2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies最新文献

筛选
英文 中文
Optimized DG placement in radial distribution system with reconfiguration and capacitor placement using genetic algorithm 利用遗传算法优化径向配电系统中可重构配电系统的DG布局和电容器布局
A. Saonerkar, B. Bagde
{"title":"Optimized DG placement in radial distribution system with reconfiguration and capacitor placement using genetic algorithm","authors":"A. Saonerkar, B. Bagde","doi":"10.1109/ICACCCT.2014.7019263","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019263","url":null,"abstract":"This paper presents minimization of total power loss, improvement in bus voltage profile and branch currents using network reconfiguration, capacitor banks and optimum number of distributed generation (DG) units placement in radial distribution system (RDS). Genetic algorithm (GA) is used to determine highly non-linear problem of calculating total power loss of RDS which are subjected to operational equality and inequality constraints. The effectiveness of this method is illustrated by comparing the results with Harmony search algorithm (HSA) and GA from the literature. The solution to the objective of minimization of loss is obtained using MATLAB optimization toolbox and MATLAB programming environment on standard IEEE 33-bus test system with different case studies.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"1 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124334492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Compact reconfigurable Ultra Wide band antenna design for wireless communication 紧凑可重构的超宽带天线设计,用于无线通信
A. Jazeel, M. Susila
{"title":"Compact reconfigurable Ultra Wide band antenna design for wireless communication","authors":"A. Jazeel, M. Susila","doi":"10.1109/ICACCCT.2014.7019187","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019187","url":null,"abstract":"This paper propose a novel design for multiband reconfigurable Ultra Wideband (UWB) antenna which can be used for spectrum sensing in cognitive wireless applications. The compact reconfigurable UWB antenna (CRUWBA) proposed is having an excellent matched structure. The radiating patch of the CRUWBA consists of seven regular hexagons united with a circular ring. The CRUWBA is operational in nearly the entire UWB spectrum spanning from 3.1 GHz to 10.6 GHz, and achieves a gain up to 5.8 dB. Within the UWB spectrum, the antenna is capable of operating in five different bands. The operational bands are: band 1 [3-4.3GHz, 5-9 GHz], band 2 [3-3.5GHz, 4.9-6.2 GHz, 7.2-8.9 GHz], band 3 [3-3.8 GHz, 6.7-8.6 GHz], band 4 [3.9-6.1 GHz, 7.4-8.9 GHz] and band 5 [3-4.2 GHz, 4.8-5.7GHz, 6.3-8.4 GHz]. The CRUWBA achieves reconfigurability by employing three switches, and hence have eight switching cases. By analyzing the results, the antenna proves to be satisfying the performance criteria. All the simulations were carried out in Ansoft High Frequency structure simulator (HFSS).","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133800795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A hybrid approach to synchronization in real time multiprocessor systems 实时多处理器系统中同步的混合方法
Muny Tamut, Kunal Chakma
{"title":"A hybrid approach to synchronization in real time multiprocessor systems","authors":"Muny Tamut, Kunal Chakma","doi":"10.1109/ICACCCT.2014.7019278","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019278","url":null,"abstract":"We propose a hybrid synchronization protocol for real time multiprocessor system. The proposed protocol will make use of the very famous priority ceiling protocol on the uniprocessor level, for accessing local resources. While a lock-free approach will be employed; whenever a task requests an access to a global resource. Also, a blocking time analysis for the tasks under the hybrid approach is carried out. And finally, we derive a schedulability analysis for the proposed protocol.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"111 44","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113945503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Subject-specific EMG pattern classification ofactive hand movements for prosthesis applications 假肢应用中手部活动的受试者特定肌电图模式分类
Sneha J. Bansod, Sumit A. Raurale
{"title":"Subject-specific EMG pattern classification ofactive hand movements for prosthesis applications","authors":"Sneha J. Bansod, Sumit A. Raurale","doi":"10.1109/ICACCCT.2014.7019354","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019354","url":null,"abstract":"The prosthesis hand amputees are highly helpful for various active hand movements based on wrist and elbow mobility for specific subject. In the field of rehabilitation, development of an advanced human-machine interface has been an interesting research topic in which biomedical electromyography (EMG) signals, play a vital role. Capturing, pre-processing, feature extraction and classification of EMG is very desirable which allows more standardized and precise evaluation of the neurophysiological, rehabitational and assistive technological advancements in prosthetic applications. This paper concerns with the capturing of real-time active hand movements EMG signals based on wrist-elbow mobility for simultaneous classification of features. The Anterior and Posterior forearm muscles are considered for proficient manipulation of EMG signals. The Feature is extracted using statistical first order time-frequency scaling analysis with pattern classification via linear discriminant analysis (LDA) which estimates the classification rate of about (89-91)%.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121172938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient dynamic resource allocation algorithm for downlink MIMO - OFDMA systems 下行MIMO - OFDMA系统中一种有效的动态资源分配算法
Ankur Gangwar, M. R. Bharti
{"title":"An efficient dynamic resource allocation algorithm for downlink MIMO - OFDMA systems","authors":"Ankur Gangwar, M. R. Bharti","doi":"10.1109/ICACCCT.2014.7019196","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019196","url":null,"abstract":"Multiple Input Multiple Output (MIMO) - Orthogonal Frequency Division Multiple Access (OFDMA) systems provide high spectral efficiency due to its integrated space-frequency and multi-user diversity. In this paper a Dynamic Resource Allocation (DRA) scheme has been devised for MIMO - OFDMA systems in a downlink scenario. The scheme optimizes the power distribution and guarantees desired Quality of Service (QoS) to each user. The available channel state information at the Base Station (BS) is utilized in order to help these practical schemes to improve system performance and to satisfy various QoS constraints. Computer simulation results demonstrate the proposed scheme performance with the comparison of previous allocation schemes and the proposed scheme satisfy the proportionality constraints and achieves high system capacity.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128634786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An analysis of quality factor for different bio-analytes by using photonic crystal based sensor 利用光子晶体传感器分析不同生物分析物的品质因子
Poonam Sharma, F. D. Gudagunti, Preeta Sharan
{"title":"An analysis of quality factor for different bio-analytes by using photonic crystal based sensor","authors":"Poonam Sharma, F. D. Gudagunti, Preeta Sharan","doi":"10.1109/ICACCCT.2014.7019229","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019229","url":null,"abstract":"In this paper a two dimensional photonic crystal based super structure which can sense different bio-analytes in blood for biomedical applications has been successfully demonstrated with a very high quality factor. Simulation and analysis has been done for Cytop (polymer), Blood Plasma, Ethanol, Hemoglobin, Glucose solution (40gm/100ml), Biotin-Streptavidin and Bovine Serum Albumin. Finite Difference Time Domain (FDTD) method has been used for the analysis. MEEP (MIT Electromagnetic Equation Propagation) simulation tool has been used for modeling and designing of photonic crystal super structure. The optical properties of different bio-analytes are studied and the normalized power and Q factor has been observed for bio- analytes which can be used for blood analysis. It has been observed that for little change in dielectric constant (∈) there will be a moderate shift in the transmitted output power and quality factor and hence it acts as a sensor. This indicates that it is highly sensitive for the change in refractive index.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"22 6S 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115944740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cryptanalysis of oPass 密码分析的通行证
K. Marimuthu, D. Ganesh Gopal, S. Aditya, Varun Mittal
{"title":"Cryptanalysis of oPass","authors":"K. Marimuthu, D. Ganesh Gopal, S. Aditya, Varun Mittal","doi":"10.1109/ICACCCT.2014.7019457","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019457","url":null,"abstract":"The security of oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks proposed by H.M.Sun et al. in IEEE Transactions on Information Forensics and Security, Vol.7, No.2, April 2012 is analyzed. Upon completion of the analysis of the paper, four kinds of attacks SMS service, attacks on oPass communication links, unauthorised intruder access using the master password and Network attacks on untrusted web browser are identified in different scenarios. Thus, we proved that oPass proposed by H.M.Sun et al. is not suitable for practical application.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117296483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real time Sign Language Recognition using PCA 使用PCA的实时手语识别
Shreyas Sawant, M. S. Kumbhar
{"title":"Real time Sign Language Recognition using PCA","authors":"Shreyas Sawant, M. S. Kumbhar","doi":"10.1109/ICACCCT.2014.7019333","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019333","url":null,"abstract":"The Sign Language is a method of communication for deaf-dumb people. This paper presents the Sign Language Recognition system capable of recognizing 26 gestures from the Indian Sign Language by using MATLAB. The proposed system having four modules such as: pre-processing and hand segmentation, feature extraction, sign recognition and sign to text and voice conversion. Segmentation is done by using image processing. Different features are extracted such as Eigen values and Eigen vectors which are used in recognition. The Principle Component Analysis (PCA) algorithm was used for gesture recognition and recognized gesture is converted into text and voice format. The proposed system helps to minimize communication barrier between deaf-dumb people and normal people.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114332929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
FDRD: Feature driven reuse development process model FDRD:功能驱动的重用开发过程模型
Sonia Thakur, Harshpreet Singh
{"title":"FDRD: Feature driven reuse development process model","authors":"Sonia Thakur, Harshpreet Singh","doi":"10.1109/ICACCCT.2014.7019376","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019376","url":null,"abstract":"As fast the business requirements changes, the need of rapid of development and economical feasible software also increases. The new software development techniques and models are coming to picture to solve the problems of rapid changing requirements. Agile methodology is one of the approaches to fulfill the current business requirements, which is flexible to adapt the change at any phase of development. Feature driven development (FDD) is an agile based process model based on feature development, adapted by many organizations. The limitation of agile process is its incapability to reuse components those are developed through agile processes. Adopting reuse is a challenging task but it can be used at an initial level by integrating with various development processes. Reuse oriented development of software is considered to be one of the most efficient techniques to improve software quality as it increases the productivity and reduces the development effort and cost. This paper purposes a reengineered Feature driven reuse development (FDRD) process model which integrate reuse concept with feature driven development process model. The model improves the productivity of organization and quality of the produced product.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115156168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
An approach towards multilevel and multiagent based intrusion detection system 基于多级多智能体的入侵检测系统研究
Arpita Biswas, Meenakshi Sharma, Tanusree Poddder, Dr. Nirmalya Kar
{"title":"An approach towards multilevel and multiagent based intrusion detection system","authors":"Arpita Biswas, Meenakshi Sharma, Tanusree Poddder, Dr. Nirmalya Kar","doi":"10.1109/ICACCCT.2014.7019417","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019417","url":null,"abstract":"Due to massive expansion of network computer systemS it became very difficult to manage those systems. Now a day's many intruders are present who take advantages of these internet facilities and that's why many unauthorized access is done. Intrusion detection system detects intrusion and also detects the malicious attacks and if any suspicious behavior is found it generate an alarm to the administrator and stops the work. In this paper we improve the intrusion detection system and use the Multiagent concept with multilevel intrusion detection system. Here we store the attack types in the database and when any types is matched with this database then it detects the intrusion. By this process no unknown attacks are detected.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115188401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信