2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)最新文献

筛选
英文 中文
Modelling and Control of Three-link Planar Robot for Stable Walking Gait 平面三连杆机器人稳定行走步态建模与控制
Sreeja Kochuvila, Vardhan H. R Nandi
{"title":"Modelling and Control of Three-link Planar Robot for Stable Walking Gait","authors":"Sreeja Kochuvila, Vardhan H. R Nandi","doi":"10.1109/ICEECCOT43722.2018.9001439","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001439","url":null,"abstract":"Control of a passive walking robot has been a challenging problem in energy efficient two-legged robot. This paper proposes the modelling and control for a passive walking planar robot to achieve stable walking with an additional link representing the upper body. The dynamic model for a three-link planar robot under consideration is derived for both walking phase and during impact. The dynamics is used along with suitable initial conditions to generate the reference trajectory for stable walking. The results show that the robot follows the generated reference trajectory with the use of a controller developed using feedback linearization control law. The proposed controller is studied and validated using simulations and it is observed that the walking trajectory converges to a stable limit cycle. Thus the model can be extended to realize energy efficient walking of a biped robot with upper body mass.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117235135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault Analysis and Predictive Maintenance of Induction Motor Using Machine Learning 基于机器学习的感应电机故障分析与预测性维护
V. Kavana, M. Neethi
{"title":"Fault Analysis and Predictive Maintenance of Induction Motor Using Machine Learning","authors":"V. Kavana, M. Neethi","doi":"10.1109/ICEECCOT43722.2018.9001543","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001543","url":null,"abstract":"Induction motors are one of the most crucial electrical equipment and are extensively used in industries in a wide range of applications. This paper presents a machine learning model for the fault detection and classification of induction motor faults by using three phase voltages and currents as inputs. The aim of this work is to protect vital electrical components and to prevent abnormal event progression through early detection and diagnosis. This work presents a fast forward artificial neural network model to detect some of the commonly occurring electrical faults like overvoltage, under voltage, single phasing, unbalanced voltage, overload, ground fault. A separate model free monitoring system wherein the motor itself acts like a sensor is presented and the only monitored signals are the input given to the motor. Limits for current and voltage values are set for the faulty and healthy conditions, which is done by a classifier. Real time data from a 0.33 HP induction motor is used to train and test the neural network. The model so developed analyses the voltage and current values given at a particular instant and classifies the data into no fault or the specific fault. The model is then interfaced with a real motor to accurately detect and classify the faults so that further necessary action can be taken.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115826818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Analysis of Teacher-Student Learning Style on Student Feedback Using Manhattan Algorithm 基于学生反馈的师生学习风格分析
V. Deshmukh, K. Vivek, S. Mangalwede, D. H. Rao
{"title":"Analysis of Teacher-Student Learning Style on Student Feedback Using Manhattan Algorithm","authors":"V. Deshmukh, K. Vivek, S. Mangalwede, D. H. Rao","doi":"10.1109/ICEECCOT43722.2018.9001512","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001512","url":null,"abstract":"This paper makes an attempt to implement learning style theory namely Visual, Auditory/Audio and Kinesthetic in technical institutes to make learning an enjoyable experience and student centric. The students learn in different ways and the teacher needs to design their course to meet these requirements of the students. The purpose of this investigation is to determine the learning style of the student and of the teacher and find the correlation between them. This will provide a way to approach students' needs and deliver the course content appropriately. Here learning styles of 44 students and the teacher who is teaching one of the courses is determined. The feedback was collected from students in order to compare the effectiveness of teaching in class. The experimental results indicate that when there is similarity between teacher and student learning style, the outcome is positive. Here VAK Learning Style (VAKLS) inventory developed by Victoria Chisslet is used. The Manhattan distance is measured to compare similarity in learning styles using Python 3.6 and feedback analysis is done with a standard formula.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116001525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Control Strategy to Enhance Power Capability of Power Conditioning Unit During FRT 提高电力调节机组FRT功率能力的控制策略
N. Kulkarni, V. Virulkar
{"title":"Control Strategy to Enhance Power Capability of Power Conditioning Unit During FRT","authors":"N. Kulkarni, V. Virulkar","doi":"10.1109/ICEECCOT43722.2018.9001357","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001357","url":null,"abstract":"A control strategy that enhances power capability of power conditioning (PCU) by injecting maximum rated current during fault ride through (FRT) is presented in this paper. To attain proposed strategy, two active power production situations like high and low are considered. In first situation, if source supply is not able to supply complete generated power to grid, controller applies active power curtailment ensuring maximum rated current isn't surpassed. If peak value of permissible current is not attained then, control scheme determines reactive power injected to a desired value; in next situation. A current injection technique to achieve a contrast amongst positive and negative current to limit output current of PCU to its peak rated value and obviates active power oscillations. A simulation carried out to verify proposed method suggested.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125667693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient-CSDA (Consensus based) Approach to Achieve Secure Data Aggregation 实现安全数据聚合的高效csda(基于共识)方法
S. Swathi, H. Yogish
{"title":"Efficient-CSDA (Consensus based) Approach to Achieve Secure Data Aggregation","authors":"S. Swathi, H. Yogish","doi":"10.1109/ICEECCOT43722.2018.9001390","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001390","url":null,"abstract":"IoT has become one of the eminent technology when it comes to monitoring, industrial applications, surveillance and other area. As with the rapid development in the IoT, there is also rapid and parallel growth of WSN, which is one of the primary component of the IoT technology. Considering the large network in WSN, the DA (Data Aggregation) minimizes the Energy Consumption as well as the communication held between the nodes. Data Aggregation is a method where the data originated from the various sensor is integrated and transmitted. However, when these sensor networks are deployed in the hostile environment, the security concern becomes vital, like how to ensure the robustness, accuracy and privacy in presence of corrupt nodes. Hence, several existing system such as PP-AC algorithm and others have been proposed to provide the secure data aggregation but the performance of these algorithm is not satisfactory. Hence, we proposed a novel algorithm known as Efficient-CSDA (Consensus based data aggregation) algorithm is presented. Our algorithm allows the neighbouring node to detect the dishonest nodes. Proposed algorithm is evaluated and to prove our accuracy we compared the simulated result with the PP-AC algorithm. The comparison between two algorithms clearly shows that our algorithm outperforms the existing one.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130669218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Face and Iris Wavelet Feature Fusion through Canonical Correlation Analysis for Person Identification 基于典型相关分析的人脸和虹膜小波特征融合人脸识别
S. Angadi, Vishwanath C. Kagawade
{"title":"Face and Iris Wavelet Feature Fusion through Canonical Correlation Analysis for Person Identification","authors":"S. Angadi, Vishwanath C. Kagawade","doi":"10.1109/ICEECCOT43722.2018.9001636","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001636","url":null,"abstract":"The paper presents, a new technique for person identification using feature level fusion of face and iris biometric features. The fusion technique employed in the proposed work uses wavelet features of face and iris modalities. Canonical Correlation Analysis (CCA) technique is used to fuse face and iris wavelet features. CCA is a technique for extracting linearly correlated face or iris features from set of features of face or iris images. The technique is able to extract and enhance the discriminative power for high dimensional feature space for person identification from multi-feature information of face and iris. The experimental results on both synthetic and genuine multimodal data sets of face and iris features using SVM classifier validate the effectiveness of the proposed method. The proposed face and iris multimodal biometric system has achieved 100% recognition accuracy on VISA Face + VISA Iris, ORL+ VISA Iris, LFW + VISA Iris, VISA Face + CASIA, ORL+ CASIA and LFW + CASIA face and iris datasets.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133575850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enhancement of Network Lifetime by Topology Control Based on Location in MANET 基于位置的MANET拓扑控制提高网络生存期
S. Kabbur, G. F. A. Ahammed, Reshma Banu
{"title":"Enhancement of Network Lifetime by Topology Control Based on Location in MANET","authors":"S. Kabbur, G. F. A. Ahammed, Reshma Banu","doi":"10.1109/ICEECCOT43722.2018.9001318","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001318","url":null,"abstract":"The objective of topology control in MANET is to reduce the transmission power at each node in order to sustain the network topology and energy conservation as well. Controlling the transmission radii of nodes decreases the radio interference which in turn increases the spatial reuse of channel. The location of neighbour and direction are obtained by Global Positioning System (GPS) and angle of arrival. To reduce the hardware cost, only group of nodes are fitted with GPS device while other nodes get receive information about location form these nodes. Several protocols based on location for the topology control have been proposed. Extensive simulation is carried out and compared our proposed scheme with the existing protocols. The simulation results confirm that the proposed scheme out performs in terms of throughput and end to end delay.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134289925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RTT Centered Automatic and Dynamic Wormhole Attack Discovery in Sensor Network 基于RTT的传感器网络自动动态虫洞攻击发现
Sharada M Kori, G. Krishnamurthy, N. Sidnal
{"title":"RTT Centered Automatic and Dynamic Wormhole Attack Discovery in Sensor Network","authors":"Sharada M Kori, G. Krishnamurthy, N. Sidnal","doi":"10.1109/ICEECCOT43722.2018.9001597","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001597","url":null,"abstract":"Sensor systems are acquiring more fame because of their wide range of applications like process automation, environment (habitat) monitoring, seismic monitoring, and battlefield surveillance. Though they are popular because of their applications, they do come with various challenges like random deployment of nodes, limited energy, computation and memory. Apart from these challenges, the most critical aspect to handle is security. Information is exchanged in Wireless Sensor Networks (WSNs) between the nodes through wireless links in “air” through electromagnetic waves. This feature attracts the invaders to steal data, disrupt the normal system action by disturbing the data flow and so on. WSNs are prone to attacks at various layers of networks like jamming, denial of service, sinkhole, black hole, wormhole to name a few. Each attack is characterized by its own consequences. Various countermeasures are proposed to defend against these various attacks. Out of these attacks, we pick up wormhole attack at network layer because of its unique nature. Wormhole attack can be launched in the network even if the network is secured with cryptographic techniques. In this paper we address wormhole attack by proposing a RTT centered Wormhole Outbreak discovery. Our proposed system is simple with no extra hardware requirement and no tight clock synchronization.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132793767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Frequency Sampling method of FIR Filter design: A comparative study FIR滤波器设计中频率采样方法的比较研究
K. Pushpavathi, B. Kanmani
{"title":"Frequency Sampling method of FIR Filter design: A comparative study","authors":"K. Pushpavathi, B. Kanmani","doi":"10.1109/ICEECCOT43722.2018.9001661","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001661","url":null,"abstract":"In this paper, attempt is made to study the frequency sampling method of FIR (Finite Impulse Response) filter design in comparison with rectangular window method. The design methods are studied for the cases of the low pass filter, high pass filter and for an arbitrary response filter. The paper demonstrates that the method proposed here is the simplest way of designing any arbitrary response filter.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129504597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Intent Detection for code-mix utterances in task oriented dialogue systems 面向任务对话系统中混码话语的意图检测
P. Jayarao, Aman Srivastava
{"title":"Intent Detection for code-mix utterances in task oriented dialogue systems","authors":"P. Jayarao, Aman Srivastava","doi":"10.1109/ICEECCOT43722.2018.9001577","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001577","url":null,"abstract":"Intent detection is an essential component of task oriented dialogue systems. Over the years, extensive research has been conducted resulting in many state of the art models directed towards resolving user's intents in dialogue. A variety of vector representation for user utterances have been explored for the same. However, these models and vectorization approaches have more so been evaluated in a single language environment. Dialogue systems generally have to deal with queries in different languages and most importantly Code-Mix form of writing. Since Code-Mix texts are not bounded by a formal structure they are difficult to handle. We thus conduct experiments across combinations of models and various vector representations for Code-Mix as well as multi-language utterances and evaluate how these models scale to a multi-language environment. Our aim is to find the best suitable combination of vector representation and models for the process of intent detection for code-mix utterances. We have evaluated the experiments on two different dataset consisting of only Code-Mix utterances and the other dataset consisting of English, Hindi, and Code-Mix(English-Hindi) utterances.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124223449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信