2014 IEEE International Conference on Computational Intelligence and Computing Research最新文献

筛选
英文 中文
Lifetime maximization of wireless sensor networks using energy-efficient cluster formation strategy 基于高能效集群形成策略的无线传感器网络寿命最大化
M. Praveen, T. Senthil
{"title":"Lifetime maximization of wireless sensor networks using energy-efficient cluster formation strategy","authors":"M. Praveen, T. Senthil","doi":"10.1109/ICCIC.2014.7238327","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238327","url":null,"abstract":"Wireless Sensor Networks is a Wireless network consists of a Base Station (BS) and more number of wireless sensors inorder to monitor temperature, pressure, motion etc., in different environment conditions. Number of sensor nodes located geographically nearer to form a group called cluster to co-operately processing the data. LEACH (Low Energy Adaptive Clustering Hierarchy) is a routing protocol for clusters which is used to lower the energy consumption and also to improve the lifetime of the wireless sensor networks. Minimizing energy dissipation and maximizing network lifetime are important issues in the design of applications and protocols for sensor networks. The proposed system is to maximize the lifetime of the wireless sensor networks by selecting the farthest cluster head instead of the closest cluster head and forming the cluster by considering the following metrices such as Residual-Energy, Intra-Cluster Distance and Node Density. We use ABC (Artificial Bees Colony) Optimization Technique to enhance the network lifetime and energy consumption of the network.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132173115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implementation of efficient automatic traffic surveillance using digital image processing 利用数字图像处理实现高效的自动交通监控
S. Saravanan
{"title":"Implementation of efficient automatic traffic surveillance using digital image processing","authors":"S. Saravanan","doi":"10.1109/ICCIC.2014.7238419","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238419","url":null,"abstract":"This paper demonstrates the automated traffic surveillance without any human intervention. The aim of this paper is to detect the traffic density and to work according to the traffic density. The traffic signal is structured with the camera which takes the snap of the road and the density is identified. Hence by this method the traffic is analyzed and the lights are transferred according to the traffic density. The number of objects present in the roads will be identified and those numbers are transmitted to the micro controller. The micro controller controls the traffic signal and the varied time is displayed in the 7 segment display. By this a dynamic approach is being followed to minimize the traffic delay and effectively commute even in heavy traffic scenarios. The primary aim is to eliminate waiting time, during peak hours. Some added advantage that are to be implemented are dealing at the time of unusual situation such as emergency vehicles like ambulances, patrol vehicles, fire engines etc., Time is varied in propotional to the traffic density. Using this model will eliminate unwanted waiting time in peak traffic hours. Single camera is used in determining density of the traffic which will reduce the cost of implementing.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134560550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Study and theoretical investigations on PCOS 多囊卵巢综合征的研究与理论研究
S. Sheela, M. Sumathi
{"title":"Study and theoretical investigations on PCOS","authors":"S. Sheela, M. Sumathi","doi":"10.1109/ICCIC.2014.7238394","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238394","url":null,"abstract":"Poly Cystic Ovary Syndrome (PCOS) is an endocrine disorder affecting many women in their reproductive age groups related with these problems of infertility, diabetes mellitus and cardiovascular disease. Diagnosis of the condition is mostly done by imaging parameters. Ultrasound imaging has become a very important technology in diagnosis of PCOS. Due to overlapping of the follicles, inherent noise of the equipment and lack of operator knowledge as it is largely an experience dependent procedure, the characteristic appearance of the image becomes more challenging and making the diagnosis process time consuming. Due to the above factors, accuracy in detection of cysts is affected. Therefore, the Early as well as Accurate Detection of Abnormalities in Women's Reproductive System is required before the treatment process, to avoid Infertility. This paper overviews various methodologies proposed so far in terms of removal of speckle noise, extraction of region of interest using segmentation, classification of images so as to achieve maximum accuracy in detection of cyst in short period of time.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133957920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evolutionary genetic algorithm for encryption 加密的进化遗传算法
W. Alsharafat
{"title":"Evolutionary genetic algorithm for encryption","authors":"W. Alsharafat","doi":"10.1109/ICCIC.2014.7238559","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238559","url":null,"abstract":"Encryption is a fundamental mechanism for protecting information since the significant of security is increasing nowadays. Different evolutionary methods have been adapted to satisfy high level of security. Genetic algorithm is an exploration and evolutionary algorithm which based on natural selection which optimizing problem solution and to be away from producing one ciphertext for the same plaintext. Therefore, the attempts of attack, as ciphertext attack, will be reduced if not eliminated. In this paper, GA as evolutionary algorithm will be employed in a symmetric encryption and decryption where the user's message which represents plaintext and user secret data, key, will be transferred into ciphertext by applying crossover and mutation beside substitution function.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133354966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of damping controller for multimachine power system by using simplified swarm optimization 基于简化群算法的多机电力系统阻尼控制器设计
Baibhav Bishal, B. Soni, Akash Saxena, Vikas Gupta
{"title":"Design of damping controller for multimachine power system by using simplified swarm optimization","authors":"Baibhav Bishal, B. Soni, Akash Saxena, Vikas Gupta","doi":"10.1109/ICCIC.2014.7238398","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238398","url":null,"abstract":"This paper presents design of Power System Stabilizer (PSS) by using Simplified Swarm Optimization (SSO). PSS is a useful device to enhance the system damping and small signal stability of the power system. PSS design problem is an optimization problem. From the optimization process proper set of gain and time constants are calculated. Proper tuning of the parameters provides adequate amount of damping to the system. This paper presents a swarm based algorithm to address the above said optimization process. Objective function based on speed deviations is employed to calculate the parameters of PSSs of New England System (10 Generator & 39 Bus). To present a meaningful analysis the comparison of SSO is done with conventional optimization algorithms namely Particle Swarm optimization (PSO) and Genetic Algorithm (GA). Robustness of proposed method is tested over different type of perturbations, fault locations and loading conditions.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132745982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
State estimation of a nonlinear system using particle filter 基于粒子滤波的非线性系统状态估计
K. Anandhakumar, I. Ali, K. Selvakumar, K. Raja
{"title":"State estimation of a nonlinear system using particle filter","authors":"K. Anandhakumar, I. Ali, K. Selvakumar, K. Raja","doi":"10.1109/ICCIC.2014.7238313","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238313","url":null,"abstract":"In this paper, Particle Filter algorithm has been employed for estimating the states namely concentration and temperature of a Continuous Stirred Tank Reactor (CSTR) and simulation results are presented. The propagation of particles through the nonlinear system model for the state estimation has been discussed. The states of the system are estimated by using the Particle Filter algorithm under the steady state as well as transient system conditions. A step change in the coolant flow rate has been introduced in order to provide a dynamic operating point.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122791552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative analysis of digital image stabilization by using empirical mode decomposition methods 经验模态分解方法在数字稳像中的应用对比分析
Neha Kottawar, D. J. Tuptewar
{"title":"Comparative analysis of digital image stabilization by using empirical mode decomposition methods","authors":"Neha Kottawar, D. J. Tuptewar","doi":"10.1109/ICCIC.2014.7238284","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238284","url":null,"abstract":"In this paper comparative analysis of digital image stabilization (DIS) is proposed. For comparison purpose Basic Empirical Mode Decomposition (EMD), Improved EMD, Ensemble Empirical Mode Decomposition (EEMD) and Complete Ensemble Empirical Mode Decomposition (CEEMD) methods are considered. Method used for digital image stabilization is of fully data driven approach. With the comparative analysis best version of the EMD for DIS on the basis of low RMSE error is decided. The concept used to determine jitter is high frequency and low amplitude property. Combination of each EMD method and Hilbert Transform is used for the analysis. Various methods of EMD give the different results the better method for digital image stabilization is decided and parameters of EEMD and CEEMD method are globalised.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114091160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Matrix converter based solar photo voltaic system for reactive power compensation using sinusoidal pulse width modulation 基于矩阵变换器的太阳能光伏系统无功补偿采用正弦脉宽调制
K. Raja, K. Vijayakumar, S. Kannan
{"title":"Matrix converter based solar photo voltaic system for reactive power compensation using sinusoidal pulse width modulation","authors":"K. Raja, K. Vijayakumar, S. Kannan","doi":"10.1109/ICCIC.2014.7238524","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238524","url":null,"abstract":"Reactive power is a subject of great concern for the operation of Alternating Current (AC) power systems. It has always been a challenge to obtain the balance between a minimum amount of reactive power flow to maximize capacity for active power flow and a sufficient amount of reactive power flow to maintain a proper system voltage profile. This work mainly deals with the compensation of reactive power by using Solar Photovoltaic Power System. Single-phase matrix converter is used for developing AC voltage. Single-phase matrix converter can be used as a Rectifier and as an Inverter. The same system could be used for real power exchange utilizing free energy (Solar) thus minimizing the utility power supply. Bidirectional energy flow is possible with matrix converter for battery charging. Use of matrix converter improves the quality of output voltage with reduced Total Harmonic Distortion. Sinusoidal Pulse Width Modulation (SPWM) is used for generating pulses to the matrix converter. Digital control of proposed real and reactive power compensation improves the overall efficiency of the system and reliability.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115890353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling causally dependent events using fuzzy cognitive maps 使用模糊认知图建模因果依赖事件
R. Sarala, G. Zayaraz, V. Vijayalakshmi, R. Sivaranjani
{"title":"Modeling causally dependent events using fuzzy cognitive maps","authors":"R. Sarala, G. Zayaraz, V. Vijayalakshmi, R. Sivaranjani","doi":"10.1109/ICCIC.2014.7238339","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238339","url":null,"abstract":"The increase in the number of security breaches has made information security risk management an essential security activity for all type of organizations. Risk Management involves assessment involves identification of assets, threats and vulnerabilities. Attacks by outsiders continue to cause the most security breaches to all organizations. Existing approaches like attack graph based risk assessment have scalability issues and focus on only single step attacks. It is very difficult to predict multistep attacks that exploit a chain of vulnerabilities. The multistep attacks are based on the causality of relation where every cause has an effect. Causality refers to a cause i.e. one event and consequences i.e. another event that has occurred because of the cause. The proposed system aims to make use of fuzzy cognitive maps to model the causally dependent events. Fuzzy cognitive map is a concrete representation of knowledge that can handle incomplete or conflicting information. This is very important in risk assessment because important information may be unreliable as they may be a result of unreliable measurement techniques. The proposed system will aid in proactive information security risk assessment.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"342 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115983271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy aware load balancing for computational cloud 计算云的能量感知负载平衡
A. Florence, V. Shanthi
{"title":"Energy aware load balancing for computational cloud","authors":"A. Florence, V. Shanthi","doi":"10.1109/ICCIC.2014.7238489","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238489","url":null,"abstract":"Cloud computing is novel technology, which enables any resource as service on demand. Cloud environment motivates highly dynamic resource provisioning. Hence clients can scale up or scale down their requirements as per their demand. Load balancing is very important and complex problem in cloud environment, because of its heterogeneity of the computing nodes. In order to realize the full potential of cloud computing it is vital to minimize energy consumption along with effective load balancing. The aim of Energy Aware Load Balancing (EALB) model is to minimize energy consumption with load balancing. EALB model classifies the incoming job request either CPU bound or I/O bound according to their purpose and behaviour. This classification details are maintained in a table named Pattern History Table (PHT) and organized as hash table. One of the virtual machine (VM) is selected dynamically based on best fit allocation policy and the job is assigned to the victimized VM. From the pattern history table job's nature is identified. Using Dynamic Voltage Frequency Scaling (DVFS) scheme the selected VM's processor clock frequency is increased if it is found CPU bound else decreased (I/O bound). Thus, EALB algorithm saves considerable amount of energy and proves to be more efficient.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"290 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116390529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信