{"title":"Fuzzy logic controller based dynamic performance analysis of AC drive with SVPWM","authors":"V. R. Rajan, K. Selvi, J. Beryl","doi":"10.1109/IPACT.2017.8244945","DOIUrl":"https://doi.org/10.1109/IPACT.2017.8244945","url":null,"abstract":"Induction motors are playing an imperative role in industries because of its downy controllability and jagged construction. It requires both ample range of speed and hasty torque response irrespective of load variations for its application. The fuzzy logic controller has highly developed qualities amid the various speed control techniques. So the fuzzy logic controller has been implemented using SVPWM technique to control the speed, current and torque. The V/f method is used to control the speed. The space vector pulse width modulation technique which gives superior utilization of DC and reduction in harmonics is used in this scrutiny. The dynamic characteristics has been analyzed with fuzzy controller for induction motor. The Total Harmonics Distortion has been observed and plotted. The entire intend has been implemented and proved in MATLAB/SIMULINK.","PeriodicalId":215356,"journal":{"name":"2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114312036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ankur Mani Tripathi, Abhi Upadhyay, A. Rajput, Ajay Pal Singh, Brajesh Kumar
{"title":"Automatic detection of fracture in femur bones using image processing","authors":"Ankur Mani Tripathi, Abhi Upadhyay, A. Rajput, Ajay Pal Singh, Brajesh Kumar","doi":"10.1109/ICIIECS.2017.8275843","DOIUrl":"https://doi.org/10.1109/ICIIECS.2017.8275843","url":null,"abstract":"The femur is the enlarged and the vigorous bone in the human body, ranging from the hip to the knee. This bone is responsible for the creation of Red Blood Cell in the body. Since this bone is a major part of the body, a method is proposed through this paper to visualize and classify deformities for locating fractures in the femur through image processing techniques. The input image is preprocessed to highlight the domain of interest. In the process, the foreground which is the major domain of interest is figured out by suppressing the background details. The mathematical morphological techniques are used for these operations. With the help of basic morphological operations, the foreground is highlighted and edge detection is used to highlight the objects in the foreground. The processed image is classified using the support vector machine (SVM) to distinguish fractured and unfractured sides of the bone.","PeriodicalId":215356,"journal":{"name":"2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)","volume":"408 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115236593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A secured methodology for anti-phishing","authors":"Tanvi Churi, Pranay Sawardekar, Abhijeet Pardeshi, Pallavi Vartak","doi":"10.1109/ICIIECS.2017.8276081","DOIUrl":"https://doi.org/10.1109/ICIIECS.2017.8276081","url":null,"abstract":"The technique used to perform on-line robbery/stealing of person credentials is called a phishing in cyber international. It's far affecting all of the foremost sectors of enterprise each day with lots of misuse of consumer credentials. To stop phishing many detection and prevention strategies has been made with their very own blessings and drawbacks respectively, but phishing has been eradicated absolutely yet. Seeing the truth that phished pages commonly asks for getting into and submitting the credentials but is not able to retrieved any user acknowledged facts, right here we suggest a preventive anti-phishing technique keep away from to be victims of phishing attacks.","PeriodicalId":215356,"journal":{"name":"2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122713434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey of machine learning algorithms for big data analytics","authors":"S. Athmaja, M. Hanumanthappa, V. Kavitha","doi":"10.1109/ICIIECS.2017.8276028","DOIUrl":"https://doi.org/10.1109/ICIIECS.2017.8276028","url":null,"abstract":"Big data analytics is a booming research area in computer science and many other industries all over the world. It has gained great success in vast and varied application sectors. This includes social media, economy, finance, healthcare, agriculture, etc. Several intelligent machine learning techniques were designed and used to provide big data predictive analytics solutions. A literature survey of different machine learning techniques is provided in this paper. Also a study on commonly used machine learning algorithms for big data analytics is done and presented in this paper.","PeriodicalId":215356,"journal":{"name":"2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122001042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Numerical study on effect of sinusoidal roughness pattern on fluid flow through microchannels","authors":"R. Siddharth, P. Jayadevan, Pradeep. M. Kamath","doi":"10.1109/ICIIECS.2017.8275864","DOIUrl":"https://doi.org/10.1109/ICIIECS.2017.8275864","url":null,"abstract":"The present study aims at the analysis of surface roughness on fluid flow through mirochannels. Water is chosen as working fluid and the wall roughness was modeled using a cosine function. Two different roughness patterns were studied aligned and offset. A 2D analysis of the model is done utilizing the commercial software ANSYS Fluent. The variation of pressure drop and friction factor is studied at different roughness heights and Reynolds number. To validate the model the results are compared with data available in literature. Obtained value of friction factor is in good agreement with theoretical as well as numerical results. It has been observed that the offset pattern has the higher pressure drop and higher pumping power compared to the aligned pattern. Friction factor is also found to be higher in offset pattern.","PeriodicalId":215356,"journal":{"name":"2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133839626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Employee performance assessment in virtual organization using domain-driven data mining and sentiment analysis","authors":"Tejshree D. Chungade, S. Kharat","doi":"10.1109/ICIIECS.2017.8276093","DOIUrl":"https://doi.org/10.1109/ICIIECS.2017.8276093","url":null,"abstract":"The change of society from an industrial based society to a service based and even to an information based society has generated a particular group of workers; people, who work in their way through information, solve problems in their own way form their own place. This category of workers has changed the overall productivity and profitability graph of the organization which stands for a task, project or permanent organization, not necessarily centralized and dependent called Virtual Organization. Virtual Organizations are geographically dissipated; therefore assessing the performance of the workers working in it is an important issue. Assessment is a dynamic process, thus the aim of the studies is to evaluate the performance of employees in virtual organization and predict the quality, productivity output and potentiality of the employees by various performance measures which will enable the superior to take proper decisions and understand patterns for employee's motivation, satisfaction, growth and decline of both the employees and the organization itself. A hermeneutic analysis process is carried out in this research which includes employees' practices, culture, work of art and text in the organization. The study involved to propose a employee performance assessment system with phenomenological Domain Driven Data Mining (D3M) approach additionally using 360 Degree data mining for the extraction of unidentified patterns in employee performance when assessed across various parameters. The system is also bounded by the Sentiment Analyzer to check perception of the superiors towards their employees' task and work structure along with the integration of Fuzzy Group Decision Support System which works as multi-factorial evaluation unit.","PeriodicalId":215356,"journal":{"name":"2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131960983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A report on CSRF security challenges & prevention techniques","authors":"P. Yadav, C. Parekh","doi":"10.1109/ICIIECS.2017.8275852","DOIUrl":"https://doi.org/10.1109/ICIIECS.2017.8275852","url":null,"abstract":"Now a days, The world wide web is becoming the town square for the global village of today and we, the netizens of globe are becoming essential part of cyberspace. The use of Internet helps in making the journey of our life easy and comfortable but as we all know that every “pros” has some “cons” attached with it, therefore some precautions need to be taken to make the internet life more secure and fruitful in every aspect. In recent scenario, vulnerability is increasing by leaps and bound and web services are often deployed with critical application security faults that prone them to malicious attack and out of all these vulnerability, the most common web application vulnerability is Cross-Site Request Forgery (CSRF). In this paper, we explore the recent challenges faced in CSRF attack, different ways to launch CSR attack and its prevention techniques.","PeriodicalId":215356,"journal":{"name":"2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130872274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Grace, S. Manju, M. S. G. Devasena, V. K. Kumar
{"title":"Student competency analysis: An automated robust tool using fuzzy logic","authors":"R. Grace, S. Manju, M. S. G. Devasena, V. K. Kumar","doi":"10.1109/ICIIECS.2017.8275840","DOIUrl":"https://doi.org/10.1109/ICIIECS.2017.8275840","url":null,"abstract":"Education is the most powerful weapon by which the world could be changed said Nelson Mandela. The history of spreading knowledge has its root from teaching Vedas in temples until eLearning and eTeaching. Both the traditional teaching methodology and online teaching provide students with knowledge. National Center for Education Statistics says that an online class is stated as “a formal education process in which the students and instructor are separated”. Alike traditional courses, online classes are educated by respective course instructors which includes several classmates. However, the communication medium between the both would be email, telephone or live chat. By considering the advantage of online courses we propose an online performance evaluation tool in which the student can be evaluated once when the course is completed and tests are done. From the test results the performance of the students is evaluated using fuzzy based technique and reports of the individuals are generated.","PeriodicalId":215356,"journal":{"name":"2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120961705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A low power delta sigma CT modulator for biomedical application","authors":"Aneeciya Mathew, B. Prameela","doi":"10.1109/ICIIECS.2017.8276092","DOIUrl":"https://doi.org/10.1109/ICIIECS.2017.8276092","url":null,"abstract":"Delta Sigma (AE) ADCs are commonly used in biomedical application due to over-sampling technique and noise shaping. A low power 1st order AE was designed in standard 180nm CMOS technology using cadence virtuoso tool. The modulator was designed with a supply voltage of 1.8V, input frequency of 50 KHz. The AE modulator provides the advantage of low power; eliminate the use anti-aliasing filter for reconstruction of input signal and due to over-sampling highly immune to noise outside the frequency band of operation. A two stage op-amp with a gain of 68dB is the basic building block of modulator. The modulator designed with two stage op-amp, achieve an OSR of 256; SNR of 31.86dB; sampling frequency of 2MHz; power of 785μW.","PeriodicalId":215356,"journal":{"name":"2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115873613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Shah, Akshaykumar Salunke, S. Dongare, Kisandas Antala
{"title":"Recommender systems: An overview of different approaches to recommendations","authors":"K. Shah, Akshaykumar Salunke, S. Dongare, Kisandas Antala","doi":"10.1109/ICIIECS.2017.8276172","DOIUrl":"https://doi.org/10.1109/ICIIECS.2017.8276172","url":null,"abstract":"This paper presents an overview of the field of recommender systems and describes the present generation of recommendation methods. Recommender systems or recommendation systems (RSs) are a subset of information filtering system and are software tools and techniques providing suggestions to the user according to their need. Many popular Ecommerce sites widely use RSs to recommend news, music, research articles, books, and product items. Recommendation systems use personal, implicit and local information from the Internet. This paper attempts to describe various limitations of recommendation methods and their advantages.","PeriodicalId":215356,"journal":{"name":"2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124905327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}