{"title":"Fuzzy logic based AGC regulators for power system with asynchronous tie-lines incorporating parametric uncertainties","authors":"Ibraheem, N. Hasan, O. Singh","doi":"10.1109/ICCCT.2011.6075201","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075201","url":null,"abstract":"A fuzzy logic based approach for the design of optimal automatic generation controllers of three area interconnected power system is proposed in this paper. A three area interconnected power system model consisting of identical power plants with reheat thermal turbines is considered as a test system. The HVDC link in parallel with EHV AC transmission line is incorporated as an area interconnection also. The studies are performed with implementing designed optimal AGC regulators on the system in the wake of 1% load perturbation in the area-1. The effect of variation in system parameters like; B and R is also studied. Simulation results indicate that the proposed optimal AGC regulators designs based on fuzzy logic concept offer appreciably better dynamic system performance and can guarantee the overall system stability even in the presence of system parameter variations.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123321864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RSA algorithm using modified subset sum cryptosystem","authors":"Sonal Sharma, Prashant Sharma, R. Dhakar","doi":"10.1109/ICCCT.2011.6075138","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075138","url":null,"abstract":"RSA is the asymmetric cryptography system. The security of RSA public key cryptosystem is based on the assumption that factoring of a large number (modulus) is difficult. In RSA if one can factor modulus into its prime numbers then the private key is also detected and hence the security of the cryptosystem is broken. The Subset-Sum cryptosystem (Knapsack Cryptosystem) is also an asymmetric cryptographic technique. The Merkle-Hellman system is based on the subset sum problem (a special case of the knapsack problem): given a list of numbers and a third number, which is the sum of a subset of these numbers, determine the subset. In general, this problem is known to be NP-complete. However, if the set of numbers (called the knapsack) is superincreasing, that is, each element of the set is greater than the sum of all the numbers before it, the problem is ‘easy’ and solvable in polynomial time with a simple greedy algorithm. So in this paper a Modified Subset-Sum over RSA Public key cryptosystem (MSSRPKC) is presented which is secure against Mathematical and brute-force attacks on RSA as well as Shamir attacks. This paper also presents comparison between MSSRPKC and RSA cryptosystems in respect of security and performance.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124646716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MO-CCCCTA based PID controller employing grounded passive elements","authors":"N. Pandey, P. Arora, S. Kapur, Shivam Sharma","doi":"10.1109/ICCCT.2011.6075115","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075115","url":null,"abstract":"In this paper a voltage-mode proportional plus integral plus derivative (PID) controller employing the Multiple output current controlled current conveyor transconductance amplifier (MO-CCCCTA) as an active elements is presented. The circuit developed is capable of realizing independently adjustable PID parameters. The PID controller uses grounded passive elements and it does not need any passive element matching. This makes it possible to implement these PID controllers in integrated circuits easily. Computer simulations are also shown that demonstrate the behavior of this proposed PID controller.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114807504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of web data mining in agents based e-commerce","authors":"Shakti Kundu","doi":"10.1109/ICCCT.2011.6075208","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075208","url":null,"abstract":"Due to the explosive growth of information sources available on the World Wide Web, it has become increasingly necessary for users to utilize automated tools and design in finding the desired information resources. Web Mining can be broadly defined as extraction of interesting and potentially useful patterns and implicit information from artifacts or activity related to the World Wide Web. In this paper role of multi agent system in an e-commerce environment proposes the web data mining as an intelligent system and makes research and discussion on data resources, key technology in relation to the design.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123959614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel short term prediction method for speech using Haar based time varying models","authors":"Deepak Joy, R. Kumar, S. Pathak","doi":"10.1109/ICCCT.2011.6075174","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075174","url":null,"abstract":"Speech is a non-stationary signal. The non-stationarity of the speech arises from emotional variations, speaker and environment variations. Almost all of the speech coding standards available today rely on stationary models for the modelling of time varying parameters of the speech generation model which affects the perceptional quality of the coded speech. Physically non-stationarity can be interpreted as the manifestation of the time varying nature of the speech generation source-the vocal tract. The vocal tract can be roughly modelled as a Autoregressive (AR) filter(all pole model). The time varying nature of the vocal tract corresponds to the time-varying AR parameters. The time varying AR parameters are expressed as the sum of Haar wavelets. Thus the estimation of time varying AR parameters boils down to that of finding the time invariant coefficients of the Haar wavelet basis functions. Here we propose a variable bit rate codec which attempts to bring in the non stationary modelling of the time varying AR parameters of the speech. Further long term prediction(LTP) and AbS method can be incorporated to develop a codec using this short term prediction method. It can be seen that the Haar wavelet based speech coding method over-performs the traditional method.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121115545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Different similarity measures for text classification using KNN","authors":"M. A. Wajeed, T. Adilakshmi","doi":"10.1109/ICCCT.2011.6075188","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075188","url":null,"abstract":"Present days humans are associated with many electronic gadgets which generate large amount of data on regular basis. The sole purpose of generated data was to meet the immediate needs and no attempt in organizing the data for later efficient retrieval was attempted. Over the period of time, the data generated became voluminous, this paper attempts to classify the huge data into different categories for easy retrieval. We have many techniques to classify the data which exists in the structured format, but not much work has been addressed when the data is available in textual form. In the present paper an attempt to classify the textual data based on its content is explored. The paper explores the process of building multi-classifier model for textual data. In the process of designing the model the K-Nearest Neighbour paradigm was employed, which has given encouraging results. The paper also attempts to explore different similarity measures, different feature selection techniques in the process of designing textual multi-classification.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116772128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ebha Koley, Anamika Jain, A. S. Thoke, Abhinav Jain, Subhojit Ghosh
{"title":"Detection and classification of faults on six phase transmission line using ANN","authors":"Ebha Koley, Anamika Jain, A. S. Thoke, Abhinav Jain, Subhojit Ghosh","doi":"10.1109/ICCCT.2011.6075177","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075177","url":null,"abstract":"The demand of electrical energy is continuously increasing. High phase order transmission system is a viable alternative due to increasing costs of right of way. Six phase transmission lines can carry more power for same phase to phase voltage with the same right of way economically. Protection of six phase transmission lines has been a very challenging task. Earlier simulations of six phase transmission line have been done in PSCAD/EMTDC software. In this paper MATLAB® software and its associated Simulink® and Simpowersystem® toolboxes have been used to simulate the six phase transmission line. Application of Artificial Neural Network for protection of six phase transmission line against ground faults is presented, which the authors believe has not been reported earlier. Fundamental components of six phase voltages and currents have been used as inputs for training of the artificial neural network for detection and classification of faulted phase using neural network toolbox of MATLAB®. A sample 765 kV system of 60 km length has been selected for study. The study takes into account the effect of variation in fault inception angle, fault distance location and fault resistance. The results indicate the suitability of proposed technique and its adaptability to changing system conditions.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115942290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A light-weight, dynamic call admission control for sudden user influx management","authors":"R. Mishra, S. Choudhury, N. Chaki","doi":"10.1109/ICCCT.2011.6075123","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075123","url":null,"abstract":"Occasional user influx in a cell in a public place like a football stadium congests the network and even leads towards total disruption of services. However, for this temporary high user concentration, the service providers would not be interested in maintaining a huge infrastructure. This demands an efficient, provisional capacity enhancement technique without any additional infrastructure towards increasing service accessibility to maximum number of users. In this paper, an attempt has been made to propose a light weight call admission algorithm for increasing the number of admitted call in this type of constrained scenario. The proposed algorithm is supposed to work satisfactory for a GSM standard telephone network in terms of adaptability, number of admitted customer and the involved cost overhead.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123475221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Netak, G. Chowdhary, V. N. Suryawanshi, J. Borade
{"title":"Reverse scheduling approach for burst loss minimization in WDM OBS based networks","authors":"L. Netak, G. Chowdhary, V. N. Suryawanshi, J. Borade","doi":"10.1109/ICCCT.2011.6075184","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075184","url":null,"abstract":"In optical burst switched (OBS) networks burst scheduling is one of the key issue, which affects the burst loss in the optical networks. Scheduling algorithms utilizes wavelength channels by scheduling burst efficiently and reduces burst losses. Several types of scheduling algorithms such as horizon and void filling are used to schedule bursts. Horizon algorithms consider only unscheduled time whereas void filling algorithms consider time gap created by two successive scheduled burst on a channel. Horizon and void filling algorithms are simple and easy to implement but accounts in poor utilization of channels. In this paper, we present a novel approach for burst scheduling called reverse scheduling. In reverse scheduling normal flow of void filling algorithm is reversed for better utilization of channels capacity. Hence the effect of dropping probability can be studied through the analytical and simulation experiments.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128597831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security mechanism for C-Governance using Hadamard matrices","authors":"K. Mukherjee, Gadadhar Sahoo","doi":"10.1109/ICCCT.2011.6075133","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075133","url":null,"abstract":"Cloud Computing has started an era of “shared based IT infrastructure”, in which large pools of computer systems are linked together to provide IT services on “pay per user basis”. It uses virtual resources and hence is not limited by the power and capabilities of local or remote computers. It transforms computer processing, data storage, and software applications, allowing them to be delivered as a utility to end users. But the overall technology is in its nascent stage of progression. There are lots of key issues like security, job scheduling, availability etc; which are to be addressed in order to make it a “mature technology”. Again we observe that for running Government machinery smoothly and transparently, e-Governance plays a significant role in it. But establishment of e-Governance is a costly affair. So, we propose a cloud computing based e-Governance i.e. C-Governance, for better execution of Government machinery at a lower cost compared to traditional e-Governance architecture. But the implementation of C-Governance needs strong security mechanism because the sensitive data goes beyond the boundary of Government organization. In this endeavor, we intend to throw light on security aspect of C-Governance using Hadamard matrices.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"30 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123776872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}