2013 International Conference on Green High Performance Computing (ICGHPC)最新文献

筛选
英文 中文
Fault diagnosis in diode clamped multilevel inverter drive using wavelet transforms 基于小波变换的二极管箝位多电平变频器故障诊断
2013 International Conference on Green High Performance Computing (ICGHPC) Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533925
V. Vinothkumar, C. Muniraj
{"title":"Fault diagnosis in diode clamped multilevel inverter drive using wavelet transforms","authors":"V. Vinothkumar, C. Muniraj","doi":"10.1109/ICGHPC.2013.6533925","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533925","url":null,"abstract":"Induction motors are normally used in the industrial environments. Industry has begun to use energy efficient high power rating electrical drives. Multilevel inverter drives have become a solution for energy efficient drives in recent years. There may be probability for occurring of many faults in the multi-level inverter fed induction motor drive due to its complex switching patterns. So it is necessary to identify types of fault and its location in order to improve the reliability of the drives. In this paper presents a new fault diagnosis technique based on discrete wavelet transforms for diode clamped multilevel inverter fed induction motor drives. For demonstrating the proposed method the gate pulse failure fault are considered in the diode clamped multilevel inverter. The complete system is modeled using MATLAB/Simulink. The simulated results are shown to illustrate the effectiveness of the proposed method.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123838224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
PCA-LDA based face recognition system & results comparison by various classification techniques 基于PCA-LDA的人脸识别系统及各种分类技术的结果比较
2013 International Conference on Green High Performance Computing (ICGHPC) Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533913
Tomesh Verma, Raj Kumar Sahu
{"title":"PCA-LDA based face recognition system & results comparison by various classification techniques","authors":"Tomesh Verma, Raj Kumar Sahu","doi":"10.1109/ICGHPC.2013.6533913","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533913","url":null,"abstract":"Face recognition has a major impact in security measures which makes it one of the most appealing areas to explore. To perform face recognition, researchers adopt mathematical calculations to develop automatic recognition systems. As a face recognition system has to perform over wide range of database, dimension reduction techniques become a prime requirement to reduce time and increase accuracy. In this paper, face recognition is performed using Principal Component Analysis followed by Linear Discriminant Analysis based dimension reduction techniques. Sequencing of this paper is preprocessing, dimension reduction of training database set by PCA, extraction of features for class separability by LDA and finally testing by nearest mean classification techniques. The proposed method is tested over ORL face database. It is found that recognition rate on this database is 96.35% and hence showing efficiency of the proposed method than previously adopted methods of face recognition systems.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"432 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131579487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Hybrid authentication technique to preserve user privacy and protection as an end point lock for the cloud service digital information 混合身份验证技术用于保护用户隐私和保护云服务数字信息的端点锁定
2013 International Conference on Green High Performance Computing (ICGHPC) Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533904
D. Chandramohan, T. Vengattaraman, D. Rajaguru, R. Baskaran, P. Dhavachelvan
{"title":"Hybrid authentication technique to preserve user privacy and protection as an end point lock for the cloud service digital information","authors":"D. Chandramohan, T. Vengattaraman, D. Rajaguru, R. Baskaran, P. Dhavachelvan","doi":"10.1109/ICGHPC.2013.6533904","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533904","url":null,"abstract":"This paper presents a new approach for privacy preserving of user data and publishing in cloud storage area. Hybrid authentication technique overcomes the limitations of attackers and general intruders and preserves better utilization of user's confidential data by providing access only to authorized persons. In this proposed technique it is illustrated how this technique used to prevent user secret data attributes kept in digital cloud storage environment. Moreover the proposed system shows a better data privacy preserving utility by users and handling sensitive data during vulnerable attempts and attacks to the cloud storage area.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125503277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A novel framework to prevent privacy breach in cloud data storage area service 一种防止云数据存储区域服务中隐私泄露的新框架
2013 International Conference on Green High Performance Computing (ICGHPC) Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533903
D. Chandramohan, T. Vengattaraman, D. Rajaguru, R. Baskaran, P. Dhavachelvan
{"title":"A novel framework to prevent privacy breach in cloud data storage area service","authors":"D. Chandramohan, T. Vengattaraman, D. Rajaguru, R. Baskaran, P. Dhavachelvan","doi":"10.1109/ICGHPC.2013.6533903","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533903","url":null,"abstract":"The present paper focuses on user data privacy invasion and it is more important in cloud data storage. Numerous approaches and techniques have proposed so for, to preserve the cloud user privacy. This paper introduces a layered framework for preserving secrecy of cloud user and preventing digital data loss, using onion privacy layer, garlic privacy layer. This layered framework prevents the confidential information by multiple encryption of onion and garlic privacy preserving layered approach.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134568765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Efficacious applicability of foolproof security and reliable storage services in cloud computing 万无一失的安全可靠的存储服务在云计算中的有效应用
2013 International Conference on Green High Performance Computing (ICGHPC) Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533905
A. Mary, J. S. Bersiya
{"title":"Efficacious applicability of foolproof security and reliable storage services in cloud computing","authors":"A. Mary, J. S. Bersiya","doi":"10.1109/ICGHPC.2013.6533905","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533905","url":null,"abstract":"Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks toward the correctness of the data in cloud. we propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. Also an third party auditor for the auditing mechanism.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122324597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy preservation and enhanced utility in search log publishing using improved zealous algorithm 使用改进的热心算法在搜索日志发布中保护隐私和增强效用
2013 International Conference on Green High Performance Computing (ICGHPC) Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533936
S. Belinsha, A. Raghavendra
{"title":"Privacy preservation and enhanced utility in search log publishing using improved zealous algorithm","authors":"S. Belinsha, A. Raghavendra","doi":"10.1109/ICGHPC.2013.6533936","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533936","url":null,"abstract":"Search log records can enhance the quality and delivery of internet information services to the end user. Analysing and exploring the search log can explore the user's behaviour. When these search logs are published it must ensure privacy of the users at the same time it should exhibit better utility. The existing ZEALOUS algorithm uses a two threshold framework to provide probabilistic differential privacy. In the course of providing this level of privacy the search log looses it's utility, as it publishes only frequent items. So an algorithm is proposed to enhance the utility of search log by qualifying the infrequent items while publishing at the same time preserving the stronger level of privacy.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129885800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EFBV: En-Route Filtering Based Batch Verification scheme for false data injection attack in wireless sensor networks EFBV:基于路由过滤的无线传感器网络中假数据注入攻击的批验证方案
2013 International Conference on Green High Performance Computing (ICGHPC) Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533935
P. Joyce, Beryl Princess
{"title":"EFBV: En-Route Filtering Based Batch Verification scheme for false data injection attack in wireless sensor networks","authors":"P. Joyce, Beryl Princess","doi":"10.1109/ICGHPC.2013.6533935","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533935","url":null,"abstract":"Formal specifications have a variety of applications, including testing, maintenance, optimization, refactoring, documentation, and program repair. However, such specifications are difficult for human programmers to produce and verify manually, and existing automatic specification miners that discover two-state temporal properties have prohibitively high false positive rates, Wireless Sensor Networks are usually deployed at unattended or hostile environments. So they are very vulnerable to injecting false data attack. An adversary could compromise a sensor node accesses all stored keying materials and inject false data causing energy wasted in en-route nodes. In this paper, we propose En-Route Filtering Based Batch Verification (EFBV) scheme to find gang injecting false data attack and filter the false data. By batch verification of reports the false data can be identified and filtered easily. With the proposed mechanism, injected bogus data can be early detected and filtered by En-Route sensor nodes. Thus, it can be discover the intruder before it reaches the sink. The proposed EFBV scheme could be effectively saving energy and avoid sink overhead. It also makes possible to thwart the false data even if network contains at least one uncompromised neighboring node. The proposed scheme achieves most energy efficient, the high filtering probability, scalability and reliability, reduce traffic overhead.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131204107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Preserving national animal using wireless sensor network based hotspot algorithm 基于无线传感器网络的热点算法保护国家动物
2013 International Conference on Green High Performance Computing (ICGHPC) Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533937
J. Anand, A. Jones, T. Sandhya, K. Besna
{"title":"Preserving national animal using wireless sensor network based hotspot algorithm","authors":"J. Anand, A. Jones, T. Sandhya, K. Besna","doi":"10.1109/ICGHPC.2013.6533937","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533937","url":null,"abstract":"In recent years, ecological monitoring is given more importance to preserve the various species in the environment. Wildlife monitoring gradually progressed with the developments in Global Positioning System (GPS) and wireless sensor communication. In this paper, a study on our national animal reserves is made and reviewed papers related to animal tracking. Also the paper proposed an efficient monitoring approach for tigers using wireless sensor network based on hotspot algorithm to preserve the wild species. This system can be used by the ecologists to track and monitor various parameter of the wild species to preserve the habitats.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115209067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Performance analysis of OSPF and EIGRP routing protocols for greener internetworking 面向绿色互联的OSPF和EIGRP路由协议性能分析
2013 International Conference on Green High Performance Computing (ICGHPC) Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533929
Y. Krishnan, G. Shobha
{"title":"Performance analysis of OSPF and EIGRP routing protocols for greener internetworking","authors":"Y. Krishnan, G. Shobha","doi":"10.1109/ICGHPC.2013.6533929","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533929","url":null,"abstract":"Routing protocol is taking a vital role in the modern internet era. A routing protocol determines how the routers communicate with each other to forward the packets by taking the optimal path to travel from a source node to a destination node. In this paper we have explored two eminent protocols namely, Enhanced Interior Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF) protocols. Evaluation of these routing protocols is performed based on the quantitative metrics such as Convergence Time, Jitter, End-to-End delay, Throughput and Packet Loss through the simulated network models. The evaluation results show that EIGRP routing protocol provides a better performance than OSPF routing protocol for real time applications. Through network simulations we have proved that EIGRP is more CPU intensive than OSPF and hence uses a lot of system power. Therefore EIGRP is a greener routing protocol and provides for greener internetworking.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115511261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Novel cascaded H-bridge multilevel inverter with harmonics elimination 新型级联h桥多电平消谐波逆变器
2013 International Conference on Green High Performance Computing (ICGHPC) Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533923
K. Gobinath, S. Mahendran, I. Gnanambal
{"title":"Novel cascaded H-bridge multilevel inverter with harmonics elimination","authors":"K. Gobinath, S. Mahendran, I. Gnanambal","doi":"10.1109/ICGHPC.2013.6533923","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533923","url":null,"abstract":"Multilevel inverter is one of the most recent and popular type of advances in power electronics. It synthesizes desired output voltage waveform from several dc sources used as input for the multilevel inverter. This paper presents the two techniques for improving the quality of the output voltage and efficiency. First, new novel topology for multilevel inverter is introduced which reduces the number of switches compared to other for the same level of output voltage. Second, Selective Harmonics Elimination Stepped Waveform (SHESW) method is implemented to eliminate the lower order harmonics. Fundamental switching scheme is used to control the power electronics switches in the inverter. The proposed topology is suitable for any number of levels. When the levels are increased the number of switches used is reduced compared to the conventional cascaded H-bridge multilevel inverter. This paper is particularly focuses on seven level inverter. In the proposed topology only 7 switches were used. The harmonic reduction is achieved by selecting appropriate switching angles. It shows hope to reduce initial cost and complexity hence it is apt for industrial applications. In this paper third and fifth level harmonics have been eliminated. Simulation work is done using the MATLAB software which validates the proposed method and finally THD comparison is presented for analysis.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125248910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信