Hafiz Owais Ahmed Khan, Aleena Ahmad, N. Arshad, Ahmad Nadeem
{"title":"Lowering Weighted Average Cost of Generation by Optimizing Operating Time: A Study from Pakistan","authors":"Hafiz Owais Ahmed Khan, Aleena Ahmad, N. Arshad, Ahmad Nadeem","doi":"10.1109/ICAISC56366.2023.10085031","DOIUrl":"https://doi.org/10.1109/ICAISC56366.2023.10085031","url":null,"abstract":"With rapidly increasing electricity demand globally, it is crucial to manage the electricity load during peak hours. Fossil fuel-based emission prone generators are often used to fulfill demand during peak hours, which results in an increase in the cost of generation. Demand side management (DSM) is a well-known technique to manage the flexible load. However, it requires increased compatibility with renewable resources, which are cheap but inherently intermittent. Along with financial benefits, electricity management through enhanced incorporation of renewables will also reduce the sum of emissions. In this paper, we use convex optimization to simulate energy consumption, according to the merit order, in Pakistan’s power sector. The simulation framework will be used to find optimal amount of load that can be shifted from an hour, using equilibrium optimization under given constraints. The results depict that the power sector can gain massive financial and environmental benefits using realistic DSM parameters.","PeriodicalId":422888,"journal":{"name":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131408790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using an IPsec VPN to Secure The Network Communication in The Smart Grid","authors":"Mohamed Hassan Abdel Hamied","doi":"10.1109/ICAISC56366.2023.10085145","DOIUrl":"https://doi.org/10.1109/ICAISC56366.2023.10085145","url":null,"abstract":"The increasing demand for energy consumption has led to burning a lot of fossil fuels and emitting large amounts of carbon. The electricity grid was developed to allow the production of electricity through renewable sources and the use of information and communication technology, and hence it was called the smart grid. A smart grid consists of seven domains connected to each other through an information network to exchange data for the operation of the grid. Securing this data is essential to maintain the efficient functioning of the smart grid. This article proves that the use of ESP protocol with tunnel mode in IPsec VPN is suitable for the power grid to secure communication between domains and reduce the risk of cyberattacks. Evaluation of various IPsec VPN authentication, encryption and hashing algorithms proves that AES and HMAC-SHA2 protocols are more secure than DES, 3DES, SEAL, HMAC-MD5 and HMAC-SHAI. Measurement of data throughput and communication delay between two domains shows less delay, throughput and duration occur when using plain text messages but provides no security.","PeriodicalId":422888,"journal":{"name":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122537039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detect misinformation of COVID-19 using deep learning: A comparative study based on word embedding","authors":"Asmaa Khoudi, Nessrine Yahiaoui, Feriel Rebahi","doi":"10.1109/ICAISC56366.2023.10085014","DOIUrl":"https://doi.org/10.1109/ICAISC56366.2023.10085014","url":null,"abstract":"Since its emergence in December 2019, there have been numerous news of COVID-19 pandemic shared on social media, which contain information from both reliable and unreliable medical sources. News and misleading information spread quickly on social media, which can lead to anxiety, unwanted exposure to medical remedies, etc. Rapid detection of fake news can reduce their spread. In this paper, we aim to create an intelligent system to detect misleading information about COVID-19 using deep learning techniques based on LSTM and BLSTM architectures. Data used to construct the DL models are text type and need to be transformed to numbers. We test, in this paper the efficiency of three vectorization techniques: Bag of words, Word2Vec and Bert. The experimental study showed that the best performance was given by LSTM model with BERT by achieving an accuracy of 91% of the test set.","PeriodicalId":422888,"journal":{"name":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115085741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Somil Tyagi, Dr. Rajesh Kumar Tyagi, Dr. Pushan Kumar Dutta, Dr. Priyanka Dubey
{"title":"Next Generation Phishing Detection and Prevention System using Machine Learning","authors":"Somil Tyagi, Dr. Rajesh Kumar Tyagi, Dr. Pushan Kumar Dutta, Dr. Priyanka Dubey","doi":"10.1109/ICAISC56366.2023.10085529","DOIUrl":"https://doi.org/10.1109/ICAISC56366.2023.10085529","url":null,"abstract":"Phishing is one of the topmost social engineering attacks in which an attacker sends a luring email via fake email address, email content through which either they try to compromise the end-user account by stealing their account credentials simply like username and password or even more complex way is to compromise the user’s device by binding the malicious payload that could be virus, trojans, spyware and lot more within the email sent by the attacker to the victim. According to the APWG, phishing activity trends report found that the December 2021 stats shows that the number of phishing attacks was triple compared to the attacks in early 2020, this shows still phishing is still in the leading position in all of the cybercrimes happened or happening in today’s world. The phishing problem is still a major problem across the globe which affects society, work culture, and economic growth in industries as well, thus there is not any single solution with which one person or industry can fight the phishing attack. The objective of this research paper is to make a simple yet effective one-stop solution for phishing detection and prevention system using machine learning and making an intelligent web browser plugin and to study different machine learning models and approaches with which we can come up with an efficient product.","PeriodicalId":422888,"journal":{"name":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129772586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Toufik Mebkhouta, G. Amar, Benaissa Mohamed Lamine, Karboua Djaloul, Douara Ben Ouadeh, Chouiha Youcef
{"title":"Control of wind system based on DFIG using a Super Twisting","authors":"Toufik Mebkhouta, G. Amar, Benaissa Mohamed Lamine, Karboua Djaloul, Douara Ben Ouadeh, Chouiha Youcef","doi":"10.1109/ICAISC56366.2023.10085260","DOIUrl":"https://doi.org/10.1109/ICAISC56366.2023.10085260","url":null,"abstract":"The quality of the energy produced and the performance of the doubly fed induction generator (DFIG) based wind energy conversion systems (WECS’s) are affected by nonlinearity and external disturbances, so the system needs a high-performance control system to reduce non-linearity and disturbances. This paper presents an advanced technic which is a developed sliding mode called super-twisting sliding mode control (STSMC), where this technic applied to control and correct the active and reactive powers. Firstly, modeling the system that contain main parts (turbine, shaft and DFIG) then the control theory can be described under assumption of Field Oriented Control (FOC) after that SMC and STSMC can be applied on the system where this last two are non-linear control and offer robustness against the uncertainties and external disturbances. Finally, using mathematical model in Matlab-Simulink to understand the system and comparing the results to see performance of each control.","PeriodicalId":422888,"journal":{"name":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117063070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on IEEE 802.15.7 MAC Protocols for Visible Light Communication","authors":"A. Alawadhi, Abdullah Almogahed, M. Omar","doi":"10.1109/ICAISC56366.2023.10085558","DOIUrl":"https://doi.org/10.1109/ICAISC56366.2023.10085558","url":null,"abstract":"Networks that use visible light communication (VLC) are suitable for meeting 5G and 6G criteria. The VLC is a new wireless high-speed communication technology. To meet the bandwidth requirements of bandwidth-hungry devices, VLC makes use of the illumination infrastructure. VLC is an excellence alternative to communication 6G technologies because of its immunology to electromagnetic interference, high data rate, high reuse factor and capacity to operate in an unlicensed band. Although the standard of IEEE 802.15.7 would provide detailed physical and medium access control layer standards, the emerging VLC technology confronts MAC issues. However, MAC-specific solutions in wireless networks need not resolve VLC network issues. Full-duplex capability, deafness, channel use, hidden nodes, and connectivity should all be considered in VLC MAC approaches.","PeriodicalId":422888,"journal":{"name":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","volume":"262 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115823205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Advanced Deep Learning Techniques for Face Detection and Age Estimation","authors":"Rawan A. AlQadi, M. Batouche","doi":"10.1109/ICAISC56366.2023.10085089","DOIUrl":"https://doi.org/10.1109/ICAISC56366.2023.10085089","url":null,"abstract":"In recent years, AI-based algorithms have been used to solve a wide range of previously intractable issues. Face detection and recognition from large groups, as well as feature identification from a description, are two of the most important security issues that can be addressed with image processing and modern AI. In this research, we use deep learning to analyze facial images to detect faces and estimate ages. The proposed method was used on photos of King Abdullah bin Abdulaziz AL Saud to determine his face and approximate his age. For this purpose, we relied on powerful deep learning models like DELWO and MTCNN to perform tasks like identifying faces and determining how old they are. The findings are very encouraging and promising. The experimental results have shown that the proposed method has good accuracy for face recognition (98.50%) and age estimation (82%).","PeriodicalId":422888,"journal":{"name":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116541677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Programing-based Green Speed Advisory System Design for Mixed Platooning Connected Vehicles","authors":"Abdulehad Özdemir, I. M. Koç","doi":"10.1109/ICAISC56366.2023.10085392","DOIUrl":"https://doi.org/10.1109/ICAISC56366.2023.10085392","url":null,"abstract":"Environmental concerns and related strategies, push hybrid and electric vehicles to have more market share due to their emission advantage which depends on electric carbon intensity. The traffic is getting mixed according to energy sources by increasing number of electric vehicles in use. On the other hand, smart city applications by the effective use of communication systems enable the development of green energy management systems. In this paper, a dynamic programing-based optimization system is developed to decrease Well-to-Wheels emissions of a platoon which consists of conventional and electric vehicles. The design variable of the optimizer is the speed profile and the objective function is the total emission. Both for conventional and electric vehicles, emission maps are developed for model-based optimization. For the defined use case validated results which were acquired by testing the vehicles, show that the optimizer can decrease the total emissions of the vehicles by 19.8%.","PeriodicalId":422888,"journal":{"name":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123162981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rabab Alayham Abbas Helmi, M. Johar, Vishal Kanna Subamaniam
{"title":"Speech Recognition Android App with Dyslexia for Children Using AI","authors":"Rabab Alayham Abbas Helmi, M. Johar, Vishal Kanna Subamaniam","doi":"10.1109/ICAISC56366.2023.10085189","DOIUrl":"https://doi.org/10.1109/ICAISC56366.2023.10085189","url":null,"abstract":"Learning disabilities are caused by genetic and neurobiological factors that change brain functioning in a way that impairs one or more cognitive processes associated to learning. These processing issues can obstruct the acquisition of fundamental abilities such as reading, pronunciation, or learning math. They can also interfere with high level abilities such as organization, time management, memory power, and concentration. It is critical to recognize that learning disabilities can have influence on an individual’s life outside of school, affecting connection with family and friends. Hence this study focuses on development of mobile application with the use of Google’s Speech Recognizer API which allows students learning disabilities such as dyslexia to practice on their reading and pronunciation skills.","PeriodicalId":422888,"journal":{"name":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127829424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}