2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)最新文献

筛选
英文 中文
Reduction of SISO System Using Different Mixed Reduction Methods 不同混合还原方法对SISO体系的还原
Preeti Verma, P. K. Juneja, M. Chaturvedi
{"title":"Reduction of SISO System Using Different Mixed Reduction Methods","authors":"Preeti Verma, P. K. Juneja, M. Chaturvedi","doi":"10.1109/CICN.2016.135","DOIUrl":"https://doi.org/10.1109/CICN.2016.135","url":null,"abstract":"In the present work, various mixed methods fororder reduction of SISO system are available viz. stabilityequation method, Routh stability method, factor divisionalgorithm, modified pole clustering method and Padeapproximation. The denominator coefficients of reduced ordermodel are obtained by Routh stability method, stabilityequation method and modified pole clustering method. Thenumerator of the reduced order model is achieved by Padeapproximation and factor division algorithm. Three mixedtechniques factor division algorithm-modified pole clustering, Pade approximation method-stability equation method andfactor division algorithm-Routh stability method are analyzed. An example of SISO system is selected to analyze theperformance of mixed techniques.","PeriodicalId":189849,"journal":{"name":"2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132534428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Resource Allocation Algorithm Combined with Optical Power Dynamic Allocation for Indoor Hybrid VLC and Wi-Fi Network 室内VLC与Wi-Fi混合网络中结合光功率动态分配的资源分配算法
Tian Wan, Liu Luo-kun, Zhang Xia, Jian Chun-xiao
{"title":"A Resource Allocation Algorithm Combined with Optical Power Dynamic Allocation for Indoor Hybrid VLC and Wi-Fi Network","authors":"Tian Wan, Liu Luo-kun, Zhang Xia, Jian Chun-xiao","doi":"10.1109/CICN.2016.13","DOIUrl":"https://doi.org/10.1109/CICN.2016.13","url":null,"abstract":"In indoor scenarios, visible light communication (VLC) access point (AP) can provide very high throughput and meet any illumination demands, while wireless fidelity (Wi-Fi) provides basic coverage in a large range. In this paper, the downlink resource allocation (RA) problem for hybrid VLC and Wi-Fi network is considered. A resource allocation algorithm combined with optical power dynamic allocation is proposed. The optimization goal is to maximize the Best Effort (BE) service users' aggregate throughput and users' proportional fairness under the premise of guaranteeing the minimum rate requirement of the Delay Constrained (DC) service users. Simulation results show that the algorithm we proposed is capable of achieving better performance in both aggregate throughput and individual fairness obviously when multi-user are extremely uneven distributed, compared with the algorithm under the condition of optical power average allocation.","PeriodicalId":189849,"journal":{"name":"2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114498788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Model Order Reduction of a Higher Order Model of pH Neutralizer of Sugar Mill 糖厂pH中和器高阶模型的模型阶降
S. Sunori, P. Juneja, M. Chaturvedi, P. Saini
{"title":"Model Order Reduction of a Higher Order Model of pH Neutralizer of Sugar Mill","authors":"S. Sunori, P. Juneja, M. Chaturvedi, P. Saini","doi":"10.1109/CICN.2016.134","DOIUrl":"https://doi.org/10.1109/CICN.2016.134","url":null,"abstract":"Several industrial chemical processes are found tobe FOPDT (first order plus dead time). The presence of deadtime makes the transfer function to be irrational and makesthe simulation and controller design very complex. In thepresent work an FOPDT model of the pH neutralizationprocess which is found in sugar mills is considered as a subjectof study and analysis. Having obtained its Padéapproximation, its order has been reduced using Square RootBalance Truncation Method and then for this reduced ordermodel, Ziegler-Nichols(ZN), Internal model control (IMC)and optimized IMC using Genetic Algorithm(GA-IMC)based controllers are designed and their performance is compared.","PeriodicalId":189849,"journal":{"name":"2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133662901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design and Implementation of Unified Identity Authentication Service Based on AD 基于AD的统一身份认证服务的设计与实现
Hongjie Wang, Cheng Gong
{"title":"Design and Implementation of Unified Identity Authentication Service Based on AD","authors":"Hongjie Wang, Cheng Gong","doi":"10.1109/CICN.2016.84","DOIUrl":"https://doi.org/10.1109/CICN.2016.84","url":null,"abstract":"With the progress of information technology, the expansion of business, modern enterprise internal set up a number of business systems, the important problem with the enterprise is how to in numerous information platform and the unity of the security authentication. Due to the popularity of mobile Internet and the presence of C/S mode application system, the solution of SSO (Single Sign On) cannot solute these architectural applications. This paper proposes a new solution of unified identity authentication, Microsoft AD (Active Directory) as a kind of access standards, build a unified authentication source as the foundation of the unified authentication and unified management authorization service, through in the form of services provided to each application system or platform, can realize cross-platform and cross-language unified identity authentication.","PeriodicalId":189849,"journal":{"name":"2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116581831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and Implementation of Electro-Oculogram Based Brain-Computer-Interaction 基于眼电图的脑机交互设计与实现
Preeti P. Ghasad
{"title":"Design and Implementation of Electro-Oculogram Based Brain-Computer-Interaction","authors":"Preeti P. Ghasad","doi":"10.1109/CICN.2016.131","DOIUrl":"https://doi.org/10.1109/CICN.2016.131","url":null,"abstract":"HCI (Human Computer Interface) has a large scope of expansion to real life implementation. From last few years, many researchers are working on multiple body-machine interfacing techniques. Human brains generally work on electric signals transmitting all over the body and send the information to operate the body parts and eye movement recognition is independent. As we know the eye movement is most common and an essential tool for communication for paralysed patients. EOG electro-oculogram signal is used to improve the communication abilities of those patients who can move their eyes. Electro-oculogram (EOG) signal is widely and successfully used technique to detect activities of human eye. This paper presents low-cost embedded system to track eye movement for disabled persons with basic interaction with electronic devices like light bulb, fans etc. The overall project idea is to study and implement the EOG signal and transform them into the digital form so as to operate the interactive device which is next to the user.","PeriodicalId":189849,"journal":{"name":"2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123536720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IRuSL: Image Recommendation Using Semantic Link IRuSL:使用语义链接的图像推荐
Shakila Shaikh, S. Rathi, P. Janrao
{"title":"IRuSL: Image Recommendation Using Semantic Link","authors":"Shakila Shaikh, S. Rathi, P. Janrao","doi":"10.1109/CICN.2016.66","DOIUrl":"https://doi.org/10.1109/CICN.2016.66","url":null,"abstract":"Popularity of social networking sites and introduction of e-commerce has led to an increase in number of multimedia resources generated every year. The growth in the number of images that are being uploaded has brought a need to develop systems that can store, process and organize them as how and when needed. A survey conducted on working ability of famous e-commerce systems has brought into light the need for semantic integration in recommendation systems. This paper proposes a framework in which images are recommended to users based on their semantic integration. This integration is made possible by using tags and surrounding text of an image to determine their semantic association. In this paper four semantic relatedness methods are used. The methods are Jaccard similarity of sets, Dice, edit distance and Overlap, these techniques are compared to find the best semantic recommendation. The proposed system has wide application in recommendation systems such as image recommendation in social networking, books recommendation, movie recommendation and product recommendation in e-commerce websites.","PeriodicalId":189849,"journal":{"name":"2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125061874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impementation of QR Code Based Secure System for Information Sharing Using Matlab 基于二维码的信息共享安全系统的Matlab实现
Shweta Sharma, Vikas Sejwar
{"title":"Impementation of QR Code Based Secure System for Information Sharing Using Matlab","authors":"Shweta Sharma, Vikas Sejwar","doi":"10.1109/CICN.2016.64","DOIUrl":"https://doi.org/10.1109/CICN.2016.64","url":null,"abstract":"In the era of technology data security and information sharing is always a hot topic to talk on. There are lot of methods that are being used in security for secret information sharing such as cryptography, steganography, watermarking etc. another technology that is being used by people is QR code based information sharing but this technology is not enough to provide privacy in information sharing. Therefore, there is need of a better security algorithm which can be used for secure communication and have better efficiency and accuracy than others. In this paper author proposed a QR code based cryptographic technique which uses 3 layer of security in information sharing.","PeriodicalId":189849,"journal":{"name":"2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123952297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Toward Social Awareness in the Smart Grid 走向智能电网的社会意识
Arvind Singh, A. Pooransingh, C. Ramlal, Sean Rocke
{"title":"Toward Social Awareness in the Smart Grid","authors":"Arvind Singh, A. Pooransingh, C. Ramlal, Sean Rocke","doi":"10.1109/CICN.2016.111","DOIUrl":"https://doi.org/10.1109/CICN.2016.111","url":null,"abstract":"Advances in power electronics, communications and control technologies employed by Electric Utilities, have been gradually shifting the way the grid is being operated for many years. These, together with small scale renewable energy and micro-generation capabilities are now forcing the philosophy of grid operation to be rethought from the ground up. The future is likely to be a network of power prosumers (producer-consumers) who must be managed by a central coordinating body. Often overlooked, however, is the fact that increased data can give us not only additional information about the system but also about customers. This paper posits the idea of building more social sensitivity into the the operation of the grid to enhance demand side management, emergency management and building Rawlsian principles into prosumer interactions with the utility. It also gives a conceptual overview of the infrastructure topologies required to enable this shift, but does not concern itself with auxiliary matters such as cyber security.","PeriodicalId":189849,"journal":{"name":"2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124192153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Comparison of Model-Order Reduction Techniques for Multiphase Transmission Line Systems 多相传输线系统模型降阶技术的比较
C. Ramlal, S. Ibrir, Arvind Singh, Sean Rocke
{"title":"A Comparison of Model-Order Reduction Techniques for Multiphase Transmission Line Systems","authors":"C. Ramlal, S. Ibrir, Arvind Singh, Sean Rocke","doi":"10.1109/CICN.2016.95","DOIUrl":"https://doi.org/10.1109/CICN.2016.95","url":null,"abstract":"Transmission line models for simulations are necessaryfor designing and controlling modern power systems. However, the orders of these models are very large and theirsimulations are recognized to be computationally intensive. Thispaper compares ten model-order reduction methods with eightmeasures for a three phase transmission line system. Two testcases were developed, the first forces all model-order reductionmethods to reduce the original system to a reduced system withthe same order and the second keeps a constant chosen errorbound and compares the performance of the reduced obtainedsystems. The main differences between the different proceduresare identified and illustrated on quantitative levels.","PeriodicalId":189849,"journal":{"name":"2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130738035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Outlier Detection Using Kmeans and Fuzzy Min Max Neural Network in Network Data 基于Kmeans和模糊最小最大神经网络的网络数据离群点检测
Parmeet Kaur
{"title":"Outlier Detection Using Kmeans and Fuzzy Min Max Neural Network in Network Data","authors":"Parmeet Kaur","doi":"10.1109/CICN.2016.142","DOIUrl":"https://doi.org/10.1109/CICN.2016.142","url":null,"abstract":"Outlier detection has been used to detect the outlier and, where appropriate, eliminate outliers from various types of data. It has vital applications in the field of fraud detection, network robustness analysis, Insider Trading Detection, email spam detection, Medical and Public Health Outlier Detection, Industrial Damage Detection, Image processing fraud detection, marketing, network sensors and intrusion detection. In this paper, we propose a kmean clustering and neural network as novel to detect the outlier in network analysis. Especially in a social network, k means clustering and neural network is used to find the community overlapped user in the network as well as it finds more kclique which describe the strong coupling of data. In this paper, we propose that this method is efficient to find out outlier in social network analyses. Moreover, we show the effectiveness of this new method using the experiments data.","PeriodicalId":189849,"journal":{"name":"2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131149538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信