2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)最新文献

筛选
英文 中文
Performance of Three-Phase Induction Motor with Space Vector Pulse Width Modulation under Artificial Neural Network Control 空间矢量脉宽调制三相异步电动机在人工神经网络控制下的性能
A. Sahu, D. Joshi
{"title":"Performance of Three-Phase Induction Motor with Space Vector Pulse Width Modulation under Artificial Neural Network Control","authors":"A. Sahu, D. Joshi","doi":"10.1109/ICECCT56650.2023.10179695","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179695","url":null,"abstract":"In this paper, the performance of a three-phase induction motor with space vector pulse width modulation (SVPWM) technique under artificial neural network (ANN) control is studied. The use of ANN control allows for improved performance of the induction motor, including enhanced speed control. The SVPWM technique is used to accurately control the voltage applied to the motor, resulting in improved performance of the induction motor. The operation of the induction motor is compared with proportional-integral (PI) controller. The results of the study show that the use of ANN control in conjunction with SVPWM leads to improved performance of the three-phase induction motor. The system's complete mathematical model is outlined and simulated using the MATLAB/Simulink platform.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133278293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hesitant Triangular Fuzzy Dombi Operators and Its Applications 犹豫三角模糊Dombi算子及其应用
A. B, Vidhya. M
{"title":"Hesitant Triangular Fuzzy Dombi Operators and Its Applications","authors":"A. B, Vidhya. M","doi":"10.1109/ICECCT56650.2023.10179707","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179707","url":null,"abstract":"In this research, the concept of hesitant triangular fuzzy set (HTFS) by integrating HFS and TFS concepts, and we give various HTFS set theoretical operations. On HTFSs, we also create Dombi operations. We describe some Dombi-based aggreagation operators, such as the hesitant triangular fuzzy Dombi weighted averaging operator (HTFDW A) and the hesitant triangular fuzzy Dombi weighted Geometric operator (HTFDWG). Additionally, we add a score for hesitant triangular dombi numbers to the ranking system. In order to choose the most preferable option, we develop a MADM approach where the alternatives are ranked according to the values of the score of HTFDO. The accuracy and efficiency of the created aggregation operators and decision-making approach are finally shown through real-world examples.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"17 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114052367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Online Clearance System Using Web-Based System 基于web系统的在线通关系统开发
Abir AlSideiri, R. M. Tawafak, G. Alfarsi, B. Khudayer, Z. C. Cob
{"title":"Development of Online Clearance System Using Web-Based System","authors":"Abir AlSideiri, R. M. Tawafak, G. Alfarsi, B. Khudayer, Z. C. Cob","doi":"10.1109/ICECCT56650.2023.10179667","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179667","url":null,"abstract":"Computer Software, an Online-based clearance system, is an internet-based system that effectively manages information for colleges and universities. The aim of this study is to develop software for graduated services and follow up to replace the manual method of clearance for graduating students. The system serves as a more reliable and effective means of removing all forms of delay and enabling an understanding of the procedures involved and how to do online clearance. The data was collected from the BUC collage. the method used to develop software for easy service after graduation. The online clearance system was implemented using Basic Visual 2015 for all static and dynamic programming and MYSQL to manage the database. The finding reveals a significant use of the software. The application reveals the effectiveness and efficiency of these services' software.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122584299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Malaria Disease Using Machine Learning Models 使用机器学习模型识别疟疾疾病
S. Kuzhaloli, S. Thenappan, Premavathi T, V. Nivedita, M. Mageshbabu, S. Navaneethan
{"title":"Identification of Malaria Disease Using Machine Learning Models","authors":"S. Kuzhaloli, S. Thenappan, Premavathi T, V. Nivedita, M. Mageshbabu, S. Navaneethan","doi":"10.1109/ICECCT56650.2023.10179665","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179665","url":null,"abstract":"Malaria, caused by Plasmodium parasites in the bloodstream spread by infected mosquitoes, is a highly severe and sometimes deadly disease. Image analysis and machine learning can enhance diagnosis by quantifying parasitemia on blood slides. The building of an autonomous, accurate, and effective model can significantly reduce the need for trained laborers. This article discusses computer-assisted approaches for finding malaria parasites in blood smear images. These procedures consist of obtaining the dataset, preprocessing the images, segmenting the red blood cells, extracting and choosing features, and classifying the images. The approach is based on well-known Convolutional neural network (CNN) models of Plasmodium parasites and erythrocytes. The trained CNN and VGG-19 are given images of infected and uninfected erythrocytes from the same dataset. VGG 19 gives 96% detection accuracy where CNN achieves 94%.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124178858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization techniques for preserving privacy in data mining 数据挖掘中保护隐私的优化技术
K. Devi, K. Balasamy, M. Prathyusha, R. Jeevitha, P. Balasubramanie, M. Eswaran
{"title":"Optimization techniques for preserving privacy in data mining","authors":"K. Devi, K. Balasamy, M. Prathyusha, R. Jeevitha, P. Balasubramanie, M. Eswaran","doi":"10.1109/ICECCT56650.2023.10179655","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179655","url":null,"abstract":"Data mining is one of the significant area where it plays a predominant role in extracting important factors and trends from large volume of data. This covers various areas such as healthcare, education, entertainment, finance, e-commerce applications etc., The data mining domain has used a variety of algorithms, including supervised, unsupervised, semi-supervised, and reinforcement learning techniques. Under healthcare arena, it deals with huge amount of sensitive data such as patients' data such as their name, age, health records. Those sensitive data have been utilized by the intruders for extracting the original data and also became a prey for the authorized access. Hence, the privacy is one of the serious concern that should be addressed. Various privacy preserving in data mining (PPDM) techniques such as anonymization, perturbation, condensation and cryptographic methods are available to protect those data. In this paper, the optimization techniques such as Genetic algorithm(GA) under evolutionary method and Particle swarm optimization(PSO) under meta heuristic method have been discussed and how it plays an important part in providing more optimal results by securing those sensitive and important information from the unauthorized access.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127672540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensitivity Analysis of Polarity Control Electrically doped GaAs-InAs Tunnel Field Effect Transistor for Bio-sensing Application 极性控制电掺杂GaAs-InAs隧道场效应晶体管生物传感灵敏度分析
Dharmender, Piyush Yadav, Rashi Gupta, Shivangi Singh
{"title":"Sensitivity Analysis of Polarity Control Electrically doped GaAs-InAs Tunnel Field Effect Transistor for Bio-sensing Application","authors":"Dharmender, Piyush Yadav, Rashi Gupta, Shivangi Singh","doi":"10.1109/ICECCT56650.2023.10179770","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179770","url":null,"abstract":"In this paper, a novel III-V material-based polarity-controlled electrical doped Tunnel field effect transistor (PC- ED-GaAs-InAs-TFET) biosensor has been proposed. The N+ drain and P+ source regions are created in the intrinsic GaAs and InAs regions using the polarity-controlled concept. In addition, a nano-cavity is etched in the gate oxide towards the tunneling junction to modulate the tunneling mechanism via the immobilized biomolecules. The sensitivity of the proposed biosensor is analyzed using neutral and charged biomolecules, namely Biotin (k = 2.63), Ferro-cytochrome c (k = 4.7), Keratin (k = 8) and Gelatin (k = 12). The PC-ED-GaAs-InAs- TFET biosensor exhibits superior sensitivity in terms of drain current, threshold voltage, subthreshold swing, and $mathrm{I}_{ON}/mathrm{I}_{OFF}$ ratio. The sensitivity of the PC-ED-GaAs-InAs-TFET biosensor, in terms of various cavity dimensions (thickness and height), fill factors and the effect of temperature has also been investigated.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127983654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing Security and Privacy issues for Multi-Cloud Service Providers Using Nessus 分析使用Nessus的多云服务提供商的安全和隐私问题
T. Singh, Ajay Mahaputra Kumar
{"title":"Analyzing Security and Privacy issues for Multi-Cloud Service Providers Using Nessus","authors":"T. Singh, Ajay Mahaputra Kumar","doi":"10.1109/ICECCT56650.2023.10179727","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179727","url":null,"abstract":"Cloud computing security is a broad term that covers a wide range of security and privacy issues for businesses that use multi-cloud services. The service providers must take several factors into account when addressing security for their clients, including access and identity control, in-transit, and other security factors such as confidentiality, vulnerability management, threats, and audits. This paper takes a close look at each of these areas of cloud security and shows how multi-cloud service providers can protect themselves and move forward. It also talks about the problems with protecting systems that use more than one cloud and gives ways to deal with these problems. The reader should understand all of the security concerns that come with multi-cloud setups and how to deal with them in light of the latest cyber threats. The sole motivation of this paper is to raise awareness about multi-cloud service security in different aspects and its impact. Nessus, which is a well-known security tool, has been used to find vulnerabilities and other critical security concerns. Overall, experiments have been performed on three different websites: “www.cuchd.in”, “indiapost.gov.in” and “ajaykumar.in”. Despite this, the mitigation approaches for each vulnerability are explained systematically.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121327378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance And Security Enhanced Improved Hill Cipher 性能和安全增强改进希尔密码
Muralidharan D, B. R, Vijay Sai R, C. K
{"title":"Performance And Security Enhanced Improved Hill Cipher","authors":"Muralidharan D, B. R, Vijay Sai R, C. K","doi":"10.1109/ICECCT56650.2023.10179696","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179696","url":null,"abstract":"Hill cipher is one of the classical ciphers which is considered as a secured one till date apart from its vulnerability of known plaintext attack. Because of its simplicity, in recent days also it is used as one of the building block of cryptography and steganography based algorithms. Many research articles are available to minimize the known plaintext attack vulnerability of Hill cipher. One of the research works suggests to use a second key which varies exponentially with block numbers of the plaintext. Though the proposal is very simple, it is a time consuming process. Furthermore, it has some weak blocks which deteriorates the security. In this research article both issues are rectified by the inclusion of a look-up-table method. The proposed method saves power and enhances the speed by slightly compromising with area. Implementation results show that the proposed method reduces the performance complexity from O(nlogn) to O(n).","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128531264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Approaches on Pedestrian Detection in an autonomous vehicle 自动驾驶车辆中行人检测的机器学习方法
V. Ranganayaki, Jency Rubia J, P. S. Ramesh, K. Rammohan, R.Babitha Lincy, A. Deepak
{"title":"Machine Learning Approaches on Pedestrian Detection in an autonomous vehicle","authors":"V. Ranganayaki, Jency Rubia J, P. S. Ramesh, K. Rammohan, R.Babitha Lincy, A. Deepak","doi":"10.1109/ICECCT56650.2023.10179836","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179836","url":null,"abstract":"In autonomous driving, detecting pedestrians is a safety-critical activity, and the decision to avoid a person must be made as quickly as possible with as little delay as possible. In this work, INRIA and PETA datasets are taken. The progression of the work that is being proposed is broken up into three phases. The first step is to detect edges, the second step is to group colours, and the third step is extracting the feature, which includes screening body parts of pedestrians and detecting shoulder lines. The machine learning classifiers such as SVM, Naïve Bayes and KNN are taken for predicting the pedestrian in the road. The accuracy for SVM, Naïve Bayes and KNN are calculated as 93.58, 94.42 and 98.44 respectively. With the KNN model, it achieves the highest accuracy for predicting the exact images.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128607263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EEG evoked automated emotion recognition using deep convolutional neural network 脑电诱发深度卷积神经网络自动情绪识别
Abgeena Abgeena, S. Garg
{"title":"EEG evoked automated emotion recognition using deep convolutional neural network","authors":"Abgeena Abgeena, S. Garg","doi":"10.1109/ICECCT56650.2023.10179711","DOIUrl":"https://doi.org/10.1109/ICECCT56650.2023.10179711","url":null,"abstract":"As life continues to change in the digital era, it is crucial to perceive a person's emotional state. Affective computing is receiving more attention with the increase in the human-computer interface (HCI). Human emotion recognition employing electroen-cephalogram (EEG) signals has been studied to obtain a person's emotional status for different stimuli. However, it is difficult to identify clear patterns in EEG signals because they have low electrical impulses and are highly sensitive to noise. A deep convolutional neural network (DCNN) was employed in the present study to recognize emotions in EEG signals. For this purpose, a publicly available dataset, DREAMER, was utilized in this study to assess the applicability of the model for emotion classification. The dataset consisted of three-dimensional emotions, that is, valence, arousal, and dominance (VAD). 2D emotions arousal and valence were the most-recognized emotions in existing research. The present study identified the 3D emotions present in the above-mentioned dataset. In this study, raw EEG signals from the DREAMER dataset were pre-processed. Subsequently, three EEG rhythms, theta, alpha, and beta, were extracted using a bandpass filter. The power spectral density (PSD) was computed using fast Fourier transform (FFT) in the feature extraction. Finally, a 1D CNN model is applied to the classification of emotions. In addition, the performance of the proposed model was compared with two machine learning (ML) classifiers: random forest (RF) and extreme Gradient Boosting (XGBoost) classifiers. The highest accuracy (ACC) of 97.6% was obtained using the proposed model in the dominance dimension. The working principles were compared and discussed to determine the suitability of the model for emotion recognition applications.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128521571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信