2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)最新文献

筛选
英文 中文
Performance Evaluation of CMLI with Various Fault Conditions 多种故障条件下CMLI的性能评价
Ranjith Kumar Gatla, N. V. Prasad K, Jiang-hua Lu, Mahesh Thati, D. Kumar, D. S. M. Rao, K. Reddy
{"title":"Performance Evaluation of CMLI with Various Fault Conditions","authors":"Ranjith Kumar Gatla, N. V. Prasad K, Jiang-hua Lu, Mahesh Thati, D. Kumar, D. S. M. Rao, K. Reddy","doi":"10.1109/ICAECC54045.2022.9716690","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716690","url":null,"abstract":"In this decade, Cascaded Multilevel Inverter (CMLI) industry claps the pledge with substantial progress and significant accomplishments to improve the performance, evaluation, development and establishment of inverters in renewable energy sources, electrical machine drives and mechanical drive applications and so on. Fault diagnosis in multilevel inverters has taken worthwhile attention into account in this era. This paper evaluates the performance of the five-level CMLI with various fault conditions. The performance evaluation of the CMLI has been done by considering the occurrence of single and multiple switch faults with RL load condition. In RL-Load condition, the current and voltage behavior of the IGBT module at each voltage level have been analyzed at different fault conditions.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129436869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mitigation of Harmonics in Distributed System with D-GCSC fed Loads using closed loop control of DSTATCOM 基于DSTATCOM闭环控制的D-GCSC负载分布式系统谐波抑制
Venu Yarlagadda, R. Geshmakumari, J. Rao, L. Gadupudi
{"title":"Mitigation of Harmonics in Distributed System with D-GCSC fed Loads using closed loop control of DSTATCOM","authors":"Venu Yarlagadda, R. Geshmakumari, J. Rao, L. Gadupudi","doi":"10.1109/ICAECC54045.2022.9716716","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716716","url":null,"abstract":"Modern Distributed systems are equipped with plenty of non-linear loads viz. Computers, Electronic Loads, SMPS and many more Power Electronics based loads. These loads are injecting both voltage and current harmonics into the utility grid and distribution systems. The presence of harmonics is very damaging to all equipment which has been connected to the point of common coupling (PCC). This article focuses engrossed on the distribution system, incorporated of feeders with Distribution GTO Thyristor controlled Series Capacitor (D-GCSC) fed R and RL loads. This article entrust the simulation results with FFT analysis focused on THD of current and voltage waveforms, in two stages, one is with D-GCSC feeding resistive load and second is RL load. The distribution systems have been simulated without and with DSTATCOM for both the stages of D-GCSC fed loads and presented the results. The DSTATCOM is designed and closed loop control circuit have been developed and simulated the same which is quite effective in mitigating the Voltage as well as Current harmonics in distributed systems comprising of nonlinear Loads.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131503471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
FHP: Facial and Hair Feature Processor for Hairstyle Recommendation FHP:用于发型推荐的面部和头发特征处理器
Manan Doshi, Jimil Shah, Rahul Soni, Soni Bhambar
{"title":"FHP: Facial and Hair Feature Processor for Hairstyle Recommendation","authors":"Manan Doshi, Jimil Shah, Rahul Soni, Soni Bhambar","doi":"10.1109/ICAECC54045.2022.9716600","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716600","url":null,"abstract":"Hairstyles contribute majorly to an individual’s physical appearance. It is commonly observed that there is a huge gap between customer’s expectations and the barber’s understanding leading to post-haircut dissatisfaction. A major cause of this problem is that users lack the understanding of utilizing feature information while selecting a suitable hairstyle. A model that extracts essential features for decision-making can improve customer satisfaction. In this paper, we propose the FHP architecture that extracts features from user-submitted images that are crucial to hairstyle recommendations. The architecture consists of two major pipelines for extracting facial and hair features. The process starts with image segmentation and parsing. The segmented facial and hair regions are given as input to the two pipelines for extracting face shape, skin tone, hair texture, and hair color. These four features can then be used in the development of an expert system for hairstyle recommendations.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128968716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of malicious activity for mobile nodes to avoid congestion in Wireless Sensor Network. 无线传感器网络中移动节点的恶意活动检测以避免拥塞。
S. Suma, Bharati Harsoor
{"title":"Detection of malicious activity for mobile nodes to avoid congestion in Wireless Sensor Network.","authors":"S. Suma, Bharati Harsoor","doi":"10.1109/ICAECC54045.2022.9716673","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716673","url":null,"abstract":"Applications of Wireless Sensor Network (WSN) are widely used in different areas. Packet drop occurs due to congestion-related issues like limited bandwidth, link failure, and interference also misbehaving node drops the packet to harm the network thus, provisioning of quality of service (QoS) for routing in mobile nodes for WSN is a challenging issue. Securing the mobile nodes from attackers has become one of the crucial aspects of providing QoS since nodes are weak to different kinds of attacks and threats that impact network connectivity and functionality. In WSN differentiating packet loss due to congestion or malicious node is a tedious job. The black-hole attack is examined to be an epidemic and popular passive attack that degrades overall reliability and network performance by dropping all the incoming packets. In the course of Black-hole node pretends that it has the shortest route to destination and intent to deceive every node in the network. In this paper we differentiate packet loss due to congestion or by malicious node, our scheme utilizes on-demand link and energy-aware dynamic multipath (O-LEADM) routing scheme for WSN to detect black-hole node by integrating bait method, the behavior of node is analyzed using control messages destination-sequence (des-Seq) and reply-sequence (rep-Seq) while accessing the channel. During route discovery, each intermediated node in the network sends the des-Seq message to all its neighbor nodes, and then neighbor nodes intern replies to the intermediate node by sending a rep-Seq message. If des-Seq and req-Seq from the neighbors do not match, then the node is said to be malicious. Connection to the network layer is allowed to an intermediate node if des-Seq and rep-Seq match. Channel availability and link quality parameter estimate the link stability thus nodes select forwarding based on their behavior and are capable of achieving QoS parameters such as link quality, residual energy, and higher packet delivery. Simulation under various network conditions is experimented with using the Network simulator tool (NS2) and using parameters the performance metric is in terms of delay, packet delivery ratio, overhead, and energy are evaluated.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123694633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信