{"title":"A New Approach in Distributed Energy Resources for Techno-Economic with Metaheuristic Method and Artificial Neural Network","authors":"Jemaa Bojod, B. Erkal","doi":"10.1109/ICICACS57338.2023.10099801","DOIUrl":"https://doi.org/10.1109/ICICACS57338.2023.10099801","url":null,"abstract":"On the consumer's side of the meter, smaller generation units are frequently referred to as distributed energy resources (DER). Installable distributed energy resources include battery storage, wind turbines, and roof-mounted photovoltaic systems. This paper optimizes the integration of DER that include the photovoltaic solar energy systems, wind energy system, and electric vehicles in the source network with the aim of reducing total power loss, total cost, and emissions distributed over the thermal energy system. We used the Chameleon optimization method to extract the target of the system that contain the 8 parameter such as PV, Wind energy, diesel energy and their derivatives.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121223076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptography based Network Security Analysis using Secure Hashed Identity Message Authentication","authors":"Sakshi Pandey, Saurabh Lahoti","doi":"10.1109/ICICACS57338.2023.10100004","DOIUrl":"https://doi.org/10.1109/ICICACS57338.2023.10100004","url":null,"abstract":"Network security, made at low cost, and the easily made system has won the prestige compared to wireless networks. Networks are widely used by laptop users in corporate and educational contexts. Secure communication is a challenge in networks. Limited memory resources and power constraints, and complex many key security mechanisms may not be compatible with resources. Network security is key management because it is a complex task of its controlled nature. However, some fundamental drawbacks among wireless storage media are that networks are highly vulnerable to encryption attacks. Therefore, it is very important to protect the data while transferring over the network. Proxy delays in Proxy Re-Encryption (PRE) programming and retrieval Proximity is a significant computational load unloading problem caused by the Lightweight Symmetric Asymmetric Encryption Algorithm (LSAE), and the use of asymmetric encryption of the user's decryption due to the operation and recalculation of the data owner's encryption. In order to resolve these issues, we propose a Secure Hashed Identity Message Authentication (SHIMA) which is used to verify information integrity and authentication. The estimated cost of re-encryption processing caused by network security is very efficient. The SHIMA algorithm can reduce end-to-end encryption and decryption provided by end-user's resource-controlled equipment. Safety and performance research is conducted, and the results show that our method is time-consuming and reduce delay performance safe and efficient. At the same time, the rating has found times the higher performance on these network clients and network servers. Based on this rating, it is recommended that this work be achieved and implemented in networking.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121709605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comprehensive Evaluation Study on the Greenness Level of Power Equipment Supply Chain under the Dual Carbon Target","authors":"Kun Pan, Tiezheng Wang, Xiao Yu, Xiaowen Zhu, Naixin Kang, Meiling Gu","doi":"10.1109/ICICACS57338.2023.10099762","DOIUrl":"https://doi.org/10.1109/ICICACS57338.2023.10099762","url":null,"abstract":"A comprehensive evaluation model of the greenness level of the power equipment procurement supply chain is proposed. Firstly, a comprehensive evaluation index system for the greenness level of the power equipment procurement supply chain is established from the three aspects of green suppliers, green products and green logistics; then the improved AHP is used to empower the evaluation index; finally, the improved TOPSIS method is used to sort the greenness level of the power equipment procurement supply chain.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"8 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114019282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Learning Technology in Film and Television Post-Production","authors":"Chulei Zhang, Kushalatha M R","doi":"10.1109/ICICACS57338.2023.10100148","DOIUrl":"https://doi.org/10.1109/ICICACS57338.2023.10100148","url":null,"abstract":"China”s economic growth is developing rapidly, whether it is hard power or soft power, movies are often leaders in cultural output, and their production technology and film content need to be evaluated at different levels. How to grasp film and television in the new era Technical post-production technology has become more and more important. China's film and television production has not yet formed a mature industrialization system. There are no standard operating specifications and specific standards for film and television production, which leads to confusion in the application mode of film and television production and the film and television production system. The imperfect level of the film and television production industry has led to poor animation preview effects and quality. This article mainly analyzes the application of deep learning technology in film and television post-production, and uses deep learning technology to make a reasonable analysis of the current development of film and television post-production technology. The experimental results in this paper show that the application of deep learning technology in film and television post-production has increased the processing efficiency of film and television by 15%, and the film and television post-production technology combined with deep learning methods. The combination of the two features has better abstract expression capabilities, and can better learn to reflect the nature of data. More importantly, deep learning methods are more suitable for the fast-developing big data era we are now in. The amount of data is increasing. In the case of, traditional algorithms are difficult to take advantage of the amount of data, and the algorithm model of deep learning is a method that has grown and developed under this background. It can process rich data and has better generalization capabilities to adapt to More extensive scenes, better practicability. Responsible for the development and optimization of film and television post-production to the greatest extent.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122409951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Priyadarshini C Patil, Ashwin R K, Arvind Kumar G, M. Bhaskar, Rajesh N
{"title":"Analysis of Facial Expression using Deep Learning Techniques","authors":"Priyadarshini C Patil, Ashwin R K, Arvind Kumar G, M. Bhaskar, Rajesh N","doi":"10.1109/ICICACS57338.2023.10100110","DOIUrl":"https://doi.org/10.1109/ICICACS57338.2023.10100110","url":null,"abstract":"Research into facial recognition has been one of the most intriguing and extensive areas of study for decades. Because of its importance in reading and conveying other people's emotions, the face often becomes the focal point of conversations. A facial recognition system's ability to identify an individual from a digital image or video is useful for a wide variety of security-related purposes, including surveillance, general identity verification, criminal-justice Systems, image database investigations, Smart Card applications, multi-media settings with adaptive human-computer interfaces, video indexing, gender classification, facial feature recognition, and tracking. While being less reliable than fingerprint and iris identification, face recognition has seen widespread adoption because of its contactless, non-invasive nature. Light, emotion, and posture all have a role in making it harder to recognise a person's face. A computer model of face recognition is difficult to build because of the problem space's complexity and possible multidimensionality. Extensive attempts have been made to build accurate and reliable face recognition systems. The high dimensionality of a facial image is necessary for detecting minute variations in features, but this also means that the calculations required to classify the image take a long time. It's possible that lowering the image resolution will reduce the time needed for recognition processing. Facial recognition systems have been studied for quite some time, but there is always opportunity for improvement. These results show that current face recognition algorithms have matured to a considerable extent while operating in a constrained context. When put to the test in the real world, however, these technologies do not show a significant performance boost in all of the frequent cases faced by applications. Genetic face recognition is necessary when only the most cutting-edge method of facial identification will do. There are many potential applications for genetic face recognition technology; home and corporate security are only two examples. When two people have very similar faces, it's easy to tell whether they're related. It's also called “face-of-relatives” verification. Those that have a common ancestor are said to share a genetic makeup, whereas those who come from distinct families are said to lack such a makeup.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132641225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Smart Monitoring of Environmental Pollution using Internet of Things Model","authors":"Sheela Baijwan, Anubhuti Dhyani","doi":"10.1109/ICICACS57338.2023.10100314","DOIUrl":"https://doi.org/10.1109/ICICACS57338.2023.10100314","url":null,"abstract":"The increasing environmental pollution around the world has made everyone concerned. Rapid growth and industrialization have only exacerbated this problem. Fossil fuels like coal and oil contain high amounts of carbon. When these fuels are burned, carbon-dioxide is released in large quantities. Carbon trading is like any other market trading. Because carbon is given an economic value, it is traded by individuals and companies or countries. When a company buys carbon it gets the right to burn it. Similarly, when a country sells carbon credit, it gives up the right to burn it. The value of carbon is based on the ability of the country holding it to store it and keep it out of the atmosphere.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132649936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Blockchain based Microbial Pollution Identification Model for the Large River Environment in India","authors":"Sameer dev sharma, Deepak Singh Bisht","doi":"10.1109/ICICACS57338.2023.10099643","DOIUrl":"https://doi.org/10.1109/ICICACS57338.2023.10099643","url":null,"abstract":"In the chronology of the age of the world, compared to other species, the human race is a creeping spring. However, the human race has acquired the power to move mountains, Move Rivers, penetrate living cells and transform them due to their super-intelligence. This same creative knowledge also indirectly propagates many influences through the milk of biodiversity. Plants cannot live in this flower world today. Birds cannot survive today. Animals cannot live with humans today. Why, microbial species are still unsustainable for humans. But if the human species does not exist in this world, other forms of life can certainly live - not just live, but very happily. Therefore, the human race is not an essential part of this world. Mankind is a thread in nature's spider web. This thread cannot stand alone. If separated, it will flyaway like a sponge.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132936261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Informatization in Modern Economic Management","authors":"Ruijie Qiu","doi":"10.1109/ICICACS57338.2023.10099792","DOIUrl":"https://doi.org/10.1109/ICICACS57338.2023.10099792","url":null,"abstract":"The application of informatization in modern economic management is a process of using information technology to automate and improve the efficiency of business processes. The term was coined by Peter Drucker, a management consultant and writer. Informatization is one of the most important changes in business today; It is widely believed that this change will have a far-reaching impact on our way of business, work and even life. Now, individuals can manage their careers through computer networks such as LinkedIn or monster. Common domain name format; Companies can use computers to track the sales of stores across the country.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133424125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Target Extraction System of UAV Remote Sensing Image Based on Artificial Intelligence","authors":"Wenhuan Xie","doi":"10.1109/ICICACS57338.2023.10100183","DOIUrl":"https://doi.org/10.1109/ICICACS57338.2023.10100183","url":null,"abstract":"In many mountainous areas, geological disasters are prone to occur, such as landslides, debris flows and landslides, which are devastating to the affected areas. However, the rescue of the disaster area is very difficult. Because it is difficult to accurately identify the complex terrain, it is impossible to accurately grasp the specific information of the disaster area in a short time. unmanned aerial vehicle (UAV) has the advantages of all-weather, high-resolution and long-distance photography, and is widely used in geological hazard monitoring. With the development of artificial intelligence technology, the accuracy of classification and recognition of remote sensing images is continuously improved, and the deep learning algorithm can be well applied to the target extraction system of unmanned aerial vehicle remote sensing images. In this paper, the Faster Region-Convolutional Neural Network (R-CNN) and YOLOv3 algorithms are compared for target detection. The results show that YOLOv3 algorithm has better vehicle target extraction accuracy compared with Faster R-CNN algorithm. The recognition accuracy of station wagon, off-road vehicle, pickup truck and engineering vehicle is 91%, 92%, 89% and 93% respectively. Therefore, applying YOLOv3 algorithm to target extraction system of UAV remote sensing image can improve the accuracy of target extraction.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134297547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kailiang Ge, Yi Wang, B. Hu, Tao Zeng, Leijie He, Jian Zhao
{"title":"Prediction of Electric Energy Substitution Potential under Multiple Scenarios Based on SSA-ELM","authors":"Kailiang Ge, Yi Wang, B. Hu, Tao Zeng, Leijie He, Jian Zhao","doi":"10.1109/ICICACS57338.2023.10099765","DOIUrl":"https://doi.org/10.1109/ICICACS57338.2023.10099765","url":null,"abstract":"China's energy consumption is faced with problems such as low development efficiency and large consumption of the traditional fossil fuels. Although the energy structure needs to be optimized, the use of electricity to replace bulk coal and oil at the end of energy consumption can effectively promote the optimization and adjustment of China's energy structure and has a good development prospect. Therefore, this paper suggests an alternative energy potential prediction model based on bird research algorithm. Based on the classification and screening of relevant factors and the establishment of the system, based on the relevant electricity consumption data of China in the past 10 years, combined with relevant policy support, subsidy mechanism and other factors. So we designed three scenarios to predict the development potential of electric energy substitution in the future. The prediction results verify the proposed model for predicting the potential of alternative energy. Based on the results of various scenarios, this paper provides some suggestions in the future.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115612302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}