2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)最新文献

筛选
英文 中文
Comparison of Bio-inspired and Transform based Encryption Algorithms for Satellite Images 基于生物和基于变换的卫星图像加密算法的比较
Bhagyashri R. Pandurangi, C. Bhat, M. Patil
{"title":"Comparison of Bio-inspired and Transform based Encryption Algorithms for Satellite Images","authors":"Bhagyashri R. Pandurangi, C. Bhat, M. Patil","doi":"10.1109/ICEECCOT43722.2018.9001344","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001344","url":null,"abstract":"Since satellite images are very important in communication, the paper gives a comparison of two algorithms, which is, one using radial Hilbert transform and other using bio-inspired using chaotic maps. To provide security against vulnerable attacks, both algorithms use scrambling. Experimental results show that bio-inspired algorithm has a better entropy value whereas transform based algorithm has a short encryption time compared to other. Both the algorithms are sensitive to change in key values.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115834919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comparative Study to Determine a Suitable Legal Knowledge Representation Format 确定合适的法律知识表达形式的比较研究
Avadhut Shelar, Minal Moharir
{"title":"A Comparative Study to Determine a Suitable Legal Knowledge Representation Format","authors":"Avadhut Shelar, Minal Moharir","doi":"10.1109/ICEECCOT43722.2018.9001363","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001363","url":null,"abstract":"Legal Text is typically conveyed in natural language. It is not suitable to be processed by computer. The representation of complex knowledge in legal text is a challenging activity. Researchers have already proposed different approaches in legal domain on knowledge representation. Legal practice is going through changes over past few decades like semi or automated decision support systems. Modeling and reasoning in e.g. argumentation has increasingly become topic of interest in AI and legal community itself. CEN Metalex, Akoma Ntoso, Legal XML are few technologies which have shown promises to cater requirements of complex legal knowledge representation. In this paper we explore the potential of adapting Oasis Legal Doc ML and Legal Rule ML to accommodate them in context of Indian legal text specifically with example of Consumer Protection Act, 1986.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123203670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Analysis of Energy Efficient Cluster Based Heterogeneous Wireless Sensor Network against Malicious Attack 基于高能效集群的异构无线传感器网络抗恶意攻击性能分析
M. Lakshmi, C. Prashanth
{"title":"Performance Analysis of Energy Efficient Cluster Based Heterogeneous Wireless Sensor Network against Malicious Attack","authors":"M. Lakshmi, C. Prashanth","doi":"10.1109/ICEECCOT43722.2018.9001655","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001655","url":null,"abstract":"In a distributed Wireless communication technology, sensor networks have been proposed for use in many applications such as environmental monitoring and surveillance. Due to the different computing power, sensing range and different ability, the deployment and topology in Heterogeneous WSN(HWSN) is complex compared to Homogeneous WSN. Clusters are formed in Heterogeneous Wireless Sensor Network and Cluster Head (CH) is selected based on the Initial Energy and Residual Energy with Low Draining Rate (RELDR). Data from the cluster members are sensed, aggregated and summarized by cluster head, processed between the clusters. A node in a network called Cluster Authority (CA) works as a supervising node that has remove list which collects the attacker information. A concept using Multiple Inputs and Multiple Outputs (MIMO) is implemented in the work which reduces the noise and improves the network performance. The algorithm detects the Blackhole nodes and removes from the network which is listed in the remove list of CA. The network is reconstructed using the legitimate nodes and cluster head selection is based on the Residual energy in the next rounds. Experimental results will be analyzed for the parameters Packet Delivery Ratio, Throughput, End to End Delay, Overhead and Energy. Performance analysis is done with the existing system using Single Input and Single Output(SISO).","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125044362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Current Scenario of IPv6 Service Providers - An Overview IPv6服务提供商现状概述
Sheetal Singala, R. M. Banaka
{"title":"Current Scenario of IPv6 Service Providers - An Overview","authors":"Sheetal Singala, R. M. Banaka","doi":"10.1109/ICEECCOT43722.2018.9001606","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001606","url":null,"abstract":"The Internet Protocol version 6 (IPv6) is superior to its predecessor because it offers a 128 bit addressing scheme that can overthrow the address limitations encountered by IPv4. Apart from this, it offers many improved services that include routing efficiency, automatic configuration, Quality-of-Service (QoS), certainty and flexibility. However, the implementation of IPv6 has been rather slow. A lot of factors contribute to the steady action of making IPv6 functional. The objective of this survey paper is to provide an understanding of the current IPv6 deployment by service providers, the migration techniques used and the rate of deployment achieved. Furthermore, to list down the challenges and hurdles in the deployment and enumerate the initiatives carried out by both private and public organizations in order to achieve a network infrastructure that is predominantly an IPv6 network.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126992596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
LPOCSIN With K-Means: An Overlapping Clustering Technique with Cluster Information 基于K-Means的LPOCSIN:一种具有聚类信息的重叠聚类技术
Partho Sarathi Sarker, Md. Imran Hossain Showrov
{"title":"LPOCSIN With K-Means: An Overlapping Clustering Technique with Cluster Information","authors":"Partho Sarathi Sarker, Md. Imran Hossain Showrov","doi":"10.1109/ICEECCOT43722.2018.9001626","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001626","url":null,"abstract":"Research in the social network has become an escalating area. In past days, most network study on the basis of whether there is a relationship exists or not as well as study with the weight of the relationship. But the weight value was limited within the positive number. Nowadays when the social network is part of every aspect of human life, the weight value is not limited to positive numbers only. Like any online product, the user has to see the review before buying this. Today's review system of any online marketing shop is facilitated by the positive-negative value. A network with signed weight is called a signed network. It is exceptionally much vital to study with the signed network because it moreover expanding day by day. However, most of the researches in this field have done with the unweighted form of the relationship. In this paper, we will show the basic research theory of signed network like a measure of imbalance with social balance theory and clustering technique and explain how a linear programming approach works with the sign network data and giving the desired overlapping cluster.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126850116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Solving Multi-Objective Manufacturing Problem with Demand Leakage, Uniform Fuzzy Demand and Sales 需求泄漏、统一模糊需求与销售的多目标制造问题求解
S. Bandyopadhyay, Indraneel Mandal
{"title":"Solving Multi-Objective Manufacturing Problem with Demand Leakage, Uniform Fuzzy Demand and Sales","authors":"S. Bandyopadhyay, Indraneel Mandal","doi":"10.1109/ICEECCOT43722.2018.9001563","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001563","url":null,"abstract":"This paper focuses on a manufacturing system which produces a product in two grades – grade I and grade II. The manufacturing system under consideration also results into defective items which are further repaired and are sold in the secondary market. The price of grade I product is higher than that for grade II product because of the quality difference. The paper also considers demand leakage for the product of grade I which means that the some of the customers willing to pay for product of grade I, actually purchases product of grade II. The number of unsold units for both the grades of the product is sold at a giveaway price. Both the demand and sale are assumed to be fuzzy in nature. The purpose of this research study is to study the behavior of the system under demand leakage and other mentioned conditions. For this purpose, a three-objective problem has been proposed and Nondominated Sorting Genetic Algorithm – II (NSGA-II) has been applied to study the behavior of the proposed problem. The joint variations of all the objective values have been observed and analyzed. A numerical example shows the applicability of the proposed solution methodology.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133291910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Reconstruction Using Compressive Sensing Technique for Hardware Implementation 基于压缩感知技术的图像重构硬件实现
Santosh S. Bujari, S. Siddamal
{"title":"Image Reconstruction Using Compressive Sensing Technique for Hardware Implementation","authors":"Santosh S. Bujari, S. Siddamal","doi":"10.1109/ICEECCOT43722.2018.9001308","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001308","url":null,"abstract":"ADC (Analog to Digital Converter) which follows the Nyquist rate has changed signal processing. Most of the real time applications required too many samples if Nyquist rate is followed. This may involve more cost or even practically not feasible to build systems capable of acquiring samples at Nyquist rate. Compressive Sensing (CS) is a recent trend emerged as a better concept than Nyquist technique by enabling reconstruction of sparse signals which are acquired bellow Nyquist rate. The authors propose reconstruction of Image using Compressive Sensing Technique. Various matrices like Partial Hadmard, Bernoulli Matrix, Uniform Spherical and Random Matrix with proper threshold are used. The reconstruction time, SNR and MSE are measured. Experiments are carried on various sized image with Foreward Hadmard Transform. The experimental results show that for an image of size 256×256 the reconstruction time is 9 sec with signal to noise ratio 23 dB. For inage of size 512×512 the reconstruction time is 15 sec with signal to noise ratio as 26dB. This gives the opportunity to build CS hardware as an alternative for ADC.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123189533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Acquisition Model for Road Profiling and Its Statistical Validation 道路轮廓数据采集模型及其统计验证
Sanjay Eligar, R. Banakar
{"title":"Data Acquisition Model for Road Profiling and Its Statistical Validation","authors":"Sanjay Eligar, R. Banakar","doi":"10.1109/ICEECCOT43722.2018.9001520","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001520","url":null,"abstract":"Road profile data is often used to test the performance of automotive control designs early in the system design cycle. Road profile data can be either directly measured or it can be estimated using hardware-in-loop or software-in-loop techniques. There is a need to devise a low cost alternative to collect road profile data for testing of semi-active suspension control systems. This paper presents a cost-effective direct road profile measurement system using ultrasonic sensors and embedded microcontroller. Any data collected using different techniques has to be validated using statistical tools before being used. This paper presents 3 Sigma method to identify errors in the data sets with case study and also identify methods of repairing the data sets. Further to check whether the data set is in agreement to the expected distribution, Chi-Square test is used and the results indicate that the hypothesis is true for most data sets.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123674309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Designing a Controller Circuit for Three Phase Inverter in PV application 光伏应用中三相逆变器控制电路设计
T. Bhattacharjee, M. Jamil, A. Jana
{"title":"Designing a Controller Circuit for Three Phase Inverter in PV application","authors":"T. Bhattacharjee, M. Jamil, A. Jana","doi":"10.1109/ICEECCOT43722.2018.9001638","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001638","url":null,"abstract":"In this paper a three phase voltage source inverter (VSI) has been simulated with controller circuit that can be used in future for hardware implementation using dSPACE 1104 controller in photovoltaic application. The dSPACE controller can be used, as it can link the MATLAB Simulink model directly into a real time operating prototype. The switching of IGBTs will be controlled by generating sinusoidal pulse width modulation (SPWM) signals with proportional integral (PI) controller circuit and parks transformation. The three phase inverter ac output voltage will be stabilized with the help of controller circuit attached to it in simulation model. Here DC voltage source is taken as the photovoltaic generator that supplying power to the three phase inverter. With this model the simulation output is showing a result of 2.83% of total harmonic distortion and supports that the controller circuit used is improving inverter ac voltage output to a great extent. This control system can be transformed into a prototype model with the dSPACE controller board as suggested in this paper.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121045549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Cluster-tree based Topology Control for Wireless Sensor Network 基于聚类树的无线传感器网络拓扑控制
H. Kelagadi, Priyatam Kumar
{"title":"A Cluster-tree based Topology Control for Wireless Sensor Network","authors":"H. Kelagadi, Priyatam Kumar","doi":"10.1109/ICEECCOT43722.2018.9001417","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001417","url":null,"abstract":"Wireless Sensor Network (WSN) is found to be one of the attractive research fields. The energy resource of each node in the WSN being limited, minimization of energy consumption is an important aspect. Therefore design of an energy efficient algorithm is of a major concern to enhance the network lifetime and performance. Here we present a clustering-tree protocol which takes an advantage in terms of clustering and tree management. This approach helps in controlling the topology of the network where the nodes are grouped together to form clusters and maintain a geographically close relation between the intermediate clusters. A node weighing higher based on its available energy level and its distance to the member nodes is selected as cluster head (CH). In the usual case of clustering the energy consumption of CH is more as it involves in several tasks like data collection from other in-cluster nodes, data aggregation and data transfer to base station or other clusters which may lead to sooner energy depletion and may require frequent change in the CHs. Here we introduce the concept of assistant cluster head (ACH) which acts as a support to the CH in carrying out several tasks of the CH thus maintaining the cluster with same CH for a considerable amount of time. The simulated results show that the algorithm provides better QoS with respect to delay and network lifetime as compared to LEACH and CTEF algorithms.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114456747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信