2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)最新文献

筛选
英文 中文
The Analysis of Multi Objective Reactive Power Optimization Based on Improved Particle Swarm Algorithm 基于改进粒子群算法的多目标无功优化分析
Tingxi Sun, Xiaokai Guo, Jiangjing Cui, B. Nan
{"title":"The Analysis of Multi Objective Reactive Power Optimization Based on Improved Particle Swarm Algorithm","authors":"Tingxi Sun, Xiaokai Guo, Jiangjing Cui, B. Nan","doi":"10.1109/ICDCECE57866.2023.10151054","DOIUrl":"https://doi.org/10.1109/ICDCECE57866.2023.10151054","url":null,"abstract":"This paper discusses the Multi-Objective Reactive Power Analysis of the improved particle swarm optimization algorithm, adjusts the transformation ratio of the on load regulating transformer, and changes the output measures of the reactive power compensation device, so that the system can achieve the optimization of multiple performance indicators under the premise of meeting the relevant constraints. The traditional particle swarm optimization algorithm has local extremum problem, and the optimization results are different from the actual results. In order to improve the limitations of particle swarm optimization, the simulated annealing algorithm is introduced to weight the PSO to improve the accuracy of calculation. The simulation results show that the improved particle swarm optimization algorithm optimizes the terminal voltage and reactive power compensation measures of reactive power target, and obtains a more effective power system optimization scheme. Therefore, the improved particle swarm optimization algorithm provides more accurate guidance for multi-objective non-function analysis, and adjusts the terminal voltage and power compensation measures of reactive power target.","PeriodicalId":221860,"journal":{"name":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123035407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Change Map Detection from Imagery Data using Machine Learning Approach 利用机器学习方法从图像数据中高效检测变化图
V. Kalaiselvi, J. Ranjani, S. Hariharan, Vasantha Sandhya Venu, D. K, Parvathi Priya Nandana K.M
{"title":"Efficient Change Map Detection from Imagery Data using Machine Learning Approach","authors":"V. Kalaiselvi, J. Ranjani, S. Hariharan, Vasantha Sandhya Venu, D. K, Parvathi Priya Nandana K.M","doi":"10.1109/ICDCECE57866.2023.10150757","DOIUrl":"https://doi.org/10.1109/ICDCECE57866.2023.10150757","url":null,"abstract":"Change detection in Newly Constructed Areas (NCA) is the first step in the development of urban areas. In this field, remote sensing and deep learning are more efficient compared to other technologies. The process consists of analyzing multi-temporal satellite images between different time-stamps and automatic analysis of different graphs which is the change data. The difference calculated from the images is formed by the pixel-by-pixel subtraction of two satellite images which uses eigenvectors that are extracted for the difference image using Principle component analysis. Also, the pixel’s neighborhood is projected onto these vectors to arrive at the feature vector. Upon clustering the feature vectors into 2 clusters, we have changed an unchanged class, and each pixel belongs to one of these two clusters using which a change map is generated.","PeriodicalId":221860,"journal":{"name":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"336 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127807526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Secure VANET Communication Using Multi Authenticate Homomorphic Signature Algorithm 基于多认证同态签名算法的高效安全VANET通信
Raman Verma
{"title":"An Efficient Secure VANET Communication Using Multi Authenticate Homomorphic Signature Algorithm","authors":"Raman Verma","doi":"10.1109/ICDCECE57866.2023.10150880","DOIUrl":"https://doi.org/10.1109/ICDCECE57866.2023.10150880","url":null,"abstract":"Vehicular Ad-hoc Networks (VANETs) is a wireless network that provides communication between vehicles and roadside infrastructure. It has been gaining high attention in the field mainly by researchers recently. It can provide various services, ranging from security-related early warning systems, enhanced navigation mechanisms, and information and entertainment applications. In VANET systems, some confidential data and contact information leakage can cause a severe loss of property. After that, it is a need for a higher level of security VANET system. Therefore, in VANET is the urgent priority need for security of privacy protection protocol. The proposed method Elliptic Homomorphic Signature (EHS) the critical requirement is to allow VANETs privacy protection protocol to ensure its authenticity for the use of trademarks. When the user signs data, the signature is generated using the secret key, which is kept secure by the signer, and it encrypts the data. No one can create any signature items other than legitimate users. Destination to receive data using the public key confirms has not been modified in transit. The attacker can neither find the correct signature nor steal the data. The simulation results, when used in VANET, confirmed the level of effectiveness and security.","PeriodicalId":221860,"journal":{"name":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128032796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Innovation Development of New Perspective of Efficient Approaches, Techniques and Challenges for Data Centers 数据中心高效方法、技术和挑战新视角的创新发展
Sahana Shetty, H. K. Shashikala
{"title":"An Innovation Development of New Perspective of Efficient Approaches, Techniques and Challenges for Data Centers","authors":"Sahana Shetty, H. K. Shashikala","doi":"10.1109/ICDCECE57866.2023.10151008","DOIUrl":"https://doi.org/10.1109/ICDCECE57866.2023.10151008","url":null,"abstract":"Data centers are essential components of the modern digital world. They provide the necessary resources and infrastructure to enable access to online services and applications, enabling individuals and organizations to communicate, collaborate, and access information in real time. Data centers are an essential part of the internet and are used to manage and store data, providing access to a wide range of services. They provide organizations with the ability to store, access, and process data. Data centers are the backbone of the digital revolution, enabling organizations and individuals to connect with the world. Data centers are essential for providing secure access to data and resources. They are designed with security features such as firewalls, encryption, and authentication that protect data from unauthorized access. Data centers also provide advanced networking and storage solutions to ensure data is secure, reliable, and available for use. Data centers are also important for reducing operational costs. They provide the necessary resources and infrastructure to reduce hardware and software costs, as well as energy costs associated with running hardware and applications. This reduces the overall cost of doing business and allows organizations to focus on their core competencies.","PeriodicalId":221860,"journal":{"name":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134039390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Study Analysis of MachineLearning Algorithms for Anomaly Detection in Blockchain 区块链中异常检测的机器学习算法比较研究分析
R. Saravanan, S. Santhiya, K. Shalini, V.S Sreeparvathy
{"title":"Comparative Study Analysis of MachineLearning Algorithms for Anomaly Detection in Blockchain","authors":"R. Saravanan, S. Santhiya, K. Shalini, V.S Sreeparvathy","doi":"10.1109/ICDCECE57866.2023.10150785","DOIUrl":"https://doi.org/10.1109/ICDCECE57866.2023.10150785","url":null,"abstract":"Anomaly detection is one of the challenging problems encountered by the modern network security industry. In these last years, Blockchain technologies have been widely used in several application fields to improve data privacy and trustworthiness and security of systems. Despite being an effective tool, the blockchain is not impervious to cyberattacks. For instance, a successful 51% attack on Ethereum Classic exposed security flaws in the technology. Attacks can be viewed from a statistical standpoint as an aberrant finding that strongly deviates from the norm. Machine learning is a science whose objective is to discover insights, trends, and anomalies in massive data sets; as a result, it can be used to detect blockchain attacks. In this work, we define a federated learning-based anomaly detection system that is trained using aggregate data gathered from observing blockchain activity on the end device itself. Experiments on the whole historical logs of the Ethereum Classic network demonstrate our model’s ability to accurately identify assaults that have been made public while also automatically signing digital transactions for further protection. Therefore, it is necessary to create an anomaly detection system that can monitor networks for any dangerous actions and produce findings for the management authority in the end device itself. Several classification techniques and machine learning algorithms have been taken into consideration in our suggested article to categorize the accurate model.","PeriodicalId":221860,"journal":{"name":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131792622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Optimized Fuzzy Decision Tree Algorithm in Sports Video Analysis 优化模糊决策树算法在体育视频分析中的应用
T. Xia, Feng Liu
{"title":"Application of Optimized Fuzzy Decision Tree Algorithm in Sports Video Analysis","authors":"T. Xia, Feng Liu","doi":"10.1109/ICDCECE57866.2023.10150902","DOIUrl":"https://doi.org/10.1109/ICDCECE57866.2023.10150902","url":null,"abstract":"In sports video prediction, a very important link is the model. The traditional fuzzy algorithm based on classical fuzzy algorithm can no longer meet the needs of the development of the times. So this paper improves and optimizes this problem and gets a more accurate, practical, fast and intuitive result. The objective function-weight vector method replaces the artificial neural network to train the decision tree algorithm, and applies it to the establishment of sports video evaluation index system based on motion control quantity. Finally, the feasibility and effectiveness of the model in practical application are verified by experiments. The verification results show that, The running time of fuzzy decision tree algorithm is within 11-17 seconds, and the running efficiency is more than 80%. This shows that the algorithm has obvious optimization effect on sports video analysis.","PeriodicalId":221860,"journal":{"name":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"156 3-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134289104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Deep Learning Algorithm in the Control System of Intelligent Inspection Robot of Substation 变电站智能巡检机器人控制系统中的深度学习算法设计
Shuangshuang Wei, Zhenzhong Gan, Chunfeng Fan, Zhuang Huang, Zhiyong Zhu, Xueshan Wei, Kai Qin
{"title":"Design of Deep Learning Algorithm in the Control System of Intelligent Inspection Robot of Substation","authors":"Shuangshuang Wei, Zhenzhong Gan, Chunfeng Fan, Zhuang Huang, Zhiyong Zhu, Xueshan Wei, Kai Qin","doi":"10.1109/ICDCECE57866.2023.10150529","DOIUrl":"https://doi.org/10.1109/ICDCECE57866.2023.10150529","url":null,"abstract":"With the development of the scale of the power system and the maturity of robotics, the use of inspection robots instead of manual inspection can effectively improve the efficiency of inspection and realize the intelligent management of the power grid. In this paper, a control system for substation inspection robot is designed and implemented for the substation inspection environment. First, a convolutional neural network algorithm under deep learning (DL) is proposed to extract the characteristics of the inspection robot, and then related technologies for inspection robot control are proposed, including navigation and positioning, motion control, power supply management, safety and anti-collision, and finally, it can be obtained through the test of the control system. The inspection robot has good tracking capabilities. In addition, the real trajectory is basically consistent with the set trajectory, which also shows the robustness of the system. Therefore, the use of DL to design the control system of the intelligent inspection robot of the substation is of great research value. In this paper, it is hoped that the deep learning-based convolutional neural network algorithm can be used to extract the features of inspection robots, which can effectively prove that the robots have good tracking ability and promote the power grid inspection to a certain extent. This paper provides reference value for realizing the intelligentization of power grid selection.","PeriodicalId":221860,"journal":{"name":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"22 Suppl 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134320219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Smart Development of Multichip Communication Systems with The Help of Short Transmission Nodes 基于短传输节点的多芯片通信系统的智能开发
Sunil Mp, D. C
{"title":"The Smart Development of Multichip Communication Systems with The Help of Short Transmission Nodes","authors":"Sunil Mp, D. C","doi":"10.1109/ICDCECE57866.2023.10150751","DOIUrl":"https://doi.org/10.1109/ICDCECE57866.2023.10150751","url":null,"abstract":"Multichip communication systems offer faster and more efficient data transmission and processing than single-chip systems. Multichip communication systems are made up of multiple chips that are interconnected and communicate with each other to carry out tasks more quickly. By using multiple chips, more complex operations can be completed faster and more efficiently than if done by a single processor. Multichip communication systems are used in many different industries, from automotive to aerospace to consumer electronics. Short transmission nodes are nodes that are used to transfer data from one network to another, usually over shorter distances. They are often used in the networking of computers, as they allow data to be sent more quickly and securely than over long distances. Short transmission nodes are also frequently used in wireless networks, where they provide a more reliable connection than longer distance nodes. In general, short transmission nodes are designed to be more efficient than longer distance nodes, allowing for faster data transfer speeds and more reliable connections. They are also often used for security purposes, as they are harder to intercept than signals passing over longer distances.","PeriodicalId":221860,"journal":{"name":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134641098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Vulnerability and Key Points of Encryption Technology of Computer Information Technology Data 计算机信息技术数据安全漏洞及加密技术要点
Min Sun
{"title":"Security Vulnerability and Key Points of Encryption Technology of Computer Information Technology Data","authors":"Min Sun","doi":"10.1109/ICDCECE57866.2023.10151186","DOIUrl":"https://doi.org/10.1109/ICDCECE57866.2023.10151186","url":null,"abstract":"With the continuous development of computer information technology, data storage and processing methods have changed, which has a great impact on information security. This paper describes the work done in this field at home and abroad. In combination with the emergence of new technologies such as network technology and cloud computing in the current era, it provides us with convenient conditions. At the same time, it also discusses how to apply these new science and technology to reality, and puts forward corresponding measures for reference and suggestions. This paper first introduces the data storage and processing methods of computer information technology and related concepts, and then briefly describes and analyzes computer information technology and information security. An encryption technology model for security vulnerabilities is designed to test the encryption technology performance of the model. The test results show that when the key is public key encryption, the running time is less than that of private key encryption, which means that with the increase of the number of files, the computational complexity increases at a relatively fast linear speed.","PeriodicalId":221860,"journal":{"name":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115584162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Students Performance Monitoring and Customized Recommendation Prediction in Learning Education using Deep Learning 基于深度学习的学习教育中学生表现监测和定制推荐预测
Vivek Kumar Sharma, A. Goel
{"title":"Students Performance Monitoring and Customized Recommendation Prediction in Learning Education using Deep Learning","authors":"Vivek Kumar Sharma, A. Goel","doi":"10.1109/ICDCECE57866.2023.10151286","DOIUrl":"https://doi.org/10.1109/ICDCECE57866.2023.10151286","url":null,"abstract":"This paper is focused on the development of a student academic result alert system using Short Service Message (SMS). The motivation behind the work was borne out of the numerous problems that students encounter before seeing their results. The issue of checking examination results through notice boards in anxiety has been a challenge from time immemorial. In some cases where results are posted on websites, students will have to pay for internet services to check their grades. Similarly, the privacy that should be upheld with respect to results publishing is not through public display. With these problems in mind, the authors developed a system to deliver students’ results and grades through SMS using a dedicated Application Programming Interface (API). The factfinding methods employed in the work were both primary and secondary methods. Primary method involved the use of questionnaire and observation of documents, while we deployed Object Oriented Analysis and Design Methodology (OOADM) as the design methodology. The software tools used are HTML (Hyper Text Markup Language), PHP (Hypertext PreProcessor) for the front-end and MYSQL for the database solution. The software developed is a highly interactive and has the capability of preventing unauthorized access or mutilation of students’ results, thus maintaining data integrity. It also sends student’s results directly to their phones and that of their sponsors.","PeriodicalId":221860,"journal":{"name":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"21 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114125851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信