2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)最新文献

筛选
英文 中文
Design of dual gate driver for IGBT by using pulse transformers without saturation effect 利用脉冲变压器无饱和效应设计IGBT双栅驱动器
C. Ramesh, V. Krishnan, H. Ravikumar, A. Manjunatha
{"title":"Design of dual gate driver for IGBT by using pulse transformers without saturation effect","authors":"C. Ramesh, V. Krishnan, H. Ravikumar, A. Manjunatha","doi":"10.1109/ERECT.2015.7498999","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7498999","url":null,"abstract":"In this paper a dual gate driver for IGBT capable of driving top and bottom switches of an inverter leg is proposed. This dual gate driver uses forward converter topology to provide necessary gate current to charge IGBT gate capacitance CGE along with isolation between control circuitry and power circuit. This gate driver will operate from 10% to 90% of duty cycle. The driver output is a two level signal which is positive during on period and negative during off period of the IGBT. To reduce the size of pulse transformer a gated oscillator of 1 MHz pulses of fixed duty cycle 50% and gated by PWM pulses of duty cycle range is used, this paper presents a new topology of two pulse transformers working at 1MHz with 50% duty cycle which complement each other and whose output pulses are added together to get the required pulses to drive IGBT's.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115053440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Congestion control for optimizing data transfer rate in mobile Ad-hoc networks using HSTCP 利用HSTCP优化移动Ad-hoc网络数据传输速率的拥塞控制
Gururaj H L, B. Ramesh
{"title":"Congestion control for optimizing data transfer rate in mobile Ad-hoc networks using HSTCP","authors":"Gururaj H L, B. Ramesh","doi":"10.1109/ERECT.2015.7498977","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7498977","url":null,"abstract":"In the communication era congestion is the bottleneck which degrades the performance. In Ad hoc networks due to infrastructure less character there is no guaranteed bandwidth and node mobility. The traditional TCP variants were good for wired environment, whereas in Ad-hoc networks there are lots of other factors to be considered. We are comparing the traditional TCP Reno and its new variant HSTCP for congestion handling. The congestion window is one of the factors that determine the number of bytes that can be outstanding at any time. The congestion window indicates the maximum amount of data that can be sent out on a connection without being acknowledged. HSTCP comes into picture only if the congestion window size increases abruptly. To improve the retransmission time and to avoid congestion in completely dynamic conditions where node mobility is completely random is the main concern of our research work. HSTCP outperforms when compared to TCP Reno for different network parameters.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115564567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A comparative analysis of Secret Sharing Schemes with special reference to e-commerce applications 秘密共享方案的比较分析,特别是电子商务应用
I. S. Shalini, R. Mohan Naik, S. Sathyanarayana
{"title":"A comparative analysis of Secret Sharing Schemes with special reference to e-commerce applications","authors":"I. S. Shalini, R. Mohan Naik, S. Sathyanarayana","doi":"10.1109/ERECT.2015.7498980","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7498980","url":null,"abstract":"The term cryptography which means “secret writing” has become the foundation primitive in providing security for many communication applications. In many applications, particularly in Group Communication, there is a need to hide secret data like passwords, encryption key, recipes etc. Here, efficient key management protocols are required to provide security for group's secret data, because it is very challenging to provide security especially when group of more members and those members are present in different locations with diverse mechanisms of protection. One among them is Secret Sharing Schemes (SSS) which allow to split and share the group's secret among group members. The secret can be retrived once, when some threshold member combines their share value in a defined way. Across the years, several schemes on Secret Sharing have been presented. In this view, this paper mainly focuses on three different Secret Sharing schemes, such as Shamir's Secret Sharing based on Polynomial Interpolation, Asmuth-Bloom Secret Sharing Scheme based on Chinese Remainder Theorem and Verifiable Secret Sharing Scheme based on Elliptic Curves. All these three schemes have been studied, algorithms are programmed using MATLAB 7.0 tool and executed. It has been observed that all the three schemes works satisfactorily according to the properties defined by the inventors of the schemes.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124696244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Traffic signal time analysis and voice - based app for visually impaired pedestrians 交通信号时间分析和基于语音的视障行人应用程序
R. Basavaraju, Chetana Hegde
{"title":"Traffic signal time analysis and voice - based app for visually impaired pedestrians","authors":"R. Basavaraju, Chetana Hegde","doi":"10.1109/ERECT.2015.7499062","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499062","url":null,"abstract":"Analysis of traffic signal and ensure the safety of visually impaired people is a major challenge in helping disabled people. In this paper, we propose development of an application software which can be easily installed on a mobile device equipped with a camera. This application opens a camera and captures the traffic timer display upon tapping the app-icon. The timer image is then processed to segment the digits in them to identify the actual time in the numeric form. The detected time is then converted as a voice message and played using the app. Thus, the visually impaired person can hear the message about the time left to turn on the pedestrian signal. Getting this alert message, he/she can safely cross the road. The accuracy of the proposed algorithm is found to be 100% as it detected all the digits in every instance of the timer display image.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125863903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis of the dynamic behaviour of a single Hodgkin-Huxley neuron model 单个霍奇金-赫胥黎神经元模型的动态行为分析
E. Dhanya, N. Pradhan, R. Sunitha, A. Sreedevi
{"title":"Analysis of the dynamic behaviour of a single Hodgkin-Huxley neuron model","authors":"E. Dhanya, N. Pradhan, R. Sunitha, A. Sreedevi","doi":"10.1109/ERECT.2015.7499056","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499056","url":null,"abstract":"Brain is a major organ for processing thought, feelings, learning and memory. Neurons being the basic building unit of the brain, mathematical modeling of a neuron can give a great insight into the functioning of the central nervous system. This paper describes the most biologically realistic neuron model and its implementation in Simulink to understand the behavior of a neuron in a real-time environment. Hodgkin-Huxley neuron model is the first successful mathematical model which describes the initiation and propagation of action potentials in neurons. The dynamic behavior of a single HH neuron is examined for varying external stimulus and studied to help develop an interactive biological neural network by coupling a large number of neurons in the future.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114819555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Scale-invariant object identification for jointly addressing issues in moving oject and background 共同解决运动目标和背景问题的尺度不变目标识别
D. Pushpa, H. Sheshadri
{"title":"Scale-invariant object identification for jointly addressing issues in moving oject and background","authors":"D. Pushpa, H. Sheshadri","doi":"10.1109/ERECT.2015.7499007","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499007","url":null,"abstract":"The area of video process pertaining to analysis of the real-time object behaviour is increasing in its pace. However, such process is also accompanied by various critical challenges e.g. variation in illumination condition, complete or partial occlusion, and uncertain mobility of the object. Although, in the last decades there has been archives of research papers discussing about the object detection, but there are only few literatures pertaining to the precise moving object detection with moving background. Therefore, the core objective of this paper is to present a technique that efficiently performs moving object detection for the moving background using enhanced version of Scale-Invariant Feature Transform. The outcome of the study was compared with the most significant work to find it outperforms the existing system with respect to processing time and thereby it is quite found suitable for real-time processing of object detection.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114402950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of rule based lemmatizer for Kannada inflectional words 基于规则的加那语屈折词词法分析器的设计
R. Prathibha, M. Padma
{"title":"Design of rule based lemmatizer for Kannada inflectional words","authors":"R. Prathibha, M. Padma","doi":"10.1109/ERECT.2015.7499024","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499024","url":null,"abstract":"Lemmatizer and stemmer are the two basic modules in most of the natural language processing applications. Stemming is the process of stripping off the affixes that are present in the inflectional word to obtain stem. The extracted stem by the stemmer need not be a valid root or linguistically meaningful word. Lemmatizer removes the affixes that are present in the inflectional word by applying linguistic rules and returns the base-form or dictionary-form of the word, which is known as lemma. The split lemma is a valid root and linguistically meaningful word, hence the lemmatizer requires more linguistic knowledge than the stemmer. In linguistics, the objective of lemmatizer is to group together the different inflected forms of a word, such that these inflected words are analyzed as a common term. In this context, it is necessary to design a lemmatizer for Kannada inflectional words. In this paper we have proposed the design of rule based lemmatizer by adding set of linguistic rules to extract proper and meaningful root from Kannada inflectional word. The proposed module is tested on different types of data sets that are specifically created for this work and the accuracy obtained on these data is above 85%.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114362044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Estimation and guidance for manoeuvring targets 机动目标的估计和制导
M. Radhika, S. S. Parthasarathy, G. Kumar
{"title":"Estimation and guidance for manoeuvring targets","authors":"M. Radhika, S. S. Parthasarathy, G. Kumar","doi":"10.1109/ERECT.2015.7499016","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499016","url":null,"abstract":"The rigorous development in the field of highly manoeuvrable threats gives a huge platform to find the efficient integrated estimation and guidance algorithms. In the present day technology, various kinds of threats are getting advanced day by day. For example ballistic missiles with time varying parameters or low flying cruise missile. Successful intercepting these kinds of highly manoeuvrable targets demands high performance at the end phase. Achieving zero miss distance is a challenge in case of highly manoeuvrable targets. In this paper one of the efficient estimation technique Kalman filtering and guidance algorithm, two dimensional Proportional Navigation law are discussed. Future work of this research is detailed.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125674044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Elimination of energy and communication tradeoff to resist wormhole attack in MANET MANET中消除能量和通信权衡以抵抗虫洞攻击
S. Geetha, Venkanangouda C. Patil
{"title":"Elimination of energy and communication tradeoff to resist wormhole attack in MANET","authors":"S. Geetha, Venkanangouda C. Patil","doi":"10.1109/ERECT.2015.7499003","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499003","url":null,"abstract":"Challenges in meeting the best security standards is still an unsolved question in the area of mobile adhoc network especially pertaining to wormhole attack. Although there are many existing solutions, but majority of them suffers from various trade-off. This paper discusses about the significant issues of the existing techniques and presents a novel secure routing protocol that was found to have sufficient supportability of complex cryptographic algorithms as security measure along with enhancement of data transmission performances. The proposed routing strategy is designed by enhancing the multicast routing protocols by adding few simple entities e.g. Additional Supportive Beacons (ASR), Route-Discovery Beacons (RDB), and Auxiliary Nodes (AN). The outcome of the study shows that proposed technique excels better than existing multicast routing protocol in energy efficiency and packet delivery ratio.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129264487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Identification and classification of diseases in carrot vegetable using Discrete Wavelet Transform 基于离散小波变换的胡萝卜蔬菜病害识别与分类
Gouri C. Khadabadi, Arun Kumar, V. Rajpurohit
{"title":"Identification and classification of diseases in carrot vegetable using Discrete Wavelet Transform","authors":"Gouri C. Khadabadi, Arun Kumar, V. Rajpurohit","doi":"10.1109/ERECT.2015.7498988","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7498988","url":null,"abstract":"Image processing has been proved to be a powerful tool for analysis in numerous fields and applications. Timely recognition of diseases is the main challenge in agriculture science. The present method uses naked eye observation to detect diseases which is less accurate and expensive for large farms. In this paper the system is proposed to identify and classify the diseases in carrot vegetable using the image processing techniques starting from image acquisition, preprocessing, testing, and training. Feature extraction is achieved through Discrete Wavelet Transform (DWT). The features are retrieved making use of the coefficients and then they are stored. These retrieved features stored in the database help to categorize the carrot vegetable disease using Probabilistic Neural Network.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129400746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信