{"title":"Novel Control Strategy for Cascaded H-Bridge Converter based DSTATCOM","authors":"K. Anuradha, B. Muni, A. Rajkumar, K. Balaji","doi":"10.1109/IICPE.2006.4685390","DOIUrl":"https://doi.org/10.1109/IICPE.2006.4685390","url":null,"abstract":"Reactive power management in a power distribution network of a power utility and industry plays a major role in reducing distribution loss, in maintaining constant distribution voltage and in improving power factor. The paper presents the simulation studies on a cascaded H-Bridge converter based DSTATCOM for power factor improvement in power distribution set-up using load side compensation. In this novel control strategy, load reactive current is monitored and set as a reference for DSTATCOM controller in such a way that DSTATCOM is able to supply the reactive power demanded by the load both during steady state and transient conditions. For high power applications, cascaded H-Bridge converter is the most ideal choice compared to neutral point clamped inverter and two-level inverter with series connected power devices","PeriodicalId":122994,"journal":{"name":"First International Conference on Industrial and Information Systems","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124319430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Control of Camera Mounted Robots in Order to Maximize Information","authors":"M. S. Sugathadasa, B. Ghosh, W. Dayawansa","doi":"10.1109/ICIIS.2006.365636","DOIUrl":"https://doi.org/10.1109/ICIIS.2006.365636","url":null,"abstract":"We consider the problem of optimal control of two sensory robots with on board cameras from the viewpoint of maximizing the accuracy of imaging of a set of moving targets. Both calibrated and uncalibrated camera systems are considered, and a performance index in the form of the integral of the error covariance of the reconstructed images, is suggested. In the uncalibrated case image reconstruction is only possible only up to the orbits of the projective linear group, and in this case we treat the covariance as a two tensor on the projective space. We also discuss the case of three dimensional camera motion under the Lising's constraints, and show how to extend planar results to this case.","PeriodicalId":122994,"journal":{"name":"First International Conference on Industrial and Information Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126080567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Shantharajah, K. Duraiswamy, G. M. Kadhar Nawaz
{"title":"Key Management and Distribution for Authenticating Group Communication","authors":"S. Shantharajah, K. Duraiswamy, G. M. Kadhar Nawaz","doi":"10.1109/ICIIS.2006.365651","DOIUrl":"https://doi.org/10.1109/ICIIS.2006.365651","url":null,"abstract":"In network communication, security is essential to prevent intruder's attack; Where Authentication plays a vital role so as to ensure the right participant in communication. To authenticate a group of users and to hold confidentiality between them a new approach of key management is handled in this paper. This key management presentation is a group key used for cryptography process that provides security with less computation complexity, which leads to fast and easy authentication. Here, a tree based key management scheme has been designed through which the key distribution among the users involves authentication with less storage complexity too. This paper describes the dynamic membership authentication, which states the communication or transaction between user and required server with a new different instant key that is formed from a group of members who are currently participating in transaction or communication. Releasing or joining a user from the group or to the group is possible so that the key gets changed instantly whenever there is an alteration in current participation of users in communication. With the help of each user's hidden key an `instant key' can be computed. As the entire user's hidden keys are used for obtaining an instant key, it can ensure the authentication among the valid users during communication. So an intruder cannot interrupt any communication between users as the key gets varied often. Thus it supports clear authentication and provides security among group communication","PeriodicalId":122994,"journal":{"name":"First International Conference on Industrial and Information Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123577203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Non-Repudiation for Techno-Information Environment","authors":"J. Adikari","doi":"10.1109/ICIIS.2006.365770","DOIUrl":"https://doi.org/10.1109/ICIIS.2006.365770","url":null,"abstract":"Non-repudiation means that a person is unable to deny a certain action that he has done under any circumstances. There are several mechanisms, standards and protocols to achieve non-repudiation in techno-information environment. However efficiency in non-repudiation in legal framework was not considerably addressed within the context of those mechanisms. Lack of efficient non-repudiation in the legal framework for techno-information environment makes legal issues when evidence is generated maintained. It can be derived that traditional non-repudiation mechanism delivers efficient non-repudiation. Efficient non-repudiation in techno-information environment is achieved by mapping traditional non-repudiation. Evaluation methodology for efficiency of non-repudiation mechanisms has been improved during this work. Further most significant finding of this research is the efficient non-repudiation protocol","PeriodicalId":122994,"journal":{"name":"First International Conference on Industrial and Information Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115337778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Wijayakulasooriya, D.M.I.S. Dasanayake, P. I. Muthukumarana, H.M.P. PKumara, L.A.D.M.D. Thelisinghe
{"title":"Remotely Accessible Single Phase Energy Measuring System","authors":"J. Wijayakulasooriya, D.M.I.S. Dasanayake, P. I. Muthukumarana, H.M.P. PKumara, L.A.D.M.D. Thelisinghe","doi":"10.1109/ICIIS.2006.365742","DOIUrl":"https://doi.org/10.1109/ICIIS.2006.365742","url":null,"abstract":"This paper presents a model developed in order to measure the electricity consumption of the domestic electricity users. The model has a special capability of transmitting the measured values to a central database via power line or a ISM band wire-less channel. Two modules were developed for power line communication and wireless communication where users can select the channel on their choice. The central location and all the energy meters in the network were connected in bus topology. Each energy meter was given a unique identification number by which the central data acquisition server identified each of it. A communication protocol was developed in such a way that it would communicate one meter at a time. Time division multiplexing was used to eliminate the collisions and to obtain a reliable transmission. A microcontroller functions as the main processing element of this product. It was programmed in such a way that it would measure energy and transmit the measured values through a specified channel. The designed meter was not only capable of measuring electricity, but also capable of monitoring parameters like voltage, current and power factor. As a final product a comprehensive system was devised to read each energy meter in the network and store the values in a database","PeriodicalId":122994,"journal":{"name":"First International Conference on Industrial and Information Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122740982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fully Three-Dimensional Simulation of a Ground-Penetrating Radar over Lossy and Dispersive Grounds","authors":"D. Uduwawala, A. Gunawardena","doi":"10.1109/ICIINFS.2006.347138","DOIUrl":"https://doi.org/10.1109/ICIINFS.2006.347138","url":null,"abstract":"A 3-D finite difference time domain (FDTD) simulation is done on a ground penetrating radar (GPR) operating above lossy and dispersive grounds. The radar consists of a pair of resistor-loaded bow-tie antennas and the ground consists of Puerto Rico clay loam. The clay loam is modeled by using a two term Debye model with a static conductivity. The simulation results show the GPR response of buried metal and plastic pipes. The results are more realistic as the simulations include commercially used antennas and real ground conditions. The target signatures and target polarization characteristics of the pipes are also studied in the paper","PeriodicalId":122994,"journal":{"name":"First International Conference on Industrial and Information Systems","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122640388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VLSI implementation of spatial prediction based image compression scheme","authors":"A. Nandi, L. Patnaik, R. Banakar","doi":"10.1109/ICIIS.2006.365749","DOIUrl":"https://doi.org/10.1109/ICIIS.2006.365749","url":null,"abstract":"We propose the design and implementation of hardware architecture for spatial prediction based image compression scheme, which consists of prediction phase and quantization phase. In prediction phase, the hierarchical tree structure obtained from the test image is used to predict every central pixel of an image by its four neighboring pixels. The prediction scheme generates an error image, to which the wavelet/sub-band coding algorithm can be applied to obtain efficient compression. The software model is tested for its performance in terms of entropy, standard deviation. The memory and silicon area constraints play a vital role in the realization of the hardware for hand-held devices. The hardware architecture is constructed for the proposed scheme, which involves the aspects of parallelism in instructions and data. The processor consists of pipelined functional units to obtain the maximum throughput and higher speed of operation. The hardware model is analyzed for performance in terms throughput, speed and power. The results of hardware model indicate that the proposed architecture is suitable for power constrained implementations with higher data rate","PeriodicalId":122994,"journal":{"name":"First International Conference on Industrial and Information Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114591268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Computing Learning Ontology with Mental Attributes","authors":"L. Devendra, A. Karunananda","doi":"10.1109/ICIIS.2006.365649","DOIUrl":"https://doi.org/10.1109/ICIIS.2006.365649","url":null,"abstract":"Our research paper argues that learning can be made to be effective when it is learner-centered. Today learning is open to everyone. Knowledge acquisition is not restricted to vertical sources such as schools and colleges. Educational view point is to ensure that the learner has acquired knowledge through any means to ensure required levels of competencies. A learner may have acquired some knowledge without developing any analytical skills, effort to commit to learning or the ability to maintain a continuous process of learning. More seriously, the learner may not have developed adequate enthusiasm about a subject though it appears as if the learner has learned. From the educational viewpoint these are crucial issues that need to be addressed. As such measuring the development of mental attributes associated to a learning process is of great importance. Student learning styles vary enormously. Not all students respond positively to the same teaching techniques. Used well, learning technology can help turn the learning environment into a highly interactive, stimulating world where the student is totally embedded in the learning process. Learning technology can offer students control over their learning and flexibility, so that they can learn in the style that is most effective for each individual","PeriodicalId":122994,"journal":{"name":"First International Conference on Industrial and Information Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123649408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of Analog Circuits with Deep Submicrometer MOSFETs in the Subthreshold Regime of Operation","authors":"S. Chakraborty, S. Baishya, A. Mallik, C. Sarkar","doi":"10.1109/ICIIS.2006.365644","DOIUrl":"https://doi.org/10.1109/ICIIS.2006.365644","url":null,"abstract":"In addition to its attractiveness for ultra-low power applications, analog circuits based on the subthreshold operation of the devices can have significantly higher gain as compared to their superthreshold counterparts. In this paper, we systematically study the analog performances in terms of gm, gm/Id etc of conventional deep submicrometer MOSFETs in the subthreshold region. We also predict such performances with the help of an improved drift-diffusion based current model. The circuit performances (gain, output current etc) are also studied and a very good agreement between the simulation results and the corresponding model prediction is obtained","PeriodicalId":122994,"journal":{"name":"First International Conference on Industrial and Information Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127943262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software implementation of DVB-RCT Modulator","authors":"C. Mannakkara, S. Signell","doi":"10.1109/ICIIS.2006.365772","DOIUrl":"https://doi.org/10.1109/ICIIS.2006.365772","url":null,"abstract":"Digital video broadcasting-terrestrial (DVB-T), the European terrestrial digital TV system, is becoming popular in the broadcaster community around the world. Many countries have started terrestrial digital TV broadcast and are planning to switch-off analogue broadcasts in near future. A new set of services on DVB systems would be the key to sustain its successful commercial deployment. DVB-return channel terrestrial (RCT) is a complementary standard for DVB-T which defines an interactive return channel using UHF/VHF bands. Together, DVB-T/RCT system provides a bi-directional, asymmetric, broadband wireless path between broadcasters and customers, which leads to a true terrestrial wireless interactive system. A host of interactive services are possible on such a platform including IP services. This make DVB-T/RCT a cost effective solution for providing Internet access in rural areas where the telecommunication infrastructure is not fully developed but are already covered by the terrestrial broadcast networks. In this paper, software implementation of the DVB-RCT terminal (DVB-RCTT) is presented which was carried out as a master thesis work. In conjunction with two other master theses, the goal was to develop a prototype of DVB-RCTT for testing purposes at DVB-T/RCT test-bed in Sweden. The prototype consists of a PC running GNU/Linux, a PCI DVB-T card for the receiver and a PCI FPGA board for the modulator of the RCTT. The focus of the software implementation is on the medium access control (MAC) layer of the DVB-RCTT to be executed on the GNU/Linux box. First, the MAC messaging sequences between base-station and terminal at the DVB-T/RCT test-bed were studied. A DVB-RCT MAC message analyzer was developed initially for this purpose. Based on the analysis, MAC layer for a prototype of RCTT is developed under Debian GNU/Linux OS. In order to facilitate the MAC layer communication with the RCT modulator, DVB-API is extended to the support the modulator functionality. The new DVB-RCT modulator API is implemented as a hardware independent device driver under GNU/Linux. The MAC process was tested against messaging sequences obtained at DVB-T/RCT test-bed to verify correct functionality","PeriodicalId":122994,"journal":{"name":"First International Conference on Industrial and Information Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115867261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}