2022 IEEE 2nd International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC)最新文献

筛选
英文 中文
Performance Evaluation of Symmetric Encryption Algorithms Using MCDM Methods 基于MCDM方法的对称加密算法性能评估
D. Das, Sharmistha Roy, Kamaldeep Gupta, B. Sahoo
{"title":"Performance Evaluation of Symmetric Encryption Algorithms Using MCDM Methods","authors":"D. Das, Sharmistha Roy, Kamaldeep Gupta, B. Sahoo","doi":"10.1109/iSSSC56467.2022.10051594","DOIUrl":"https://doi.org/10.1109/iSSSC56467.2022.10051594","url":null,"abstract":"Data and information are found to be stored, processed or transferred with the support of modern technological tools and hardware specifications. Due to the increase in the usage of digital communication and higher dependency on the internet technology platform, the risk factor also increased. Thus, it is essential to use safety and precautionary measures while storing and transferring data in order to prevent unauthorized access. One of the way of achieving this is through confidentiality, which uses various encryption algorithms to convert a readable message (plain text) into unreadable form (cipher text). Cryptographic algorithms are of two types- symmetric encryption algorithms and asymmetric encryption algorithms. This paper focused on few symmetric encryption algorithms namely 3DES, AES, Blowfish and IDEA. The objective of this work is to evaluate the performance of these encryption algorithms on the basis of three criteria- time, resource and privacy. The evaluation is done using MCDM methods such as PROMETHEE II, COPRAS and ARAS, which determine the ranking of these encryption algorithms based on the score obtained. The simulation has been performed in C/C++ compiler and the result analysis shows that Blowfish algorithm is considered as the best symmetric encryption algorithm in comparison to the others for COPRAS and ARAS methods whereas, IDEA is the best ranked in PROMETHEE II method.","PeriodicalId":334645,"journal":{"name":"2022 IEEE 2nd International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126308881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of DSTATCOM, DVR and UPQC for Mitigating Voltage Sag in Distribution System DSTATCOM、DVR和UPQC对配电系统电压骤降的缓解效果比较
P. Jaiswal, K. Thakre, Prateek Nigam
{"title":"Comparison of DSTATCOM, DVR and UPQC for Mitigating Voltage Sag in Distribution System","authors":"P. Jaiswal, K. Thakre, Prateek Nigam","doi":"10.1109/iSSSC56467.2022.10051621","DOIUrl":"https://doi.org/10.1109/iSSSC56467.2022.10051621","url":null,"abstract":"In competitive power market environment, Power Quality (PQ) is utmost important. Any deviation in the standard PQ of supply leads to the system instability as well as system suffers from economic loss. To mitigate the PQ problem in Distribution System (DS) various high-power devices are installed. In this context DSTATCOM, DVR and UPQC are widely adopted PQ conditioner dedicatedly designed to enhance PQ in DS. This work presents the comparative analysis of these devices in terms of harmonic reduction and voltage regulation when the DS suffers the condition of voltage sag. Voltage sag is a frequent type of PQ problem which occurs due to the fault in system. Fault is a commonly occurring phenomenon in DS which is characterized by dip in voltage and high increase in current. If it is not cleared it causes severe threat to the system and can also damage the connected devices and equipments. This paper addresses the issues related to fault and the power conditioner mentioned above helps to retain the stability as well as PQ of the supply.","PeriodicalId":334645,"journal":{"name":"2022 IEEE 2nd International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121886421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recognition of Handwritten Digit Using Neural Networks 基于神经网络的手写数字识别
K. Santoshi, Chunduru Anilkumar, Suvvari Sravanthirani Bhardwaj
{"title":"Recognition of Handwritten Digit Using Neural Networks","authors":"K. Santoshi, Chunduru Anilkumar, Suvvari Sravanthirani Bhardwaj","doi":"10.1109/iSSSC56467.2022.10051289","DOIUrl":"https://doi.org/10.1109/iSSSC56467.2022.10051289","url":null,"abstract":"Because of its practical uses in our daily lives, manuscript number identification is gradually relevant in the present times. Numerous identification techniques such as calligraphy number identification are deployed in many areas where great classification efficiency is required in recent years. In addition pattern recognition is a key component of any computer vision or artificial intelligence system. Machine Learning as well as Computer Vision researchers have used it extensively to build practical applications such as reading computerized bank draft numbers. In this project, we utilized an ANN to develop several surfaces attached development of a thinking computer system with two invisible surfaces to recognize manuscript numbers. The backpropagation method searches for the weight value that delivers the lowest overall error in the network while data processing between layers. Invisible layer neurons employ the ReLU activation function, whereas output neurons use SoftMax. The testing was done using the MNIST handwritten database, which is freely available. Finally retrieved a complete 60,000 digit pictures from the MNIST database for training, validation and testing.","PeriodicalId":334645,"journal":{"name":"2022 IEEE 2nd International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122056450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Photo Editor using Generative Adversarial Network: A Machine Learning Approach 使用生成对抗网络的智能照片编辑器:一种机器学习方法
S. Bharti, Hardik Inani, R. Gupta
{"title":"Smart Photo Editor using Generative Adversarial Network: A Machine Learning Approach","authors":"S. Bharti, Hardik Inani, R. Gupta","doi":"10.1109/iSSSC56467.2022.10051480","DOIUrl":"https://doi.org/10.1109/iSSSC56467.2022.10051480","url":null,"abstract":"With the rapid development of digital photos that can be taken at a very low cost using a low powered device, there is a demand for programmes that can edit images for users who have no technical expertise of image editing. We've employed multiple Machine Learning models of GAN -Generative Adversarial Network - and algorithms to extract information from photographs and produced two modules of it summed up as “AI Photo Editor” which can be used as an all-in-one image editor based on the same principle. Using the input satellite image as a starting point, one of the modules can remove various small things from the image, while another one can create the “Map View.” It can also be quite beneficial in terms of providing datasets/databases for other Machine Learning and Neural Network models.","PeriodicalId":334645,"journal":{"name":"2022 IEEE 2nd International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126544671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Control and Power Coordination for Battery Storage based DC Micro-grid 基于电池储能的直流微电网控制与功率协调
Sisir Kumar Balita, Ch Venkateswara Rao, P. Sahu, S. Jena, Jnanaranjan Nayak
{"title":"Control and Power Coordination for Battery Storage based DC Micro-grid","authors":"Sisir Kumar Balita, Ch Venkateswara Rao, P. Sahu, S. Jena, Jnanaranjan Nayak","doi":"10.1109/iSSSC56467.2022.10051619","DOIUrl":"https://doi.org/10.1109/iSSSC56467.2022.10051619","url":null,"abstract":"A noble DC grid current controller is proposed in this paper for a DC micro-grid. The said controller can handle any fluctuation in the PV power generation and power demand by the load without using any grid-side converter. The injected DC grid current can be regulated by directly controlling the bidirectional DC-DC converter, which is connected to the battery. The mathematical modeling of the DC-DC bidirectional converter is carried out for the purpose of designing the controller. The proposed controller has two loops; the outer loop is used to regulate the injected DC current and the inner loop for controlling the battery current. The outer loop can be designed using the transfer function of the injected DC grid current and battery current, whereas the inner control loop can be designed by considering the transfer function of battery current and the operating duty cycle. Finally, the efficacy of the proposed controller is assessed through the MATLAB/SIMULINK environment. The results show that the controller can efficiently regulate the DC grid current under fluctuations in the PV power generation and load power demand.","PeriodicalId":334645,"journal":{"name":"2022 IEEE 2nd International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131340130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of couplings in presence of air hole in 12-core double layer hexagonal shape Fiber design 12芯双层六角形光纤设计中存在气孔的耦合研究
Sonali Basak, Abhijit Kumar, S. Sarkar, N. Das
{"title":"Investigation of couplings in presence of air hole in 12-core double layer hexagonal shape Fiber design","authors":"Sonali Basak, Abhijit Kumar, S. Sarkar, N. Das","doi":"10.1109/iSSSC56467.2022.10051413","DOIUrl":"https://doi.org/10.1109/iSSSC56467.2022.10051413","url":null,"abstract":"To support the rapid traffic growth, space division multiplexing (SDM) transmission technology have been introduced to overcome the ‘capacity crunch’. In this paper, a novel twelve core fiber (MCF) double layer hexagonal shape design with an air-hole between the cores is proposed and couplings between core modes and cladding mode are studied. Fundamental modes distribution of 12 core is presented. Results are compared with normal step-index twelve core MCF structure. It is found that cladding modes can be greatly suppressed with air hole between the cores. This study also includes the coupling between LP01 mode and one higher order cladding mode under periodic perturbation conditions.","PeriodicalId":334645,"journal":{"name":"2022 IEEE 2nd International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133932473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of solar photovoltaic systems 太阳能光伏系统性能评价
Chaladi S Ganga Bhavani, N. Bhanu Prasad, D. Ravi Kishore
{"title":"Performance Evaluation of solar photovoltaic systems","authors":"Chaladi S Ganga Bhavani, N. Bhanu Prasad, D. Ravi Kishore","doi":"10.1109/iSSSC56467.2022.10051250","DOIUrl":"https://doi.org/10.1109/iSSSC56467.2022.10051250","url":null,"abstract":"The feasibility and cost-effectiveness of two photovoltaic (PV) plant layouts are compared. At the conclusion of the plant's life, the Net Present Value was compared between a grid connection with and without PV for the identical plant. The findings demonstrate that the customer may save a lot of money while still enjoying a high degree of energy independence by combining a grid-connected PV system with a small battery (storage on grid configuration). For the analyzed site, independent PV systems are only viable at distances of 5 km or more due to the necessity for oversizing its generators and batteries. It's prohibitively expensive for what it provides, useless, and wasteful since it generates energy that has nowhere to go. Don't forget that this system can't sustain its energy use indefinitely or economically. With the declining cost of batteries and photovoltaic generators, the economics of PV standalone systems may be reevaluated, but their energetics will remain unchanged. For this reason, they are well-suited for use in district networks that facilitate the flow of energy.","PeriodicalId":334645,"journal":{"name":"2022 IEEE 2nd International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129690090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of Convolutional Neural Network Topology and Training Parameters using Bees Algorithm 使用蜜蜂算法优化卷积神经网络拓扑和训练参数
N. H. Alamri, M. Packianather, S. Bigot
{"title":"Optimization of Convolutional Neural Network Topology and Training Parameters using Bees Algorithm","authors":"N. H. Alamri, M. Packianather, S. Bigot","doi":"10.1109/iSSSC56467.2022.10051487","DOIUrl":"https://doi.org/10.1109/iSSSC56467.2022.10051487","url":null,"abstract":"Designing a Convolutional Neural Network (CNN) topology with optimal performance is a challenge. This paper proposes a hybrid algorithm combining the nature-inspired Bees Algorithm (BA) with Bayesian Optimization (BO) technique to improve CNN performance (BA-BO-CNN). In addition, another hybrid algorithm is proposed which uses BA to optimize CNN hyperparameters (BA-CNN) to improve the network performance. Applying the hybrid BA-BO-CNN rather than BA-CNN on human electrocardiogram (ECG) signals the testing accuracy improved from 92.50% to 95%, on Cifar10DataDir benchmark data the accuracy on the validation set increased from 80.72% for BO-CNN to 82.22% for BA-BO-CNN, and finally, on benchmark digits images the training, validation and testing accuracies remained the same compared to the existing BO-CNN, but with more efficient computational time since it is reduced by 3 minutes and 12 seconds for BA-BO-CNN and 4 minutes and 14 seconds for BA-CNN.","PeriodicalId":334645,"journal":{"name":"2022 IEEE 2nd International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130353930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Grid Pricing and Participation for Cost-Effective Operation of Microgrid System 电网定价与参与对微电网系统成本效益运行的影响
T. Singh, K. Rao, P. Rajesh, B. Dey
{"title":"Impact of Grid Pricing and Participation for Cost-Effective Operation of Microgrid System","authors":"T. Singh, K. Rao, P. Rajesh, B. Dey","doi":"10.1109/iSSSC56467.2022.10051212","DOIUrl":"https://doi.org/10.1109/iSSSC56467.2022.10051212","url":null,"abstract":"Microgrid (MG) systems can either operate in on-grid or off-grid mode. The on-grid mode of microgrid operation can further be divided into active and passive mode. In active mode the grid both buys and sells power to the microgrid whereas in passive mode the grid acts as a backup and only sells power to the microgrid. In this study, the grid power commitment is sized optimally to incur the lowest MG system generating cost. The generation cost is reduced for three different scenarios of a low voltage microgrid (LV MG) system that comprises of battery energy storage (BES), renewable energy sources (RES), and fossil fuel generators while running in grid-connected mode. The load demand model is taken into account and distributed generator (DG) scheduling ideas are percolated for reducing the second level Microgrid system’s generating costs. The optimization tool for the study was a newly established hybrid swarm intelligence algorithm that has previously been utilized to solve a variety of power system optimization challenges. Numerical results show that there was 25% increase in generation cost when passive participation of grid was considered and 58% increase when fixed electricity pricing was considered.","PeriodicalId":334645,"journal":{"name":"2022 IEEE 2nd International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124750695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FogCrypto: Towards Cryptographic protocols for securing Fog assisted cloud System FogCrypto:迈向保护雾辅助云系统的加密协议
Rajkumar Gaur, Rakesh Kumar lenka, S. Prakash, S. Patra, Rabindra Kumar Barik
{"title":"FogCrypto: Towards Cryptographic protocols for securing Fog assisted cloud System","authors":"Rajkumar Gaur, Rakesh Kumar lenka, S. Prakash, S. Patra, Rabindra Kumar Barik","doi":"10.1109/iSSSC56467.2022.10051284","DOIUrl":"https://doi.org/10.1109/iSSSC56467.2022.10051284","url":null,"abstract":"In fog computing, issues with authentication and permission are brought on by a shaky link between the fog and the cloud. By utilising the idea of Stand-Alone Authentication (SAA) and outfitting it with Attribute-Based Encryption (ABE) for its security in fog assisted cloud system. In such a system, a user’s access right is a set of private key-linked qualities. In this article, it observes that if a user can generate a new private key for a portion of his/her access right, this could violate the access control policy. It offers a new security scheme to strengthen CP- ABE schemes for message encryption and decryption. Formalize the security requirements for such a property, then build a CP- ABE scheme based on the elliptic curve. In this paper, It utilises the the different attack model for secure the information. It also proposes the secure fog-cloud security framework for optimise the various security services.","PeriodicalId":334645,"journal":{"name":"2022 IEEE 2nd International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129299622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信