2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)最新文献

筛选
英文 中文
A framework for human-machine interaction using Depthmap and compactness 一个使用深度图和紧凑性的人机交互框架
P. Jyothilakshmi, K. Rekha, K. Nataraj
{"title":"A framework for human-machine interaction using Depthmap and compactness","authors":"P. Jyothilakshmi, K. Rekha, K. Nataraj","doi":"10.1109/ERECT.2015.7499060","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499060","url":null,"abstract":"In recent past research and development in the field of Human-computer/machine interaction (HMI) is on fast track because there has been enough advancement of technologies such as advanced image processing techniques and sensors etc. which provides ease to formulate a test bed to experiment various HMI. A device called Kinect has been introduced for controlling functionalities of windows operating system, which is being widely used in Xbox games by Microsoft. This paper illustrates one of the popular HMI application called mouse control using hand gesture recognition. The method is named as hand-mouse (HM). HM tracks the full body vital core point and the movement of palm controls the movement of mouse cursor and the opening and closing of palm controls a mouse click events. The HM system is using Kinect in order to avoid wearing of any sensors or gesture training dataset, which reduces the computational overhead and experimental results demonstrates a real time output with satisfactory results having higher true positive and lesser false negative.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129124420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving the efficiency of LTE-MIMO performance by utilizing Carrier Aggregation method 利用载波聚合方法提高LTE-MIMO性能的效率
B. S. Yashoda, K. Nataraj
{"title":"Improving the efficiency of LTE-MIMO performance by utilizing Carrier Aggregation method","authors":"B. S. Yashoda, K. Nataraj","doi":"10.1109/ERECT.2015.7499023","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499023","url":null,"abstract":"Smart electronic gadgets are used to increase the data usage in recent mobile communications. But, the spectrum efficiency cannot be increased in terms of data rates in 4G LTE. To improve this high data rates, it is essential to improve the bandwidths (≤ 100 MHz) using multiple carrier or channel since it is not possible by single channel or carrier. For improving data rates high, here it is utilized the Carrier Aggregation-[CA] method which aggregates more than two component carriers from the continuous [or Intraband continuous] components in the spectrum. With CA, single user equipment on multiple carriers can be scheduled concurrently, which fulfills the huge set of bandwidth necessities to attain the service for amended performance. Since CA is a multi-carrier method any available SCC-[Secondary Component Carrier] can be combined with the PCC-[Primary Component Carrier], which is allocated to the user equipment. For example, five component carriers each of 20 MHz are combined to increase bandwidth to 100 MHz for high data rates. The extensive simulation is carried out in MATLAB software and the performance of the CA method utilization for LTE-MIMO is presented.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134167083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Priority based slot allocation for media access in Wireless Sensor Networks 基于优先级的无线传感器网络介质访问槽分配
M. Patil, R. Biradar
{"title":"Priority based slot allocation for media access in Wireless Sensor Networks","authors":"M. Patil, R. Biradar","doi":"10.1109/ERECT.2015.7498995","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7498995","url":null,"abstract":"In most computer and communication networks, nodes share common medium for transmitting data. The Medium Access Control (MAC) protocol is responsible for regulating access to common medium. The use of Wireless Sensor Networks (WSNs) has been widely accepted in almost all the walks of life. As the nodes in WSN have limited power source, energy efficiency plays an important role. To increase the lifetime of WSNs, energy conservation must be essential for different layers of protocol suite especially the MAC layer. MAC protocols improve energy efficiency of WSNs by reducing collisions, control overhead, idle listening and overhearing. MAC protocol design varies according to application requirements and network architecture. In this paper, we discuss Priority based Slot Allocation scheme for media access in WSN (PSAWSN) where nodes are assigned a Priority Index (PI) based on the number of requests by nodes in a particular period modelled by Poisson distribution. Slot is allocated to node having higher priority stored in PI. PSAWSN also provides reliability by handling node failures and analyses parameters such as Average Service Utilization of Manager (ASU) and Average Waiting Time (AWT) of contending nodes. Analysis of results shows that both ASU and AWT increase as the number of contending nodes is increased for increasing values of mean arrival rate.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131597047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Power quality disturbances monitoring using Hilbert-Huang transform and SVM classifier 基于Hilbert-Huang变换和SVM分类器的电能质量扰动监测
R. Shilpa, S. Prabhu, P. Puttaswamy
{"title":"Power quality disturbances monitoring using Hilbert-Huang transform and SVM classifier","authors":"R. Shilpa, S. Prabhu, P. Puttaswamy","doi":"10.1109/ERECT.2015.7498978","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7498978","url":null,"abstract":"The voltage signal disturbances may lead to the difficulties viz. heating, device aging, etc. Enhancement of the devalued supplied power voltage is a prime task that needs identification and also the classification of the noise. Therefore, for disturbances namely voltage sag, transients, swell and harmonic voltage disparities, identification by Hilbert-Huang transform and classification by Support Vector Machine is presented. The fault location in the gathered real-time substation data is analyzed by Hilbert transform. Also the performance estimation of Empirical Mode Decomposition with its noise assisted version called Ensemble Empirical Mode Decomposition is presented. The comparison amongst the classification results of cross-correlation and SVM are also proposed.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122838379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Robust and secure key management in WSN using arbitrary key-deployment 基于任意密钥部署的WSN强健安全密钥管理
Jyothi Metan, K. N. Narasimha Murthy
{"title":"Robust and secure key management in WSN using arbitrary key-deployment","authors":"Jyothi Metan, K. N. Narasimha Murthy","doi":"10.1109/ERECT.2015.7499021","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499021","url":null,"abstract":"The area of wireless sensor network is already shrouded with various issues e.g. energy issues, routing issues, QoS issues, and security issues. Although in past there were evolution of various secure techniques, but majority of the technique were sophisticated cryptographic implementations where time and space complexities were less emphasized. This paper presents a simple and a novel technique called as MLKS i.e. Multi Level Key Security that applies simple set theory and key distribution mechanism for securing the data aggregation in wireless sensor network. The technique is also applicable on multiple security standards supporting 128, 216, 160, or 512 bits of key size. The outcome of the proposed system is compared with the most significant work to find the proposed system outperforms the existing system with respect to computational time and storage cost.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123205383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Electronically linked Brain to Brain communication in humans using non-invasive technologies 使用非侵入性技术的人类电子连接脑对脑通信
K. Ravikumar, M. Siddappa
{"title":"Electronically linked Brain to Brain communication in humans using non-invasive technologies","authors":"K. Ravikumar, M. Siddappa","doi":"10.1109/ERECT.2015.7499019","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499019","url":null,"abstract":"In this paper we will discuss on how electronically linked Brain to Computer Interface(BCI) and Computer to Brain Interface(CBI) can be used to develop Brain to Brain Interface(BBI). In this system, non-invasive technology is deployed to achieve conscious Brain to Brain(B2B) communication. At BCI site, data is transmitted using ElectroEncephaloGraphy (EEG) a non-invasive method to record electrical activity of the brain along the scalp. At CBI site Transcranial Magnetic Stimulation (TMS) or Transcranial direct current stimulation (tDCS) again a non-invasive method used to stimulate small regions of the brain is used to receive the data. From the proposed system, it allows information transfer between brains to do away with language or can send thoughts from one brain to another brain in a way not represented by sounds or words. Connecting brains with computers as well as other brains is profoundly important as it will change human society in future communication technology.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126433782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine vision for correlating Tool status and machined Surface in Turning Nickel-base super alloy 镍基高温合金车削过程中刀具状态与加工表面关联的机器视觉
Y. D. Chethan, H. Ravindra, N. Prashanth, Y. T. Krishne Gowda, T. Gowda
{"title":"Machine vision for correlating Tool status and machined Surface in Turning Nickel-base super alloy","authors":"Y. D. Chethan, H. Ravindra, N. Prashanth, Y. T. Krishne Gowda, T. Gowda","doi":"10.1109/ERECT.2015.7498986","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7498986","url":null,"abstract":"Substantial amount of research has been performed on automated tool status monitoring systems. The research has tended to focus on the development of Tool and work Surface Texture Monitoring using machine vision. However, there has been relatively less effort to monitor surface texture. This paper presents machine vision system, capable of providing surface texture information in Turning Inconel 718 material. Images of the turned surface specimens were acquired using the machine vision system. The images were pre-processed to eliminate noise present in the image. An image histogram quantifies the distribution of all image pixels against the grey level and is a measure of the reflectance properties of the surface under monitoring. The histogram shape changes as the wear state of tool increases. From the analysis of the intensity distribution in the region of interest of the tool and surface, a good correlation between the tool image and corresponding surface image was found. It is expected that these results would support further to establish a criteria for tool replacement in turning operation.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132567237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient implementation of scalar multiplication for ECC in GF (2m) on FPGA 在FPGA上实现GF (2m)中ECC的标量乘法
N. Shylashree, V. Sridhar
{"title":"Efficient implementation of scalar multiplication for ECC in GF (2m) on FPGA","authors":"N. Shylashree, V. Sridhar","doi":"10.1109/ERECT.2015.7499063","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499063","url":null,"abstract":"In the era where major portion of transactions take place online, security of the data becomes prime concern. Elliptic Curve Cryptography (ECC) is an approach to public-key cryptography based on Elliptic curves over finite fields. Elliptic curve cryptography is used for secure transmission of data with smaller key length. The underlying operation of ECC is scalar point multiplication. For the ECC to be efficient, the multiplication should be done at high speed. In this work high speed crypto-processor architecture for computing point multiplication for the elliptic curves defined over the binary field is designed. The projective coordinate system is used to increase the efficiency. The proposed architecture for computing 163-bit scalar multiplication for ECC can reach maximum frequency of 45.60 MHz and occupies 101 slices. It completes one 163-bit scalar multiplication in 9.9μs.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"56 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132790874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of microstrip antenna performance by varying length of rectangular slot DGS 矩形槽DGS变长微带天线性能分析
R. Anita, M. V. C. Chaitanya kumar
{"title":"Analysis of microstrip antenna performance by varying length of rectangular slot DGS","authors":"R. Anita, M. V. C. Chaitanya kumar","doi":"10.1109/ERECT.2015.7498984","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7498984","url":null,"abstract":"This paper presents the study on the effect of a rectangular slot defective ground structure on a rectangular microstrip patch antenna operating at 2.4 GHz. The rectangular microstrip antenna with rectangular defective ground structure(DGS) is simulated using HFSS software. The effect of defective ground structure on the rectangular microstrip patch antenna is observed by varying the length of the rectangular slot and the performance of the antenna in terms of return loss and bandwidth are analyzed. The simulation results show that the performance of the antenna is improved by inserting a rectangular slot defect on the ground plane and further improved by varying the length of the slot-defect. The bandwidth is increased from 56 MHz to 67 MHz and the return loss is improved from -20 dB to -39.31 dB.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133331996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Investigations on dielectric behaviour of a new ecofriendly dielectric coolant for transformers 一种新型环保型变压器介质冷却剂的介电性能研究
V. Champa, A. N. Nagashree, B. V. Sumangala, G. Nagabhushana
{"title":"Investigations on dielectric behaviour of a new ecofriendly dielectric coolant for transformers","authors":"V. Champa, A. N. Nagashree, B. V. Sumangala, G. Nagabhushana","doi":"10.1109/ERECT.2015.7499055","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499055","url":null,"abstract":"Electrical transformers are very widely used in the Electrical Power sector at frequencies of 50Hz/60Hz. The liquid dielectric used in power transformers for many decades [1] has been mineral oil. Special applications such as Defence and Airborne equipments use silicone fluid as a dielectric coolant because of its higher operating temperatures of about 150°C- 200°C. Of late, natural vegetable seed oils are also used in power transformers, mainly due to their bio-compatibility, bio-degradability and they are also from a `renewable source'. These have resulted in the increased usage of natural esters (vegetable oils) as dielectric fluids in electrical equipments. They have greater advantage of having a high flash point (above 300°C) which is an important property of a dielectric coolant. Therefore, the present work focuses on investigations on the dielectric behavior of a new indigenous vegetable seed oil codenamed as IO-18, particularly for use at high voltage and high frequencies. Though, a few indigenous vegetable oils were considered for initial study, IO-18 was selected for the present extensive investigations as some physical and thermal properties of IO-18 are more advantageous. Extensive investigations were carried out experimentally to study the important dielectric properties namely, breakdown voltage, dielectric dissipation factor and relative permittivity at 50Hz and over a temperature range from room temperature to 90°C in both `as received' condition and treated conditions. Behaviour of the oil under high frequencies and at higher temperatures was also investigated. The results of these investigations have been compared with those of mineral oil and silicone fluid to validate the dielectric behavior of vegetable oil.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132074723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信