2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)最新文献

筛选
英文 中文
Moth-flame optimization based algorithm for FACTS devices allocation in a power system 基于飞蛾火焰优化的电力系统FACTS设备配置算法
Shubhu Saurav, Vikas Gupta, Sudhanshu K. Mishra
{"title":"Moth-flame optimization based algorithm for FACTS devices allocation in a power system","authors":"Shubhu Saurav, Vikas Gupta, Sudhanshu K. Mishra","doi":"10.1109/ICIIECS.2017.8276010","DOIUrl":"https://doi.org/10.1109/ICIIECS.2017.8276010","url":null,"abstract":"Optimal power flow (OPF) is an objective to ensure economically viable and secure working of power system. In this paper, Moth-flame Optimization (MFO) based algorithm is intended to attain OPF, by including Flexible Alternating Current Transmission System (FACTS) devices with the existing infrastructure of power system, for loss reduction, maintaining the voltage level of the system within the desired level and to ensure cost-effective power system operation. The control variable for the problem consists of generator's reactive output, settings of tap changing transformers, and parameters of FACTS devices. The simulations are performed to obtain the optimal parameters of three FACTS devices namely, Thyristor Controlled Phase Angle Regulator (TCPAR), Thyristor Controlled Series Compensator (TCSC) and Static Var Compensator (SVC). All the FACTS devices are placed at pre-defined positions in standard IEEE 57-bus system. The outcomes presented in the paper clearly demonstrate the reliability and robustness of the given method over current state of the art algorithms surfaced recently in the literature in this field.","PeriodicalId":215356,"journal":{"name":"2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124919033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Embedded based automatic heart attack detector and intimator 嵌入式自动心脏病发作检测器和内膜
D. Selvathi, V. Sankar, H. Venkatasubramani
{"title":"Embedded based automatic heart attack detector and intimator","authors":"D. Selvathi, V. Sankar, H. Venkatasubramani","doi":"10.1109/ICIIECS.2017.8275839","DOIUrl":"https://doi.org/10.1109/ICIIECS.2017.8275839","url":null,"abstract":"Now a day's Heart attack is a common one which affects almost 60% of total population due to their food conditions and various environmental factors. Still now there is no separate system for the intimation of heart attack. After the occurrence of heart attack only, the patient can be monitored. Only pre possible solution for the detection of heart attack is by analyzing the number of beats per minute (BPM). So this work detects the heart attack based on the number of pulses. If the pulse rate other than the range (60–90) occurs it is considered as the indication of heart attack. Addition to this detection of heart attack, this work intimates the occurrence of heart attack to the helpline in wireless GSM module. In this work, a system to detect heart attack is designed and developed. A pulse sensor is used for sensing the heart beat signals. The microcontroller checks these signals and counts the pulses. If the pulses are greater or less than certain levels, the controller activates GSM module and sends an alert message to mobile numbers already coded in a microcontroller. The developed system is tested with the measurement of different male and female persons. The system performed accurate detection and intimation of messages to the different care takers of the patients. Many lives may be saved in the short duration by using this developed system.","PeriodicalId":215356,"journal":{"name":"2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131639945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of web site using web log expert tool based on web data mining 基于web数据挖掘的web日志专家工具对网站进行分析
S. Singh, Meenu
{"title":"Analysis of web site using web log expert tool based on web data mining","authors":"S. Singh, Meenu","doi":"10.1109/ICIIECS.2017.8275961","DOIUrl":"https://doi.org/10.1109/ICIIECS.2017.8275961","url":null,"abstract":"Web Usage Mining (WUM) is the part of Web Mining. There are data mining mechanism to fetch and discover knowledge from the web data. Web usage mining uses data mining process for the research of the usage pattern from data fetched from the web log files. Web is the collection of academic educational institute wed server data was analyze to help the institute for further improving the terms and policies of the service they provide. Web usage is also useful for improving or identifying the visitor of website by aditing the log files of that site. The focus is on the data collection in web servers of academic educational institution and implement. The using Web Log Expert lite 9.3 tools and analyze.","PeriodicalId":215356,"journal":{"name":"2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122879387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Induction motor fault detection, protection and speed control using arduino 利用arduino进行感应电机故障检测、保护和调速
Ravi Waswani, Aakanksha Pawar, Mangesh B. Deore, R. Patel
{"title":"Induction motor fault detection, protection and speed control using arduino","authors":"Ravi Waswani, Aakanksha Pawar, Mangesh B. Deore, R. Patel","doi":"10.1109/ICIIECS.2017.8276071","DOIUrl":"https://doi.org/10.1109/ICIIECS.2017.8276071","url":null,"abstract":"Today the most extensively used motor in the industry is the induction motor. The faults in the induction motor may lead to breakdown of the induction motor and an increase in expense to the industry. So in this paper we have discussed a system which is cheap as compared to the other systems and also cost effective. This system monitors parameters such as speed, temperature, current and voltage using an Arduino microcontroller. Using these parameters we can easily detect faults such as overvoltage, over-current, overload, excessive heating, crawling and under-voltage. The induction motor can be isolated from the supply in case of any of the faults with relays. The system also involves the use of a speed control system which can adjust the speed to desired value. This will reduce the need for additional motors because the same motor may be used to drive different devices. This system may lead to a huge amount of cost saving.","PeriodicalId":215356,"journal":{"name":"2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125323857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Sentiment analysis approaches for movie reviews forecasting: A survey 情感分析方法在影评预测中的应用
Rachana Baldania
{"title":"Sentiment analysis approaches for movie reviews forecasting: A survey","authors":"Rachana Baldania","doi":"10.1109/ICIIECS.2017.8275938","DOIUrl":"https://doi.org/10.1109/ICIIECS.2017.8275938","url":null,"abstract":"Human psychology has always influenced by others suggestion and reviews. Our reviews about something are very much influenced by other's reviews, and whenever we need to make a decision or solution, we often seek out other's reviews, so people are excited to know other's reviews for their profit that is why automated sentiment analysis systems are required. This Survey Paper is describes basics about sentiment analysis, polarity types, sentiment types, sentiment documentation types, levels of sentiment, General Flow Diagram of System, and also different Approaches and Related Work for better understanding about the system.","PeriodicalId":215356,"journal":{"name":"2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125342297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design and implementation of smart HealthCare system using IoT 使用物联网的智能医疗保健系统的设计和实现
Durga Amarnath M. Budida, Ramchandra S. Mangrulkar
{"title":"Design and implementation of smart HealthCare system using IoT","authors":"Durga Amarnath M. Budida, Ramchandra S. Mangrulkar","doi":"10.1109/ICIIECS.2017.8275903","DOIUrl":"https://doi.org/10.1109/ICIIECS.2017.8275903","url":null,"abstract":"Diagnosis, and monitoring of health is a very important task in healthcare industry. Due to time constraint, people are not visiting hospitals, which might and possibly lead to a lot of health issues in one instant of time. Predominantly most of the healthcare systems have been developed to predict and diagnose the health of the patients by which people who are busy in their schedule can also monitor their health at regular intervals. Many studies show that early prediction is the best way to cure health because early diagnosis will help and alert the patients to know the health status. Healthcare being a global issue more particularly India being a most populated nation where majority of which live in villages deprived of healthcare facilities on real time basis continuously and regularly. With the increasing use of technology, there is an urgent need to have such a smart health monitoring system that can communicate between network devices and application which will help the patients and doctors to monitor, track and record the patient's sensitive data containing medical information. This paper depicts the idea of solving health issues using the latest technology, Internet of Things (IoT). It presents the architectural review of smart healthcare system using Internet of Things(IoT) which is aimed to provide a Better HealthCare to everyone. Using this system architecture, patient's body parameters can be measured in real time. Sensors collect patients body parameters and transfers that data to Microcontroller ATMEL 89s52 which further transfer that data to the MySQL database server. This MySQL database server manages the data and provides accessibility. The patient can view this data with the help of Android App. Which one can install in Smartphone, or Tablet. If data is abnormal then patient gets notification also care takers will get emergency message. With the help of different decision making algorithms decisions can be made easily and fast and according to it people can have access to the database. The patient can check their medical record Hence, the system provides a Better HealthCare to everyone and error free and smooth communication to patients.","PeriodicalId":215356,"journal":{"name":"2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128648554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Survey on a muilt-keyword ranked based search and privacy preservation of distributed documents in the network 基于多关键字排序的网络分布式文档搜索与隐私保护研究
Jyoti S. Muthreja, A. B. Patil
{"title":"Survey on a muilt-keyword ranked based search and privacy preservation of distributed documents in the network","authors":"Jyoti S. Muthreja, A. B. Patil","doi":"10.1109/ICIIECS.2017.8276167","DOIUrl":"https://doi.org/10.1109/ICIIECS.2017.8276167","url":null,"abstract":"In Information Networks, owner can store their data over dispersed numerous servers. It encouraging clients to store and get to their information in and from various servers by settling down anyplace and on any gadget. It is an extremely difficult to give efficient inquiry on appropriated reports additionally give the security on proprietor's data. The current framework gives one conceivable arrangement that is protection safeguarding ordering (PPI). In this framework, archives are disseminated over different private servers which are by and large controlled by cloud/open server. At the point when client needs a few archives, they inquiry to open cloud, which then returns the applicant list that is private server rundown to clients. In the wake of getting rundown, client can look the archives on particular private server however in this framework; data are put away in plain content structure on private server that is security is traded off. In any case, proposed framework improves this current framework to make it more secure and proficient. Initially reports are put away in scrambled structure on the private servers and after that utilization Key Distribution Center (KDC) for permitting unscrambling of information get from private server, at customer side. The proposed framework likewise actualizes TF-IDF, which gives the positioning of results to clients.","PeriodicalId":215356,"journal":{"name":"2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121038031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid spectral features for speech emotion recognition 语音情感识别的混合光谱特征
A. Shah, P. B. Anto
{"title":"Hybrid spectral features for speech emotion recognition","authors":"A. Shah, P. B. Anto","doi":"10.1109/ICIIECS.2017.8275943","DOIUrl":"https://doi.org/10.1109/ICIIECS.2017.8275943","url":null,"abstract":"Speech emotion recognition is an interesting research area with different applications. Hybridization of spectral features for speech emotion recognition is discussed in this paper. An emotional speech database consisting of nine emotions is created for this experiment. Extreme Learning Machines (ELM) is used as the pattern classifier. An overall recognition accuracy of 82.22% could be achieved from this experiment.","PeriodicalId":215356,"journal":{"name":"2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122381806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection of malicious transactions in databases using dynamic sensitivity and weighted rule mining 基于动态敏感性和加权规则挖掘的数据库恶意事务检测
I. Singh, Shubhi Sareen, Himanshu Ahuja
{"title":"Detection of malicious transactions in databases using dynamic sensitivity and weighted rule mining","authors":"I. Singh, Shubhi Sareen, Himanshu Ahuja","doi":"10.1109/ICIIECS.2017.8276084","DOIUrl":"https://doi.org/10.1109/ICIIECS.2017.8276084","url":null,"abstract":"The development of an Intrusion Detection System for Database Security has grown into an undeniable necessity in the past few years. In order to maintain scalability and dynamicity of database systems, detecting privilege abuse is of foremost importance. Most researchers have presented either a static or database dependent solution to the existing problem of Insider Attacks. Our Approach, Dynamic Sensitivity Driven Rule Generation Algorithm (DSDRGA) detects intrusive transactions and therefore safeguards crucial data from modification. Sensitivity of data attributes and the data dependency rules are dynamically determined by mining frequent sequences from normal user data access patterns retrieved from the audit log. The extent of weighted similarity between the mined rules and the incoming transactions is used to classify the transaction as malicious or normal user behavior. DSDRGA gives promising results in the detection of malicious transactions when evaluated on a characteristic banking dataset.","PeriodicalId":215356,"journal":{"name":"2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128290784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparative study of energy storage elements in solar still 太阳能蒸馏器储能元件的比较研究
P. Sreekanth, V. Rajesh
{"title":"Comparative study of energy storage elements in solar still","authors":"P. Sreekanth, V. Rajesh","doi":"10.1109/ICIIECS.2017.8275995","DOIUrl":"https://doi.org/10.1109/ICIIECS.2017.8275995","url":null,"abstract":"The efficiency for a passive single-slope type solar still used for desalination and distillation is very low. Most of the available methods are either very costly or very slow in the rate of production. Many studies were conducted to improve the rate of production from the still. In this proposed work, a study on thermal storage elements like pieces of aluminum sheet and galvanized iron sheet with sponge cubes have been performed along with a comparison to the normal plain basin with only sponges. The study is further extended to know the enhancements in efficiency with preheating of the inlet water. In water scarce area, this could be really helpful because of the increased rate and reduced cost of production. A cost analysis has also been carried out to determine the payback period for the proposed system.","PeriodicalId":215356,"journal":{"name":"2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134438427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信