2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies最新文献

筛选
英文 中文
Power quality factor improvement using shunt active power line conditioner 采用并联有源电力线调节器改善电能质量因数
M. Nagarjuna, P. C. Panda, A. Sandeep
{"title":"Power quality factor improvement using shunt active power line conditioner","authors":"M. Nagarjuna, P. C. Panda, A. Sandeep","doi":"10.1109/ICACCCT.2014.7019475","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019475","url":null,"abstract":"This paper describes an improvement method of power quality using shunt active power line conditioner (APLC) for a three phase supply system feeding three phase unbalanced non-linear load. A control algorithm is presented for an APLC to compensate harmonics and unbalance factor. Sensing load currents, dc bus voltages compute reference currents of APLC. APLC driving signals are produced with the reference signals via a hysteresis band current controller. MATLAB/simulink power system toolbox is used to simulate the proposed system. The proposed method restricts both THD and unbalance factor of input currents and a power quality factor is designated which integrally reflects the two quality aspects (i.e., harmonic and unbalance factor) before and after compensation. Power quality factor improvement with the proposed shunt APLC has been verified by the simulation results.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122995842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance analysis of Modified Random Based Interleaver for OFDM-IDMA system 基于改进随机交织器的OFDM-IDMA系统性能分析
Raghu Kalyana, S. Anuradha
{"title":"Performance analysis of Modified Random Based Interleaver for OFDM-IDMA system","authors":"Raghu Kalyana, S. Anuradha","doi":"10.1109/ICACCCT.2014.7019223","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019223","url":null,"abstract":"This paper in the mainly focuses on different interleavers used in Orthogonal Frequency Division Multiplexing (OFDM) and Interleave-Division-Multiple-Access (IDMA) system. An efficient Modified Random Based Interleaver is proposed which is simple and could produce orthogonal interleavers for generating user specific chip level interleavers for different users. The projected methodology reduces the computational complexity, memory requirement problem and also reduces the number of data exchanges between the base station (BS) and also the mobile station (MS). The simulation results are presented to indicate that the proposed Modified Random Based Interleaver gives better performance as compared to Master random Interleaver and Tree Based Interleaver in OFDM-IDMA system.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117303055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intrusion detection in wireless sensor network using genetic K-means algorithm 基于遗传k -均值算法的无线传感器网络入侵检测
G. Sandhya, A. Julian
{"title":"Intrusion detection in wireless sensor network using genetic K-means algorithm","authors":"G. Sandhya, A. Julian","doi":"10.1109/ICACCCT.2014.7019418","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019418","url":null,"abstract":"Security of communication systems has become a crucial issue. A harder problem to crack in the field of Network Security is the identification and prevention of attacks. An effective Intrusion Detection System (IDS) is essential for ensuring network security. Intrusion detection systems include pattern analysis techniques to discover useful patterns of system features. These patterns describe user behavior. Anomalies are computed using the set of relevant system features. The derived patterns comprise inputs of classification systems, which are based on statistical and machine learning pattern recognition techniques. Clustering methods are useful in detection of unknown attack patterns. Elimination of insignificant features is essential for a simplified, faster and more accurate detection of attacks. Genetic algorithm based clustering offers identification of significant reduced input features. We present a conceptual framework for identifying attacks for intrusion detection by applying genetic K-means algorithm.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128769438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Comparison and performance analysis of clustering protocol using sleep&wakeup technique in WSN 基于睡眠唤醒技术的WSN聚类协议的比较与性能分析
T. Indhumathi, P. Sivakumar
{"title":"Comparison and performance analysis of clustering protocol using sleep&wakeup technique in WSN","authors":"T. Indhumathi, P. Sivakumar","doi":"10.1109/ICACCCT.2014.7019173","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019173","url":null,"abstract":"In order to achieve data information, the Sensor Node's should form into clusters in wireless sensor network. In Multi-hop sensor network, the Base-Station (sink) is might not be considered. That is why, the hot-spot problem may occur in this network. In this paper, we analyze the sleep&wakeup approach, in order to avoid the hot spot (WLAN) problem, which aims to increase the network lifetime using energy as well as packet delivery ratio. In this technique, C-H (cluster-head) has selected based on energy level & Base-Station distance. Using this technique, we can improve the energy consumption & PDR up to 63%, when compare to that of FCA (fuzzy clustering algorithm) and LEACH (low energy adaptive clustering hierarchy) clustering protocol. Our simulation results are shows that the sleep&wakeup approach is better and energy efficient clustering protocol.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124686309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A novel reconfigurable microstrip patch antenna for IMT-A 一种新型可重构IMT-A微带贴片天线
Kumar Singh, A. Bhargav, G. Mishra
{"title":"A novel reconfigurable microstrip patch antenna for IMT-A","authors":"Kumar Singh, A. Bhargav, G. Mishra","doi":"10.1109/ICACCCT.2014.7019171","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019171","url":null,"abstract":"In this paper a novel reconfigurable patch antenna is designed for IMT-A. The antenna has a simple design with five patches connected by four diodes. By suitably switching ON the diodes, reconfiguration in the radiation pattern is achieved while keeping the operating frequency fixed. Six different radiation patterns were achieved using the design and in all of them the band width requirement of IMT-A was achieved. The design was done using the well known EM simulation software, IE3D. The design was fabricated on RO3010 substrate with relative permeability of 10.2 and having thickness 1.28 mm and with the diodes replaced by microstrip lines for the ON state as an ideal case. Finally the fabricated designed was analysed using the vector network analyser.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130302974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Model based object recognition for particle size distribution 基于模型的物体粒度分布识别
S. Priadarsini, S. Ganesan, C. Shanthi, N. Pappa
{"title":"Model based object recognition for particle size distribution","authors":"S. Priadarsini, S. Ganesan, C. Shanthi, N. Pappa","doi":"10.1109/ICACCCT.2014.7019322","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019322","url":null,"abstract":"In Aerospace applications, Ammonium Nitrate, Ammonium dichromate [(NH4)2 Cr2 O7] and Hydroxy-Terminator PolyButadiene (HTPB) are used as solid propellants. Ammonium dichromate must be pulverized and used in rockets which play the major role to improve the burn rate of the fuel. Image Processing based techniques are used to measure the particle size of Ammonium dichromate. If the particle is overlapped its size or shape can't be accurately measured. Hence, overlap of the particle is determined and its size can be measured. This paper deals with the estimation of the area of Ammonium dichromate particles. An intimate approach to overcome overlap in the particles is done using the Gaussian process regression model. The prediction is done by using linear function of the observed values and these functions can be computed quickly using recursive formulas. Gaussian process regression model is employed to determine the multiple overlap of the particles.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123881463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Steganography on thermal images using generation technique 基于生成技术的热图像隐写
Dany Thomas Koshy, S. Vijayananth
{"title":"Steganography on thermal images using generation technique","authors":"Dany Thomas Koshy, S. Vijayananth","doi":"10.1109/ICACCCT.2014.7019432","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019432","url":null,"abstract":"Steganography on thermal image using generation method, where a secret thermal image is hidden in a generated cover image. Generated cover image is a unique image thereby providing more security and robustness. The generated cover image provides high capacity as the whole image for hiding thermal image by keeping low visual changes. Using thermal image gives more security as it is a rare image which is widely used in military purpose. The algorithm used here is highly resistant against RS, Sample pair, X2 and DCT based attacks.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116193143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Assuring correctness for securing outsourced data repository in cloud environment 确保云环境中外包数据存储库安全的正确性
G. Durga Priya, S. Prathibha
{"title":"Assuring correctness for securing outsourced data repository in cloud environment","authors":"G. Durga Priya, S. Prathibha","doi":"10.1109/ICACCCT.2014.7019407","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019407","url":null,"abstract":"The data storage in the cloud environment offers users with infrastructure affability, quicker deployment of applications and data, cost effective, acclimation of cloud resources to real needs, enhanced productivity, etc. Inspite of these beneficial factors, there are several disadvantages to the widespread adoption of cloud computing remain. Among them, surity towards the exactness of the outsourced data and matter of concealment takes the major part. In order to avoid a security hazard for the outsourced data, we propose the dynamic audit services that enable integrity verification of data. An Interactive Proof System (IPS) is introduced to protect the privacy of the data. The DataOwner stores the large number of data in the cloud after encrypting the data for auditing purpose. An Authorized Application (AA), manipulates the outsourced data and the AA helps the cloud users to access the services. Our system provides secure auditing while the data owner, outsourcing the data in the cloud. And after performing auditing operations, security solutions are enhanced for the purpose of detecting malicious users with the help of Certificate Authority, using the hash values and a TimeStamp.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"326 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124297926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Burst circulating threat in optical burst switched networks 光突发交换网络中的突发循环威胁
N. Sreenath, K. Muthuraj, K. Brabagaran
{"title":"Burst circulating threat in optical burst switched networks","authors":"N. Sreenath, K. Muthuraj, K. Brabagaran","doi":"10.1109/ICACCCT.2014.7019197","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019197","url":null,"abstract":"Optical network is a high speed network thus reduce the huge bandwidth demands and increase the internet users. Optical burst switched network is an optical networking technique that allows dynamic sub wavelength. OBS is viewed as compromise the optical packet switching and optical circuit switching networks. OBS networks suffer from various security vulnerabilities. This paper propose a security threat named as Burst Circulating attack for OBS networks and provide defective mechanism for this attack. The ns2 simulator with modified nOBS patch is used simulate and verify the security parameter.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124497404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced security for multi-cloud storage using cryptographic data splitting with dynamic approach 使用动态方法的加密数据分割增强了多云存储的安全性
V. R. Balasaraswathi, S. Manikandan
{"title":"Enhanced security for multi-cloud storage using cryptographic data splitting with dynamic approach","authors":"V. R. Balasaraswathi, S. Manikandan","doi":"10.1109/ICACCCT.2014.7019286","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019286","url":null,"abstract":"The use of cloud computing has increased rapidly in many organizations. Security is considered to be the most critical aspects in a cloud computing environment due to the sensitive information stored in the cloud for users. The goal of cloud security is mainly focused on the issues related to the data security and privacy aspects in cloud computing. This multi cloud model which is based on partitioning of application system into distinct clouds instead of using single cloud service such as in Amazon cloud service. It will discuss and present the cryptographic data splitting with dynamic approach for securing information. The metadata information is stored in private cloud. This approach prevents the unauthorized data retrieval by hackers and intruders. The results and implementation for the new proposed model is analyzed, in relation to addressing the security factors in cloud computing.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126421712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信