Inverter by Level Shift & Phase Shift PWM Techniques 电平移位与相移PWM技术对五电平级联多电平逆变器的比较分析
Champa P N, Abhay Deshpande A, K. Venkatesha
{"title":"Comparative Analysis of Five Level Cascaded Multilevel Inverter by Level Shift & Phase Shift PWM Techniques","authors":"Champa P N, Abhay Deshpande A, K. Venkatesha","doi":"10.1109/ICECCT56650.2023.10179647","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179647","url":null,"abstract":"Most of the applications in industries require medium and high voltage so hence multilevel inverters (MLI) are gaining significant importance [1]. This paper gives an insight of different modulation strategies such as phase shift, level shift used for single phase five level cascaded H-bridge (CHB) MLI for reducing total harmonic distortions with high-power handling capability by increasing its voltage level. Also, emphasis more on multicarrier PWM strategy for the CHB MLI. A simulation model of five level cascaded H-bridge multilevel inverter is developed using MATLAB/SIMULINK and its total harmonic distortions has been analyzed.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130799660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Advanced Intrusion Detection Algorithm for Network Traffic Using Convolution Neural Network 一种基于卷积神经网络的网络流量入侵检测算法
Arun Kumar Silivery, K. R. Mohan Rao, Ramana Solleti
{"title":"An Advanced Intrusion Detection Algorithm for Network Traffic Using Convolution Neural Network","authors":"Arun Kumar Silivery, K. R. Mohan Rao, Ramana Solleti","doi":"10.1109/ICECCT56650.2023.10179767","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179767","url":null,"abstract":"There has been rapid advancement in networks and technology over the past few years, and Internet service providers are now available anywhere in the world. The number of thefts has increased, and many current systems have been breached. As a result, the need for creating information security technology to spot new attacks has grown significantly. An Intrusion Detection System (IDS) combines machine learning and deep learning algorithms to discover network abnormalities, is an essential information security technology. The central concept of this study is to find the elusive assault bundle by using a high-level intrusion detection system with high network performance. Likewise, in this approach, the attack detection is completed. The proposed system has shown that empowering brings incredible precision.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130224447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling and Controlling of AC/DC Hybrid Microgrid 交直流混合微电网的建模与控制
D. Kishore, Muchhupalli Saimanoj, Adapala Sri Venkata Sai Kishore, Devadi Hari Krishna Veerendra
{"title":"Modeling and Controlling of AC/DC Hybrid Microgrid","authors":"D. Kishore, Muchhupalli Saimanoj, Adapala Sri Venkata Sai Kishore, Devadi Hari Krishna Veerendra","doi":"10.1109/ICECCT56650.2023.10179709","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179709","url":null,"abstract":"As a result of climate change, renewable energy sources like solar and wind have become the most popular choice for distributed generators (DGs). Power sources including wind, solar, biomass, mini-hydro, fuel cells, and microturbines will help boost decentralised power production. Electricity systems may benefit from distributed generation in a number of ways, including environmental friendliness, scalability, and the use of nonconventional microsources. A regulated microgrid is comprised of loads and distributed generators. Microgrids may function whether or not they are connected to the main power grid. Microgrids provide power system connections to variable renewable AC and DC sources and loads while minimising the need for reverse conversions in AC or DC grids. Connecting DGs to the utility/grid through power electronic converters raises questions about the security and integrity of the connected systems. Local dependability, feeder loss reduction, local voltage support, waste heat utilisation, voltage sag correction, and uninterruptible power supply are just some of the client demands that may be met by tailoring the microgrid to their specific requirements. In order to better understand how hybrid AC/DC microgrid systems function when connected to the mains, this research evaluates their efficiency. Microgrids use renewable energy sources such as solar panels, wind turbines, and batteries. The DC and AC sub-grids are synchronised by the manipulation of converters. MATLAB/Simulink is responsible for generating the results.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127845517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automation of Short Answer Grading Techniques: Comparative Study using Deep Learning Techniques 简答评分技术的自动化:使用深度学习技术的比较研究
Arunima Divya, Vivek Haridas, Jayasree Narayanan
{"title":"Automation of Short Answer Grading Techniques: Comparative Study using Deep Learning Techniques","authors":"Arunima Divya, Vivek Haridas, Jayasree Narayanan","doi":"10.1109/ICECCT56650.2023.10179759","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179759","url":null,"abstract":"Automatic short answer grading (ASAG) techniques have been shown to cut down on the time and work needed to grade exams, and it is a method that is becoming more and more common, especially with the rise in popularity of online courses. This study compares the results of 7 pre-trained embedding models using just one feature to automatically grade brief responses: the similarity between the model answer's and the student answer's embeddings. Regression models are developed and evaluated to predict a short answer's score based on the similarities between all pairs of answers in the Mohler dataset. The predictions are evaluated by comparing the Root Mean Squared Error (RMSE) and Pearson correlation scores of each model.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131688061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Placement of Micro-Phasor Measurement Units in Distribution Network using Pattern Search Algorithm 基于模式搜索算法的配电网微相量测量单元优化配置
R. Manam, Ramesh Adireddy, Lakshmi Kambampati, Manoz Kumar Reddy Karri, Tata Rao Donepudi, S. Rayapudi
{"title":"Optimal Placement of Micro-Phasor Measurement Units in Distribution Network using Pattern Search Algorithm","authors":"R. Manam, Ramesh Adireddy, Lakshmi Kambampati, Manoz Kumar Reddy Karri, Tata Rao Donepudi, S. Rayapudi","doi":"10.1109/ICECCT56650.2023.10179715","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179715","url":null,"abstract":"This paper presents a Pattern Search (PS) algorithm for optimal placement of Micro-Phasor Measurement Units (M-PMUs) in a distribution network to obtain complete observability through which security of network can be attained. By the distribution state estimation process, these M-PMU measurements can help to estimate the state of every node in the network. The pattern search algorithm is a nonlinear, constrained procedure used to optimize network locations for M-PMU placement. Redundancy bus nodes in the feeder network are considered in the optimization process to minimize PMU locations. The locations of M-PMUs with and without radial buses are compared. A redundancy index (RI) at the node and a complete network observabilty index (CNOI) for the entire network are proposed to assess network observabilty. The proposed indices can show whether the system is completely observable or not. Test cases that are MATLAB-programmed include the IEEE-13, 33, and 69 feeder networks. The effectiveness of the findings in the optimization of nonlinear constraints is shown by comparison with other widely used techniques.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125393131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Redundancy, Data Phishing, and Data Cloud Backup 数据冗余、数据钓鱼、数据云备份
M. Lokesh, Anjali Devi, U. D. Chowdary, P. V. N. S. D. Lakshmi, G. Rao
{"title":"Data Redundancy, Data Phishing, and Data Cloud Backup","authors":"M. Lokesh, Anjali Devi, U. D. Chowdary, P. V. N. S. D. Lakshmi, G. Rao","doi":"10.1109/ICECCT56650.2023.10179679","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179679","url":null,"abstract":"Data today is extremely complex and massive in size. By taking these factors into account, machine learning and ETL techniques will find it much easier to separate useful data from unusable raw data. In web technology, OLTP and OLAP are used to manipulate data on a daily basis. During the transaction, a massive amount of data is maintained in the database or data warehouse. There was no Cloud storage to back up data in the past. Because of the significant increase in internet usage, people are sharing more of their personal information online. Cybercriminals can now access a vast amount of personal data and financial activities. Phishing is one instance of a very efficient type of cybercrime that allows offenders to trick users and obtain crucial data. Phishing has advanced into a more complex attack vector since the first known instance was published in 1990. One of the most common online fraud types now is phishing. Phishing attacks can cause serious losses for their victims, including the theft of confidential information, identities, businesses, and state secrets. This article evaluates these attacks by addressing existing phishing techniques and discussing the current state of phishing. Phishing attacks have been classified in studies based on common phishing methodologies and defences, ignoring the importance of the entire phishing lifecycle. This article provides a new, in-depth model of the anatomy of phishing attacks, including attack phases, attacker types, threats, targets, attack media, and attacking strategies. The suggested physiology would also help readers understand the lifecycle of a phishing attack, which would aid in the development of a comprehensive anti-phishing system. This will improve public awareness of phishing attacks and the methods used. New approaches are also proposed, and certain preventive measures are investigated.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126878494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interleaved DC-DC Boost Converter with Coupled Inductors 带耦合电感的交错DC-DC升压变换器
Sivaprasad Kollati, Godi Poojitha, Bobbepalli Gopi, Kunche Swarna Nikhitha
{"title":"Interleaved DC-DC Boost Converter with Coupled Inductors","authors":"Sivaprasad Kollati, Godi Poojitha, Bobbepalli Gopi, Kunche Swarna Nikhitha","doi":"10.1109/ICECCT56650.2023.10179736","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179736","url":null,"abstract":"The purpose of this research is to come up with an original design for a high-step-up dc-dc converter that might be used in decentralised power plants. This concept is built on a foundation of a pair of capacitors and a single inductor that is coupled together. The energy that is stored in the connected inductor is used to charge the two capacitors in parallel during the time when the switch is off and to discharge them in series during the time when the switch is on. This results in a high step-up voltage gain. In addition, the energy lost by the linked inductor's leaky inductance may be recycled via the use of a passive clamp circuit. As a result, the strain that the primary switch experiences from the voltage is minimised. Utilizing a switch that has an RDS that has a low resistance may help reduce the amount of conduction loss (ON). Since the problem with the diodes' reverse-recovery has been fixed, the efficiency could be able to be improved even more. There is a focus on providing in-depth descriptions of the operating principle as well as steady-state investigations.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123345928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信