{"title":"Lifetime maximization of wireless sensor networks using energy-efficient cluster formation strategy","authors":"M. Praveen, T. Senthil","doi":"10.1109/ICCIC.2014.7238327","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238327","url":null,"abstract":"Wireless Sensor Networks is a Wireless network consists of a Base Station (BS) and more number of wireless sensors inorder to monitor temperature, pressure, motion etc., in different environment conditions. Number of sensor nodes located geographically nearer to form a group called cluster to co-operately processing the data. LEACH (Low Energy Adaptive Clustering Hierarchy) is a routing protocol for clusters which is used to lower the energy consumption and also to improve the lifetime of the wireless sensor networks. Minimizing energy dissipation and maximizing network lifetime are important issues in the design of applications and protocols for sensor networks. The proposed system is to maximize the lifetime of the wireless sensor networks by selecting the farthest cluster head instead of the closest cluster head and forming the cluster by considering the following metrices such as Residual-Energy, Intra-Cluster Distance and Node Density. We use ABC (Artificial Bees Colony) Optimization Technique to enhance the network lifetime and energy consumption of the network.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132173115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of efficient automatic traffic surveillance using digital image processing","authors":"S. Saravanan","doi":"10.1109/ICCIC.2014.7238419","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238419","url":null,"abstract":"This paper demonstrates the automated traffic surveillance without any human intervention. The aim of this paper is to detect the traffic density and to work according to the traffic density. The traffic signal is structured with the camera which takes the snap of the road and the density is identified. Hence by this method the traffic is analyzed and the lights are transferred according to the traffic density. The number of objects present in the roads will be identified and those numbers are transmitted to the micro controller. The micro controller controls the traffic signal and the varied time is displayed in the 7 segment display. By this a dynamic approach is being followed to minimize the traffic delay and effectively commute even in heavy traffic scenarios. The primary aim is to eliminate waiting time, during peak hours. Some added advantage that are to be implemented are dealing at the time of unusual situation such as emergency vehicles like ambulances, patrol vehicles, fire engines etc., Time is varied in propotional to the traffic density. Using this model will eliminate unwanted waiting time in peak traffic hours. Single camera is used in determining density of the traffic which will reduce the cost of implementing.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134560550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study and theoretical investigations on PCOS","authors":"S. Sheela, M. Sumathi","doi":"10.1109/ICCIC.2014.7238394","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238394","url":null,"abstract":"Poly Cystic Ovary Syndrome (PCOS) is an endocrine disorder affecting many women in their reproductive age groups related with these problems of infertility, diabetes mellitus and cardiovascular disease. Diagnosis of the condition is mostly done by imaging parameters. Ultrasound imaging has become a very important technology in diagnosis of PCOS. Due to overlapping of the follicles, inherent noise of the equipment and lack of operator knowledge as it is largely an experience dependent procedure, the characteristic appearance of the image becomes more challenging and making the diagnosis process time consuming. Due to the above factors, accuracy in detection of cysts is affected. Therefore, the Early as well as Accurate Detection of Abnormalities in Women's Reproductive System is required before the treatment process, to avoid Infertility. This paper overviews various methodologies proposed so far in terms of removal of speckle noise, extraction of region of interest using segmentation, classification of images so as to achieve maximum accuracy in detection of cyst in short period of time.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133957920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolutionary genetic algorithm for encryption","authors":"W. Alsharafat","doi":"10.1109/ICCIC.2014.7238559","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238559","url":null,"abstract":"Encryption is a fundamental mechanism for protecting information since the significant of security is increasing nowadays. Different evolutionary methods have been adapted to satisfy high level of security. Genetic algorithm is an exploration and evolutionary algorithm which based on natural selection which optimizing problem solution and to be away from producing one ciphertext for the same plaintext. Therefore, the attempts of attack, as ciphertext attack, will be reduced if not eliminated. In this paper, GA as evolutionary algorithm will be employed in a symmetric encryption and decryption where the user's message which represents plaintext and user secret data, key, will be transferred into ciphertext by applying crossover and mutation beside substitution function.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133354966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Baibhav Bishal, B. Soni, Akash Saxena, Vikas Gupta
{"title":"Design of damping controller for multimachine power system by using simplified swarm optimization","authors":"Baibhav Bishal, B. Soni, Akash Saxena, Vikas Gupta","doi":"10.1109/ICCIC.2014.7238398","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238398","url":null,"abstract":"This paper presents design of Power System Stabilizer (PSS) by using Simplified Swarm Optimization (SSO). PSS is a useful device to enhance the system damping and small signal stability of the power system. PSS design problem is an optimization problem. From the optimization process proper set of gain and time constants are calculated. Proper tuning of the parameters provides adequate amount of damping to the system. This paper presents a swarm based algorithm to address the above said optimization process. Objective function based on speed deviations is employed to calculate the parameters of PSSs of New England System (10 Generator & 39 Bus). To present a meaningful analysis the comparison of SSO is done with conventional optimization algorithms namely Particle Swarm optimization (PSO) and Genetic Algorithm (GA). Robustness of proposed method is tested over different type of perturbations, fault locations and loading conditions.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132745982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"State estimation of a nonlinear system using particle filter","authors":"K. Anandhakumar, I. Ali, K. Selvakumar, K. Raja","doi":"10.1109/ICCIC.2014.7238313","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238313","url":null,"abstract":"In this paper, Particle Filter algorithm has been employed for estimating the states namely concentration and temperature of a Continuous Stirred Tank Reactor (CSTR) and simulation results are presented. The propagation of particles through the nonlinear system model for the state estimation has been discussed. The states of the system are estimated by using the Particle Filter algorithm under the steady state as well as transient system conditions. A step change in the coolant flow rate has been introduced in order to provide a dynamic operating point.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122791552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative analysis of digital image stabilization by using empirical mode decomposition methods","authors":"Neha Kottawar, D. J. Tuptewar","doi":"10.1109/ICCIC.2014.7238284","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238284","url":null,"abstract":"In this paper comparative analysis of digital image stabilization (DIS) is proposed. For comparison purpose Basic Empirical Mode Decomposition (EMD), Improved EMD, Ensemble Empirical Mode Decomposition (EEMD) and Complete Ensemble Empirical Mode Decomposition (CEEMD) methods are considered. Method used for digital image stabilization is of fully data driven approach. With the comparative analysis best version of the EMD for DIS on the basis of low RMSE error is decided. The concept used to determine jitter is high frequency and low amplitude property. Combination of each EMD method and Hilbert Transform is used for the analysis. Various methods of EMD give the different results the better method for digital image stabilization is decided and parameters of EEMD and CEEMD method are globalised.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114091160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Matrix converter based solar photo voltaic system for reactive power compensation using sinusoidal pulse width modulation","authors":"K. Raja, K. Vijayakumar, S. Kannan","doi":"10.1109/ICCIC.2014.7238524","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238524","url":null,"abstract":"Reactive power is a subject of great concern for the operation of Alternating Current (AC) power systems. It has always been a challenge to obtain the balance between a minimum amount of reactive power flow to maximize capacity for active power flow and a sufficient amount of reactive power flow to maintain a proper system voltage profile. This work mainly deals with the compensation of reactive power by using Solar Photovoltaic Power System. Single-phase matrix converter is used for developing AC voltage. Single-phase matrix converter can be used as a Rectifier and as an Inverter. The same system could be used for real power exchange utilizing free energy (Solar) thus minimizing the utility power supply. Bidirectional energy flow is possible with matrix converter for battery charging. Use of matrix converter improves the quality of output voltage with reduced Total Harmonic Distortion. Sinusoidal Pulse Width Modulation (SPWM) is used for generating pulses to the matrix converter. Digital control of proposed real and reactive power compensation improves the overall efficiency of the system and reliability.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115890353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Sarala, G. Zayaraz, V. Vijayalakshmi, R. Sivaranjani
{"title":"Modeling causally dependent events using fuzzy cognitive maps","authors":"R. Sarala, G. Zayaraz, V. Vijayalakshmi, R. Sivaranjani","doi":"10.1109/ICCIC.2014.7238339","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238339","url":null,"abstract":"The increase in the number of security breaches has made information security risk management an essential security activity for all type of organizations. Risk Management involves assessment involves identification of assets, threats and vulnerabilities. Attacks by outsiders continue to cause the most security breaches to all organizations. Existing approaches like attack graph based risk assessment have scalability issues and focus on only single step attacks. It is very difficult to predict multistep attacks that exploit a chain of vulnerabilities. The multistep attacks are based on the causality of relation where every cause has an effect. Causality refers to a cause i.e. one event and consequences i.e. another event that has occurred because of the cause. The proposed system aims to make use of fuzzy cognitive maps to model the causally dependent events. Fuzzy cognitive map is a concrete representation of knowledge that can handle incomplete or conflicting information. This is very important in risk assessment because important information may be unreliable as they may be a result of unreliable measurement techniques. The proposed system will aid in proactive information security risk assessment.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"342 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115983271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy aware load balancing for computational cloud","authors":"A. Florence, V. Shanthi","doi":"10.1109/ICCIC.2014.7238489","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238489","url":null,"abstract":"Cloud computing is novel technology, which enables any resource as service on demand. Cloud environment motivates highly dynamic resource provisioning. Hence clients can scale up or scale down their requirements as per their demand. Load balancing is very important and complex problem in cloud environment, because of its heterogeneity of the computing nodes. In order to realize the full potential of cloud computing it is vital to minimize energy consumption along with effective load balancing. The aim of Energy Aware Load Balancing (EALB) model is to minimize energy consumption with load balancing. EALB model classifies the incoming job request either CPU bound or I/O bound according to their purpose and behaviour. This classification details are maintained in a table named Pattern History Table (PHT) and organized as hash table. One of the virtual machine (VM) is selected dynamically based on best fit allocation policy and the job is assigned to the victimized VM. From the pattern history table job's nature is identified. Using Dynamic Voltage Frequency Scaling (DVFS) scheme the selected VM's processor clock frequency is increased if it is found CPU bound else decreased (I/O bound). Thus, EALB algorithm saves considerable amount of energy and proves to be more efficient.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"290 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116390529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}