{"title":"Cascade control system and control strategies","authors":"Smriti Goswami, S. S. Khairnar","doi":"10.1109/ICCMC.2017.8282598","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282598","url":null,"abstract":"Control systems like plants of manufacturing, power plants, automobiles, aircrafts and robot manipulator needs a network to exchange information within itself. A network having a closed loop feedback is the choice which is known as cascade control system. To improve the efficiency, flexibility and reliability of these systems can be improved by the inclusion of this control network. Installation, reconfiguration and maintenance costs can also be reduced significantly. For controlling purpose of cascade control system controllers like Proportional integral, Proportional integral derivative are used.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122501156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Punjabi document classification using vector evaluation method","authors":"Mehak Katnoria, Varinderpal Singh, Rajiv Kumar","doi":"10.1109/ICCMC.2017.8282606","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282606","url":null,"abstract":"Most information is stored as text, managing a vast amount of documents in digital forms is vital in text mining applications. Text Mining is a field that extracts hidden, useful information from the text document according to user's query. Text Categorization is the most important part of Text Mining. Text Categorization, also known as Text Classification or topic spotting, is defined as a classification of text documents under predefined categories. Although Punjabi text categorization is a promising field, not much work has been done as compared to English text categorization. This paper proposes a method which uses a categorized Punjabi documents corpus, and then the weights of the tested document's words are calculated to determine the document keywords which will be compared with the keywords of the corpus to determine the tested document's best category.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122729709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chetan M. Rajgire, M. N. Wankhede, Sushil Karvekar
{"title":"Design and implementation of sensorless vector control of induction motor drive using fuzzy-adaptive controller","authors":"Chetan M. Rajgire, M. N. Wankhede, Sushil Karvekar","doi":"10.1109/ICCMC.2017.8282699","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282699","url":null,"abstract":"This paper proposes a method for sensorless speed control of a field oriented vector control of Induction motor drive using a fuzzy controller for speed control and model reference adaptive controller (MRAC) for speed estimation. Speed estimation using reactive power based MRAC has stability problems. To overcome this, flux based MRAC controller is designed which uses actual stator voltages and actual stator current for estimating the speed. This makes sensorless drive stable in all the four quadrants of operation. Conventional PI controller is replaced by the Fuzzy controller to improve the performance of induction motor. The simulation of proposed model is done using MATLAB/SIMULINK. From the analysis, it can be observed that the proposed system gives a better response than conventional controllers and requirement of no additional sensors make the drive suitable for high-performance applications. The simulation results prove the effectiveness of the proposed system.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122862093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient implementation of enhanced key generation technique in data encryption standard (DES)algorithm using VHDL","authors":"Punam Chabukswar, Manoj Kumar, P. Balaramudu","doi":"10.1109/ICCMC.2017.8282600","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282600","url":null,"abstract":"Cryptography is the way toward securing message to maintain a strategic distance from an unapproved hacking of information. Secured Key assumes vital part in cryptography. For expanding the level of security in any correspondence framework this venture proposed an Enhanced key generation unit. The framework proposed here three other that direct keys era approaches to make key generation more grounded are client produced key, second one by utilizing LFSR which is great key stream generator, third is by utilizing chaotic encryption and fourth is 2's supplement. Another part is DES calculation and control unit is likewise intended for controlling the 16 round of DES of encryption and decoding process. In the usage of DES encryption and decoding calculation, a multiplexer-based engineering is utilized to execute the substitution operations (S-Boxes). These proposed engineering is displayed in the VHDL outline dialect and combined in the Xilinx Virtex-xc6vlx75t-3ff484 field-programmable gate array (FPGA) device.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116512022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hyper elliptic curve cryptography in multi cloud-security using DNA (genetic) techniques","authors":"S. Selvi, M. Gobi, M. Kanchana, S. F. Mary","doi":"10.1109/ICCMC.2017.8282604","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282604","url":null,"abstract":"The security concerns would be still there in cloud frameworks. Cryptography comprises of the encryption-decryption systems. There are many plans, calculations those can be utilized for security purposes. Cloud computing has an extraordinary capacity to help efficiency and limit costs, consequently many organizations are grasping it, however in the meantime it constitutes numerous security dangers and difficulties. Because of conceivable outcomes of numerous dangers, for example, benefit blackout, robbery of information, information spillage and the odds of noxious insider assault, utilizing single cloud is getting to be noticeably repulsive by many organizations and new thought of Multi-Clouds use is getting to be noticeably recognizable to adapt to these security issues. DNA is currently for the most part a hypothetical idea however in the event that executed in future would be giving most solid and secure framework. In this paper it has been recommended that The hyper Elliptical curve points are mixed with DNA cryptographic calculations which are received for the enhancement of security methodology of utilizing DNA based cryptography and it guarantees secure information stockpiling on Multi-Clouds.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133453134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A literature survey on RF MEMS packaging","authors":"Rahul Agrawal, Priyanka Shah","doi":"10.1109/ICCMC.2017.8282565","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282565","url":null,"abstract":"This paper presents the survey of different packaging schemes of RF MEMS switches for wireless application. To determine the reliability of RF MEMS switch that tends to fails due to improper packaging, environmental conditions and improper housing and sealing. This paper describes the different types of RF MEMS switch packaging for d.c to millimeter wave application and is often chosen for high degree of integration, high reliability and enormous advantage over Relay, PIN diode and FET. In this paper, we discuss the MEMS switch packaging, various types of substrate used for designing and the literature survey which we had done.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"53 62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133990793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conceptual view of the iris recognition systems in the biometric world using image processing techniques","authors":"N. Jagadeesh, C. M. Patil","doi":"10.1109/ICCMC.2017.8282623","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282623","url":null,"abstract":"A biometric framework offers programmed recognizable proof of a person in light of the special component or trademark which is being controlled by the person. Various biometric strategies exists in the present situation, viz., unique mark, iris, confront, and so forth… The iris division is a standout amongst the most prevailing sort utilized as a part of all Aadhar card applications and has its own real applications in the field of reconnaissance and also in security purposes. The execution of the iris acknowledgment frameworks depends vigorously on the element extraction, histogram, and division with standardization procedures. In this overview paper, a concise survey of the examination work that will be done is introduced.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134017947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel harmonic elimination technique for cascaded H-bridge inverter using sampled reference frame","authors":"S. Veerakumar, S. Sathishkumar, K. Kannan","doi":"10.1109/ICCMC.2017.8282626","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282626","url":null,"abstract":"This paper proposes SWARM Intelligence based algorithm for selective harmonic elimination using SSVPWM in modified H-bridge multilevel inverter. This algorithm uses sampled reference frame to generate reference sine signal. The computation time is less as compared to that of sector identification algorithms. Also SWARM intelligence based algorithm doesn't require any look-up table potentiometer connected to ADC channel of this PIC which decides the V/F ratio and the keypad connected to PORTC which decides the harmonic order that has to be eliminated. The hardware setup for the proposed method for 5-level inverter has been developed successfully for 2.2 Kw Induction motor. The experimental result shows that this method can effectively reduce the selective harmonic in modified cascaded H-Bridge Multilevel inverter.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133866423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"State estimation and total transfer capability calculation in deregulated power system","authors":"S. Nayak, Swasti Bachan Panda, S. Das Mohapatra","doi":"10.1109/ICCMC.2017.8282568","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282568","url":null,"abstract":"In a deregulated power system both the quality and amount of power transfer increases. The main challenges in deregulated environment for the utility centers are to update or maintain the reliability and security of the utility regions. By sharing the information about different states of the system, is a way to overcome these limitations, among different utilities. The utilities get an overall picture of the entire system with the information get from Total Power Transfer Capability (TTC) and State Estimation of the power network. It should be taken care that the combined effects of power transfer due to different estimations and power transfer capabilities may not tend to a system blackout, failure of equipment and overloading problems. State Estimation (SE) used to estimate new error case state variables after a certain random error occurs in the power system due to contingency and Continuous Power Flow method is chosen for the calculation of TTC. In this study we have used this technique for testing IEEE 30 bus test system and a brief comparative study is done among different cases of the system.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115562939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bayesian linear discriminant analysis with hybrid ABC-PSO classifier for classifying epilepsy from EEG signals","authors":"H. Rajaguru, S. Prabhakar","doi":"10.1109/ICCMC.2017.8282613","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282613","url":null,"abstract":"One of the serious neurological disorders affecting millions of people in the world is epilepsy. Epilepsy is a disease of the brain where the neurons behave in an abnormal fashion thereby leading to seizures. To monitor the activities of the brain, Electroencephalography (EEG) signals play a vital role especially for the analysis and diagnosis of epilepsy. The neurophysiologist visually examines the signals of the brain for the identification of epileptic seizures and abnormalities in it. It is quite a difficult procedure because of its prolonging time consumption and erroneous decisions made by humans and so automatic seizure detection and classification systems came into existence. In this paper, the epilepsy classification was done in two stages, firstly with Bayesian Linear Discriminant Analysis (BLDA) and the output obtained from it is further optimized and classified with Hybrid Artificial Bee Colony - Particle Swarm Optimization (ABC-PSO) classifier. Results show that an average classification accuracy of 94% is obtained when classified with BLDA classifier and on further optimization and classification, an average classification accuracy of 97.91% is obtained when classified with ABC-PSO classifier.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115933910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}