2019 International Conference on Recent Advances in Energy-efficient Computing and Communication (ICRAECC)最新文献

筛选
英文 中文
Performance Comparison of MPC and PID Controller for Single Input Single Output Process MPC与PID控制器在单输入单输出过程中的性能比较
P. Abinaya, R. Muniraj, S. Amritha, M. Sivapalanirajan
{"title":"Performance Comparison of MPC and PID Controller for Single Input Single Output Process","authors":"P. Abinaya, R. Muniraj, S. Amritha, M. Sivapalanirajan","doi":"10.1109/ICRAECC43874.2019.8995011","DOIUrl":"https://doi.org/10.1109/ICRAECC43874.2019.8995011","url":null,"abstract":"A controller is the heart of the automatically controlled processes systems. This paper discusses and compares between the different closed-loop controllers IMC based PID controller, Ziegler Nichols based PID and Model Predictive Controller. The major perspective of this paper is to find the optimal controller for the process (i.e) reach the steady state in fewer control moves and produce the less error. To analyse the performance of the system by designing various controllers for the process, Transient and Steady-state responses are used to evaluate the system in time domain. Transient response is determined by rise time, peak time, peak overshoot and settling time. Steady state response is analysed by Integral Square Error (ISE) and Integral Absolute Error (IAE).","PeriodicalId":137313,"journal":{"name":"2019 International Conference on Recent Advances in Energy-efficient Computing and Communication (ICRAECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131335550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Free Space Optical Communication and Laser Beam Propagation through Turbulent Atmosphere: A Brief Survey 湍流大气中自由空间光通信与激光束传播综述
Nimmy Lazer, Y. P. Arul Teen
{"title":"Free Space Optical Communication and Laser Beam Propagation through Turbulent Atmosphere: A Brief Survey","authors":"Nimmy Lazer, Y. P. Arul Teen","doi":"10.1109/ICRAECC43874.2019.8994973","DOIUrl":"https://doi.org/10.1109/ICRAECC43874.2019.8994973","url":null,"abstract":"In this survey paper, a brief survey has been performed about the free space optical communication (FSO), which has emerged as an innovative hot topic in the field of research. This paper inspected about the features and challenges faced by FSO communication. Here, it is focused about atmospheric turbulence, one of the main challenge FSO has to encounter during the propagation of laser beams through free space. The survey has also been undergone regarding the various modulation schemes, and various laser optical beam profile that can be used in FSO as optical source of propagation. The analysed techniques employed for the process of modulation are Amplitude shift keying(ASK), Binary phase shift keying(BPSK), Quadrature phase shift keying(QPSK), Pulse position modulation(PPM), Pulse amplitude modulation(PAM), Pulse width modulation(PWM). Also, investigated about the effect of different types of aberrations such a tilt, astigmatism, coma, and spherical aberrations present in a turbulent atmosphere on different laser beam profiles such as Bessel Gaussian (BG) beam, Laguerre-Gaussian (LG) beam, Hermite-Gaussian (HG) beam, Helical beam.","PeriodicalId":137313,"journal":{"name":"2019 International Conference on Recent Advances in Energy-efficient Computing and Communication (ICRAECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128110528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Modified sine cosine algorithm based secure IOT data placement technique in cloud computing environment 基于改进正弦余弦算法的云计算环境下物联网安全数据放置技术
N. Mohan, Shaji. D.S
{"title":"Modified sine cosine algorithm based secure IOT data placement technique in cloud computing environment","authors":"N. Mohan, Shaji. D.S","doi":"10.1109/ICRAECC43874.2019.8994981","DOIUrl":"https://doi.org/10.1109/ICRAECC43874.2019.8994981","url":null,"abstract":"The rapid development of multimedia cloud, the larger amount of data is produced by IoT (Internet of Things) devices. The IoT is the one of the most popular part of the Cloud multimedia. Compared with IoT, the Cloud Data Centres (CDCs) contain more amounts of resources. It can be produced more amount of data and the data privacy is an important problem. In this paper, we imposed Modified Sine Cosine Algorithm (MSCA) is highly effective to solving real time privacy problems. We introduced six scales of dataset for the better performance of our proposed method. Basically, the cloud environment conservation privacy (IDP) is analyzed with the usage of resource utilization, access time and energy consumption parameters. The Modified Sine Cosine Algorithm (MSCA) is sketched to reach high resource usage, better data access and energy saving with privacy preservation of IoT. Therefore, the proposed experimental results were demonstrated the high resource utilization, low access time and energy consumption.","PeriodicalId":137313,"journal":{"name":"2019 International Conference on Recent Advances in Energy-efficient Computing and Communication (ICRAECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131491419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Various Data Skewness Methods in the Hadoop Environment Hadoop环境中的各种数据偏度方法
Subhankar Mishra, Namita Sethi, Ayes Chinmay
{"title":"Various Data Skewness Methods in the Hadoop Environment","authors":"Subhankar Mishra, Namita Sethi, Ayes Chinmay","doi":"10.1109/ICRAECC43874.2019.8994979","DOIUrl":"https://doi.org/10.1109/ICRAECC43874.2019.8994979","url":null,"abstract":"Hadoop provides an environment for efficient storage and processing of data. Time for completion of a BigData job depends on the slowest mapper or slowest reducer. So for an efficient job there has to be an efficient division of data at both mapper side and reducer side which would effectively decrease the time taken by the job to complete. But under many conditions, Hadoop MapReduce fails to implicitly divide the data in an efficient way between mappers and reducers. This gives rise to data skewness or load imbalance. From the study, it is revealed that data skewness can occur at both the mapper side and reducer side, such as the page rank algorithm or cloudburst. Techniques like LEEN, PTSH, SkewTune, Skew Reduce are implemented to tackle the problem of data skewness. Each technique has its own set of advantage and disadvantage. LIBRA and DREAMS are the most preferred and popular techniques against data skewness.","PeriodicalId":137313,"journal":{"name":"2019 International Conference on Recent Advances in Energy-efficient Computing and Communication (ICRAECC)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124496230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Survey on Data Security using Blockchain: Merits, Demerits and Applications 区块链数据安全调查:优点、缺点和应用
Manisha Nehe, S. Jain
{"title":"A Survey on Data Security using Blockchain: Merits, Demerits and Applications","authors":"Manisha Nehe, S. Jain","doi":"10.1109/ICRAECC43874.2019.8995064","DOIUrl":"https://doi.org/10.1109/ICRAECC43874.2019.8995064","url":null,"abstract":"Network security is consequential prospect while working over the internet, LAN or other networks. Data security must be high precedence when it comes to network setup. Data security assures that shared data is kept secure. In the network, data security is crucial against attackers and hackers. The data security is all about first to secure the information from pirated access and the second one is to protect from thwart hackers. The objective of network security is to keep the network running and safe for all legitimate users. The target of this paper is to present the merits and demerits of blockchain over data security in different sectors. The blockchain technology is used in various applications to store exchanges of values via transactions. All transactions made by nodes are signed digitally with the preceding transaction hash and the public key of the destination node; this scheme guarantees that transactions are tamper-proof. A block containing transactions will be approved by specific blockchain nodes. In block-chain technology, each page in a ledger of transactions forms a block. That block affects the next block or page through cryptographic hashing. In other words, when a block is finally completed, it creates a special secure code, that links to the next page or block, creating a chain of blocks, or block-chain. Data security can be accomplished using the block-chain concept. The hash tables of raw data files are stored on the blockchain, and other copies are validated by a hashing technique. Thus any interference with the data will be instantly found because the initial hash tables are stored on thousands of nodes.","PeriodicalId":137313,"journal":{"name":"2019 International Conference on Recent Advances in Energy-efficient Computing and Communication (ICRAECC)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115316953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Review On Video Denoising Methods 视频去噪方法综述
M. C. Sheeba, Dr. C. Seldev Christopher
{"title":"A Review On Video Denoising Methods","authors":"M. C. Sheeba, Dr. C. Seldev Christopher","doi":"10.1109/ICRAECC43874.2019.8995148","DOIUrl":"https://doi.org/10.1109/ICRAECC43874.2019.8995148","url":null,"abstract":"Digital images and videos have great influence in daily life applications such as satellite television, surveillance application, medical image application as well as in areas of research and technology such as geographical information systems and observational astronomy. Consequently noise reduction (denoising) is of key importance in multimedia applications, as digital images and videos are often contaminated by noise. In the process of capturing, recording and transmitting video signals are corrupted by noise, and accordingly denoising is required for visual improvement or as a pre-processing step for subsequent processing tasks, such as compression and analysis. Developing an efficient denoising method for removing noise from the videos, before processing them for further analysis is a great challenge for the researchers. This review covers a summary of important works in the field of video denoising. The advantages and disadvantages of various denoising methods are also discussed. This paper presents the effects of applying various noise types to image models and explores the results of using various denoising methods.","PeriodicalId":137313,"journal":{"name":"2019 International Conference on Recent Advances in Energy-efficient Computing and Communication (ICRAECC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126679035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Face Detection Using Boosted Cascade of Simple Feature 基于简单特征增强级联的人脸检测
Deepali Garibdas Ganakwar, Vipulsangram K. Kadam
{"title":"Face Detection Using Boosted Cascade of Simple Feature","authors":"Deepali Garibdas Ganakwar, Vipulsangram K. Kadam","doi":"10.1109/ICRAECC43874.2019.8994977","DOIUrl":"https://doi.org/10.1109/ICRAECC43874.2019.8994977","url":null,"abstract":"Face detection from picture or capture is admired focus in biometrics study. A lot of public spaces typically include observation cameras for videotape capture and these cameras have their considerable value for safety intention. It is widely recognized that the face discovery includes a significant role in observation arrangement as it doesnt need the objects assistance. The actual compensation of face based recognition over other biometrics is individuality and acceptance. As a persons face is a dynamic thing that bears high degree of changeability in its look, it makes a computer vision to count face discovery as a tough problem. The main challenge in this field is the speed of detection and accuracy. This paper deals with estimating variety of face detection methods and provide a total solution for image based face detection with higher accurateness, an improved response rate as an initial step. The explanation is projected based on performed tests on various face rich databases. Initially, the segmentation of non-skin color pixels from the image is done by building a skin color model in chrominance space i.e. YCbCr. Later, in order to extract human face region, the mathematical morphological operators are used that removes noisy regions and fills the holes in skin-color region. Ultimately, to achieve face detection more accurately, the cascade classifier based on an AdaBoost algorithm is used to scan these face candidates.","PeriodicalId":137313,"journal":{"name":"2019 International Conference on Recent Advances in Energy-efficient Computing and Communication (ICRAECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127425753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multiclass Single Label Model for Web Page Classification 网页分类的多类单标签模型
Aakash Kag, L. Jenila, Livingston L. M. Merlin, Livingston L. G.X Agnel
{"title":"Multiclass Single Label Model for Web Page Classification","authors":"Aakash Kag, L. Jenila, Livingston L. M. Merlin, Livingston L. G.X Agnel","doi":"10.1109/ICRAECC43874.2019.8995087","DOIUrl":"https://doi.org/10.1109/ICRAECC43874.2019.8995087","url":null,"abstract":"Web is a huge repository of information and there is a need of categorization of web pages to facilitate better search and retrieval of pages. Web page classification has become a challenging task due to the exponential growth of the World Wide Web and this study augments classification model with a general facility for automatically assigning class label (e.g., sport, news) to web pages based on the output of a Naive Bayes classifier. For the purpose of build classification model, yahoo Open Directory Project (ODP) data set has been used for create training and testing set. In this research work web page classification was done using Uniform Resource Locator (URL) features, Meta data, Meta keywords, Internal Links and text, which gives better result than URLs based method.","PeriodicalId":137313,"journal":{"name":"2019 International Conference on Recent Advances in Energy-efficient Computing and Communication (ICRAECC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125968409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Servomechanism of BLDC Drive Using Pole Placement Technique 基于极点放置技术的无刷直流驱动伺服机构
E. Anitha, S. Arockia ranjith kumar, T. Ajithkumar, M. Gowthamaraj
{"title":"Servomechanism of BLDC Drive Using Pole Placement Technique","authors":"E. Anitha, S. Arockia ranjith kumar, T. Ajithkumar, M. Gowthamaraj","doi":"10.1109/ICRAECC43874.2019.8995005","DOIUrl":"https://doi.org/10.1109/ICRAECC43874.2019.8995005","url":null,"abstract":"BLDC Motors are advantageous over brushed DC Motors in a wide variety of applications. Almost every BLDC motor application requires the speed control of the motor. The pole placement technique employed in this paper controls the speed of the BLDC. This technique is implemented using SISOTOOL/MATLAB. Using this technique, the poles of the system are placed in the correct location to give the desired speed. The speed response of the system under no-load and loaded conditions validates the designed controller. The results also show the effects of stator current , back emf and torque of the drive.","PeriodicalId":137313,"journal":{"name":"2019 International Conference on Recent Advances in Energy-efficient Computing and Communication (ICRAECC)","volume":"58 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129979848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Iontophoresis in Transdermal Drug Delivery 经皮给药中的离子透入
Reshma Valli Kannan, L. Maceal Tony
{"title":"Iontophoresis in Transdermal Drug Delivery","authors":"Reshma Valli Kannan, L. Maceal Tony","doi":"10.1109/ICRAECC43874.2019.8995140","DOIUrl":"https://doi.org/10.1109/ICRAECC43874.2019.8995140","url":null,"abstract":"This paper is designed by keeping in mind the efficiency and ease of drug delivery through transdermal method. Iontophoresis is a technique that is used to deliver the drug through the skin by the flow of electric current. To deliver the correct dosage, current flow through the skin must be actively controlled by automated system. Iontophoresis is a non- invasive, non-traumatic and painless modality used to deliver large quantity of medicine into a localized area in a cost effective and portable manner that uses electrical current to administer a transdermal drug over minutes to hours. This paper is designed to reduce the time of application of current for the drug permeation and ensure that constant current is maintained throughout the entire process. Since iontophoresis delivers drug transdermally, only small amount of the drug are absorbed into the systemic circulation. Its primary musculoskeletal use is for acute or sub-acute, localized inflammation near the skin’s surface.","PeriodicalId":137313,"journal":{"name":"2019 International Conference on Recent Advances in Energy-efficient Computing and Communication (ICRAECC)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130166134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信