2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)最新文献

筛选
英文 中文
A novel approach for detecting facial image spoofing using local ternary pattern 一种利用局部三元模式检测人脸图像欺骗的新方法
M. Diviya, Susmita Mishra
{"title":"A novel approach for detecting facial image spoofing using local ternary pattern","authors":"M. Diviya, Susmita Mishra","doi":"10.1109/ICONSTEM.2016.7560924","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560924","url":null,"abstract":"Biometrie spoofing is widely understood as the ability to fool a biometric system in recognizing an illegitimate user as a genuine one. To keep a goodlevel of security, reliable spoofing detection tools are necessary. Immense growth of technology permitted the use of biometrics in diverse fields such as forensics, access control, surveillance or online commerce. The new biometric paradigm has transformed passwords and cards into human as the best key. The proposed approach considers facial texture as a feature. Further the microtextural features of the facial images are extracted using Local Ternary Pattern approach and the extracted Local Ternary patterns are converted into upper pattern and lower pattern. Further the patterns are used to generate histograms. The feature histograms are fed into SVM classifier to classify the features from which the outlier is detected i.e whether any spoofing is done with the image or it is a real image.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"1 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133135145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Computerized filling station management system 电脑化加油站管理系统
R. Gnanavel, P Deepak, B. P. Kumaar, Jason Bakthakumar
{"title":"Computerized filling station management system","authors":"R. Gnanavel, P Deepak, B. P. Kumaar, Jason Bakthakumar","doi":"10.1109/ICONSTEM.2016.7560919","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560919","url":null,"abstract":"In the current scenario, replacing the human efforts into automated digitalized mechanism has become a vast growing factor. Human race has become far more independent than they were in the past. Every field has reached their goal of user friendly, in which the actions of a person are controlled by software. However, this is not applied in most of the petrol bunks. Normally in petrol bunks there is a Human to Human interaction. Our project is to overcome this phenomenon by bringing the interaction between Human and Software. By following this mechanism, we can avoid all the errors that a human does and also avoid the cheating activities that a culprit laborer performs in his work. Our project idea is to make the entire process performed by human laborer in a Filling Station into automated digitalized mechanism to avoid small errors and cheats that can be performed by the laborer to their owners. Our system consists of RFID READER to be placed in the Filling Station and all the vehicles must be provided with RFID TAGS. When the RFID READER senses the RFID TAG that holds the customer id, it sends the id to the centralized server, verifies the ID and opens the gate, the database in the centralized server consist of all banking details of the customer that can be fetched automatically after the confirmation of the user for the cost of the fuel. At present using RFID technology in automating the filling station including the transaction process have created the idea that it is not secure, so we use advanced cryptographic techniques like Secure Socket Layer (SSL) cryptography. AES - Advanced Encryption Standard Symmetric Cryptography to make sure that the process is secured and efficient. All the customer's ID details and total amount of fuel dispensed from the filling station will also be stored in a separate database for the filling station owner's view and also sent to user's registered mobile number using GSM technology.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116891499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Checking falseness in outsourced data storage systems 检查外包数据存储系统的错误
D. Jayashree, K. Sivagami, T. Anju, G. Lavanya, S. Malini
{"title":"Checking falseness in outsourced data storage systems","authors":"D. Jayashree, K. Sivagami, T. Anju, G. Lavanya, S. Malini","doi":"10.1109/ICONSTEM.2016.7560920","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560920","url":null,"abstract":"Mobile Applications of cloud play stores have a tremendous growth nowadays. Numerous applications are available to schedule our day to day activities, checking emails, making conference calls, connect using social network and so on. As the technology grows the fraudulence of applications has also increased. Some Application developers use tricky measures to rank their applications in the top Applications list. For this purpose, a fraud detection mechanism is proposed to help the user about the false outsourced data that is the fraud applications. The detection mechanism is based on the aggregation of the download history, reviews, ratings and active periods of the mobile application. By means of this mechanism the factor of satisfiablity is ensured for the users and the genuine application developers.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130856774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An energy efficient grid based routing in mobile sink based wireless sensor networks 基于移动汇聚的无线传感器网络中基于节能网格的路由
Niraj B. Nake, P. Chatur
{"title":"An energy efficient grid based routing in mobile sink based wireless sensor networks","authors":"Niraj B. Nake, P. Chatur","doi":"10.1109/ICONSTEM.2016.7560872","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560872","url":null,"abstract":"Wireless sensor network is a popular and an emerging area of research for scientists. The network consists of a large number of devices called as sensor nodes or motes which are deployed over a particular area or region. Each node is well equipped with energy so as to interact actively in a network and participate in a data exchange over networks. The nodes in a network can be static or dynamic and they can send their data to a base station called as sink node. The mobility of a base station node will help effectively in optimizing energy efficiency and to increase lifetime of a network. A Grid based approach makes the division of entire sensor network field into several numbers of clusters also called as cells. A cluster head is chosen among each cluster which will be responsible in making an optimal path so as to communicate with mobile base station node. As the sink node is moving along the sensor field the route will be automatically updated which will require only minimum number of motes to update their packet delivery path towards sink node. The sink node can be moved with variable speed to add more flexibility in a network. Also, the participating nodes can send the data with variable transmission data rates so as to increase the lifetime of a network. We propose these two parameters so as to make the existing communication more efficient and flexible.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132098186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Role analysis for profile generation in heterogeneous social network 异构社会网络中人物档案生成的角色分析
R. Nishanthi, S. Karthika
{"title":"Role analysis for profile generation in heterogeneous social network","authors":"R. Nishanthi, S. Karthika","doi":"10.1109/ICONSTEM.2016.7560913","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560913","url":null,"abstract":"The social network is a powerful data structure allowing the study of relationship information between entities. The existing methods only rely on analyzing homogeneous social network assuming only a single type of node and relation. Though, real world complex networks are not so. Usually it is a heterogeneous social network which assumes a network with different types of nodes and relation. A Multi Relational Network (MRN) is used to describe the nodes and links in the form of a directional semantic graph where each node is related with more than one relationship with others. The profile for each node can be generated based on the relation sequence of each node. To analyze the relation of node in the heterogeneous social network, role analysis is done in the profile creation. The evaluations are conducted on a real-world movie dataset with promising results.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133746035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling, analysis and control of INOSLC (Improved Negative Output Super-Lift Luo Converter) using PI controller 利用PI控制器对INOSLC(改进型负输出超升力罗变换器)进行建模、分析和控制
J. B. Robin, V. Chamundeeswari
{"title":"Modeling, analysis and control of INOSLC (Improved Negative Output Super-Lift Luo Converter) using PI controller","authors":"J. B. Robin, V. Chamundeeswari","doi":"10.1109/ICONSTEM.2016.7560867","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560867","url":null,"abstract":"The proposed paper conveys the working of Improved Negative Output Super-Lift Luo converter (INOSLC) which is a modified version of Negative Output Super-lift Luo Converter(NOSLC). NOSLC is a type of DC-DC converter in which the negative output voltage increases in ten to hundred times the input voltage. INOSLC produces still high output than NOSLC with less number of charging components employed. Though the modified version produces enhanced output, it shows lot of non-linearities in it with supply and load changes. To meet the load demand and to have a good regulation at its output, the Proportional - Integral(PI) Controller is proposed here. The values of Kp and Ti in PI were tuned using Zeigler-Nichols Tuning method and are applied in the transfer function of the controller. The proposed converter is modelled and simulated using MATLAB and the simulation results are verified and validated with the theoretical calculations.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115186080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A comparative analysis on multilevel inverter with and without harmonics injection method 采用和不采用谐波注入法的多电平逆变器的对比分析
K. Pandian, P. Rajesh, J. Vinodhini
{"title":"A comparative analysis on multilevel inverter with and without harmonics injection method","authors":"K. Pandian, P. Rajesh, J. Vinodhini","doi":"10.1109/ICONSTEM.2016.7560869","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560869","url":null,"abstract":"In this paper, a comparative analysis of with and without injecting the harmonics in switching techniques for multilevel inverter was carried out. The multilevel inverter are said to be the power converter systems where the by controlling the power semiconductor sources properly a controlled multistep voltage waveform will generate. The first approach on multilevel inverter is carried out in Simulink by taking the sink without harmonics injection. The second approach injecting the harmonics in the multilevel inverter. These both are compared on the basis of their quality improve in output voltage and also the total harmonic reduction. This paper aims to extend the well developed knowledge about the performance of harmonic analysis. Simulation result for with and without harmonic injection method was carried out using MATLAB/Simulink.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114625755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open loop and closed loop comparision for single phase Cyclo converter (PID controller) 单相环控变换器(PID控制器)开环与闭环比较
K. Kamalesh, Polakamma Sriram Prasad Reddy, J. Vinodhini
{"title":"Open loop and closed loop comparision for single phase Cyclo converter (PID controller)","authors":"K. Kamalesh, Polakamma Sriram Prasad Reddy, J. Vinodhini","doi":"10.1109/ICONSTEM.2016.7560868","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560868","url":null,"abstract":"This paper compares the open loop and closed loop system for a single phase Cyclo converter. This paper compares the characteristics like mechanical, speed and torque characteristics of the open loop and closed loop system. In this paper PWM technique is employed along with cyclo converter using IGBT which increases the performance and control of the system. Special advantage of using IGBT in this topology to increases the dynamic characteristics and reduces the total harmonic distortion. The filters are used to reduce the primary harmonics of the system and the secondary or the higher level harmonics. The output for open loop and closed loop was carried out by using MATLAB Simulink. This appear proves the dramatic changes in cycloconverter when comparing with open loop and closed loop using PID controller.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124937547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mitigating insider data theft attacks in the cloud 减轻云中的内部数据盗窃攻击
R. Kowsik, L. Vignesh
{"title":"Mitigating insider data theft attacks in the cloud","authors":"R. Kowsik, L. Vignesh","doi":"10.1109/ICONSTEM.2016.7560956","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560956","url":null,"abstract":"Cloud computing promises to significantly change the way we use computers and access and store our personal and busi-ness information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. We propose a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user's real data. Experiments conducted in a local file setting provide evidence that this approach may provide unprecedented levels of user data security in a Cloud environment.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125021996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
27 Level/IGBT asymmetrical multilevel inverter using PWM for locomotives 机车用PWM的27电平/IGBT非对称多电平逆变器
J. Vinodhini, R. Babu
{"title":"27 Level/IGBT asymmetrical multilevel inverter using PWM for locomotives","authors":"J. Vinodhini, R. Babu","doi":"10.1109/ICONSTEM.2016.7560871","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560871","url":null,"abstract":"This paper presents a new twenty seven level cascaded H-bridge multi level inverter for locomotives. This proposed multi level inverter can overcome the need for a large number of electronic switches when the number of level increased. This proposed topology increases the efficiency of the inverter by reducing the switching losses using pulse width modulation technique. Recently in Japan they developed an advanced inverter drive system for bullet trains. By comparing all multilevel inverter topologies this proposed topology can achieve economic voltage control in locomotives which can reduce the total harmonic distortion in both electronic devices and traction motor in general. The proposed multilevel inverter and total harmonic distortion results with MATLAB software was described in this paper.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133583699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信