{"title":"Optimized DG placement in radial distribution system with reconfiguration and capacitor placement using genetic algorithm","authors":"A. Saonerkar, B. Bagde","doi":"10.1109/ICACCCT.2014.7019263","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019263","url":null,"abstract":"This paper presents minimization of total power loss, improvement in bus voltage profile and branch currents using network reconfiguration, capacitor banks and optimum number of distributed generation (DG) units placement in radial distribution system (RDS). Genetic algorithm (GA) is used to determine highly non-linear problem of calculating total power loss of RDS which are subjected to operational equality and inequality constraints. The effectiveness of this method is illustrated by comparing the results with Harmony search algorithm (HSA) and GA from the literature. The solution to the objective of minimization of loss is obtained using MATLAB optimization toolbox and MATLAB programming environment on standard IEEE 33-bus test system with different case studies.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"1 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124334492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compact reconfigurable Ultra Wide band antenna design for wireless communication","authors":"A. Jazeel, M. Susila","doi":"10.1109/ICACCCT.2014.7019187","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019187","url":null,"abstract":"This paper propose a novel design for multiband reconfigurable Ultra Wideband (UWB) antenna which can be used for spectrum sensing in cognitive wireless applications. The compact reconfigurable UWB antenna (CRUWBA) proposed is having an excellent matched structure. The radiating patch of the CRUWBA consists of seven regular hexagons united with a circular ring. The CRUWBA is operational in nearly the entire UWB spectrum spanning from 3.1 GHz to 10.6 GHz, and achieves a gain up to 5.8 dB. Within the UWB spectrum, the antenna is capable of operating in five different bands. The operational bands are: band 1 [3-4.3GHz, 5-9 GHz], band 2 [3-3.5GHz, 4.9-6.2 GHz, 7.2-8.9 GHz], band 3 [3-3.8 GHz, 6.7-8.6 GHz], band 4 [3.9-6.1 GHz, 7.4-8.9 GHz] and band 5 [3-4.2 GHz, 4.8-5.7GHz, 6.3-8.4 GHz]. The CRUWBA achieves reconfigurability by employing three switches, and hence have eight switching cases. By analyzing the results, the antenna proves to be satisfying the performance criteria. All the simulations were carried out in Ansoft High Frequency structure simulator (HFSS).","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133800795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid approach to synchronization in real time multiprocessor systems","authors":"Muny Tamut, Kunal Chakma","doi":"10.1109/ICACCCT.2014.7019278","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019278","url":null,"abstract":"We propose a hybrid synchronization protocol for real time multiprocessor system. The proposed protocol will make use of the very famous priority ceiling protocol on the uniprocessor level, for accessing local resources. While a lock-free approach will be employed; whenever a task requests an access to a global resource. Also, a blocking time analysis for the tasks under the hybrid approach is carried out. And finally, we derive a schedulability analysis for the proposed protocol.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"111 44","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113945503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Subject-specific EMG pattern classification ofactive hand movements for prosthesis applications","authors":"Sneha J. Bansod, Sumit A. Raurale","doi":"10.1109/ICACCCT.2014.7019354","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019354","url":null,"abstract":"The prosthesis hand amputees are highly helpful for various active hand movements based on wrist and elbow mobility for specific subject. In the field of rehabilitation, development of an advanced human-machine interface has been an interesting research topic in which biomedical electromyography (EMG) signals, play a vital role. Capturing, pre-processing, feature extraction and classification of EMG is very desirable which allows more standardized and precise evaluation of the neurophysiological, rehabitational and assistive technological advancements in prosthetic applications. This paper concerns with the capturing of real-time active hand movements EMG signals based on wrist-elbow mobility for simultaneous classification of features. The Anterior and Posterior forearm muscles are considered for proficient manipulation of EMG signals. The Feature is extracted using statistical first order time-frequency scaling analysis with pattern classification via linear discriminant analysis (LDA) which estimates the classification rate of about (89-91)%.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121172938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient dynamic resource allocation algorithm for downlink MIMO - OFDMA systems","authors":"Ankur Gangwar, M. R. Bharti","doi":"10.1109/ICACCCT.2014.7019196","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019196","url":null,"abstract":"Multiple Input Multiple Output (MIMO) - Orthogonal Frequency Division Multiple Access (OFDMA) systems provide high spectral efficiency due to its integrated space-frequency and multi-user diversity. In this paper a Dynamic Resource Allocation (DRA) scheme has been devised for MIMO - OFDMA systems in a downlink scenario. The scheme optimizes the power distribution and guarantees desired Quality of Service (QoS) to each user. The available channel state information at the Base Station (BS) is utilized in order to help these practical schemes to improve system performance and to satisfy various QoS constraints. Computer simulation results demonstrate the proposed scheme performance with the comparison of previous allocation schemes and the proposed scheme satisfy the proportionality constraints and achieves high system capacity.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128634786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An analysis of quality factor for different bio-analytes by using photonic crystal based sensor","authors":"Poonam Sharma, F. D. Gudagunti, Preeta Sharan","doi":"10.1109/ICACCCT.2014.7019229","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019229","url":null,"abstract":"In this paper a two dimensional photonic crystal based super structure which can sense different bio-analytes in blood for biomedical applications has been successfully demonstrated with a very high quality factor. Simulation and analysis has been done for Cytop (polymer), Blood Plasma, Ethanol, Hemoglobin, Glucose solution (40gm/100ml), Biotin-Streptavidin and Bovine Serum Albumin. Finite Difference Time Domain (FDTD) method has been used for the analysis. MEEP (MIT Electromagnetic Equation Propagation) simulation tool has been used for modeling and designing of photonic crystal super structure. The optical properties of different bio-analytes are studied and the normalized power and Q factor has been observed for bio- analytes which can be used for blood analysis. It has been observed that for little change in dielectric constant (∈) there will be a moderate shift in the transmitted output power and quality factor and hence it acts as a sensor. This indicates that it is highly sensitive for the change in refractive index.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"22 6S 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115944740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Marimuthu, D. Ganesh Gopal, S. Aditya, Varun Mittal
{"title":"Cryptanalysis of oPass","authors":"K. Marimuthu, D. Ganesh Gopal, S. Aditya, Varun Mittal","doi":"10.1109/ICACCCT.2014.7019457","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019457","url":null,"abstract":"The security of oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks proposed by H.M.Sun et al. in IEEE Transactions on Information Forensics and Security, Vol.7, No.2, April 2012 is analyzed. Upon completion of the analysis of the paper, four kinds of attacks SMS service, attacks on oPass communication links, unauthorised intruder access using the master password and Network attacks on untrusted web browser are identified in different scenarios. Thus, we proved that oPass proposed by H.M.Sun et al. is not suitable for practical application.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117296483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real time Sign Language Recognition using PCA","authors":"Shreyas Sawant, M. S. Kumbhar","doi":"10.1109/ICACCCT.2014.7019333","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019333","url":null,"abstract":"The Sign Language is a method of communication for deaf-dumb people. This paper presents the Sign Language Recognition system capable of recognizing 26 gestures from the Indian Sign Language by using MATLAB. The proposed system having four modules such as: pre-processing and hand segmentation, feature extraction, sign recognition and sign to text and voice conversion. Segmentation is done by using image processing. Different features are extracted such as Eigen values and Eigen vectors which are used in recognition. The Principle Component Analysis (PCA) algorithm was used for gesture recognition and recognized gesture is converted into text and voice format. The proposed system helps to minimize communication barrier between deaf-dumb people and normal people.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114332929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FDRD: Feature driven reuse development process model","authors":"Sonia Thakur, Harshpreet Singh","doi":"10.1109/ICACCCT.2014.7019376","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019376","url":null,"abstract":"As fast the business requirements changes, the need of rapid of development and economical feasible software also increases. The new software development techniques and models are coming to picture to solve the problems of rapid changing requirements. Agile methodology is one of the approaches to fulfill the current business requirements, which is flexible to adapt the change at any phase of development. Feature driven development (FDD) is an agile based process model based on feature development, adapted by many organizations. The limitation of agile process is its incapability to reuse components those are developed through agile processes. Adopting reuse is a challenging task but it can be used at an initial level by integrating with various development processes. Reuse oriented development of software is considered to be one of the most efficient techniques to improve software quality as it increases the productivity and reduces the development effort and cost. This paper purposes a reengineered Feature driven reuse development (FDRD) process model which integrate reuse concept with feature driven development process model. The model improves the productivity of organization and quality of the produced product.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115156168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arpita Biswas, Meenakshi Sharma, Tanusree Poddder, Dr. Nirmalya Kar
{"title":"An approach towards multilevel and multiagent based intrusion detection system","authors":"Arpita Biswas, Meenakshi Sharma, Tanusree Poddder, Dr. Nirmalya Kar","doi":"10.1109/ICACCCT.2014.7019417","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019417","url":null,"abstract":"Due to massive expansion of network computer systemS it became very difficult to manage those systems. Now a day's many intruders are present who take advantages of these internet facilities and that's why many unauthorized access is done. Intrusion detection system detects intrusion and also detects the malicious attacks and if any suspicious behavior is found it generate an alarm to the administrator and stops the work. In this paper we improve the intrusion detection system and use the Multiagent concept with multilevel intrusion detection system. Here we store the attack types in the database and when any types is matched with this database then it detects the intrusion. By this process no unknown attacks are detected.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115188401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}