2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)最新文献

筛选
英文 中文
Fuzzy logic based AGC regulators for power system with asynchronous tie-lines incorporating parametric uncertainties 含参数不确定性的异步联络线系统基于模糊逻辑的AGC调节器
Ibraheem, N. Hasan, O. Singh
{"title":"Fuzzy logic based AGC regulators for power system with asynchronous tie-lines incorporating parametric uncertainties","authors":"Ibraheem, N. Hasan, O. Singh","doi":"10.1109/ICCCT.2011.6075201","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075201","url":null,"abstract":"A fuzzy logic based approach for the design of optimal automatic generation controllers of three area interconnected power system is proposed in this paper. A three area interconnected power system model consisting of identical power plants with reheat thermal turbines is considered as a test system. The HVDC link in parallel with EHV AC transmission line is incorporated as an area interconnection also. The studies are performed with implementing designed optimal AGC regulators on the system in the wake of 1% load perturbation in the area-1. The effect of variation in system parameters like; B and R is also studied. Simulation results indicate that the proposed optimal AGC regulators designs based on fuzzy logic concept offer appreciably better dynamic system performance and can guarantee the overall system stability even in the presence of system parameter variations.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123321864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RSA algorithm using modified subset sum cryptosystem RSA算法采用改进的子集和密码系统
Sonal Sharma, Prashant Sharma, R. Dhakar
{"title":"RSA algorithm using modified subset sum cryptosystem","authors":"Sonal Sharma, Prashant Sharma, R. Dhakar","doi":"10.1109/ICCCT.2011.6075138","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075138","url":null,"abstract":"RSA is the asymmetric cryptography system. The security of RSA public key cryptosystem is based on the assumption that factoring of a large number (modulus) is difficult. In RSA if one can factor modulus into its prime numbers then the private key is also detected and hence the security of the cryptosystem is broken. The Subset-Sum cryptosystem (Knapsack Cryptosystem) is also an asymmetric cryptographic technique. The Merkle-Hellman system is based on the subset sum problem (a special case of the knapsack problem): given a list of numbers and a third number, which is the sum of a subset of these numbers, determine the subset. In general, this problem is known to be NP-complete. However, if the set of numbers (called the knapsack) is superincreasing, that is, each element of the set is greater than the sum of all the numbers before it, the problem is ‘easy’ and solvable in polynomial time with a simple greedy algorithm. So in this paper a Modified Subset-Sum over RSA Public key cryptosystem (MSSRPKC) is presented which is secure against Mathematical and brute-force attacks on RSA as well as Shamir attacks. This paper also presents comparison between MSSRPKC and RSA cryptosystems in respect of security and performance.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124646716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
MO-CCCCTA based PID controller employing grounded passive elements 基于MO-CCCCTA的PID控制器,采用接地无源元件
N. Pandey, P. Arora, S. Kapur, Shivam Sharma
{"title":"MO-CCCCTA based PID controller employing grounded passive elements","authors":"N. Pandey, P. Arora, S. Kapur, Shivam Sharma","doi":"10.1109/ICCCT.2011.6075115","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075115","url":null,"abstract":"In this paper a voltage-mode proportional plus integral plus derivative (PID) controller employing the Multiple output current controlled current conveyor transconductance amplifier (MO-CCCCTA) as an active elements is presented. The circuit developed is capable of realizing independently adjustable PID parameters. The PID controller uses grounded passive elements and it does not need any passive element matching. This makes it possible to implement these PID controllers in integrated circuits easily. Computer simulations are also shown that demonstrate the behavior of this proposed PID controller.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114807504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Design of web data mining in agents based e-commerce 基于代理的电子商务中web数据挖掘的设计
Shakti Kundu
{"title":"Design of web data mining in agents based e-commerce","authors":"Shakti Kundu","doi":"10.1109/ICCCT.2011.6075208","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075208","url":null,"abstract":"Due to the explosive growth of information sources available on the World Wide Web, it has become increasingly necessary for users to utilize automated tools and design in finding the desired information resources. Web Mining can be broadly defined as extraction of interesting and potentially useful patterns and implicit information from artifacts or activity related to the World Wide Web. In this paper role of multi agent system in an e-commerce environment proposes the web data mining as an intelligent system and makes research and discussion on data resources, key technology in relation to the design.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123959614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel short term prediction method for speech using Haar based time varying models 基于Haar时变模型的语音短期预测方法
Deepak Joy, R. Kumar, S. Pathak
{"title":"A novel short term prediction method for speech using Haar based time varying models","authors":"Deepak Joy, R. Kumar, S. Pathak","doi":"10.1109/ICCCT.2011.6075174","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075174","url":null,"abstract":"Speech is a non-stationary signal. The non-stationarity of the speech arises from emotional variations, speaker and environment variations. Almost all of the speech coding standards available today rely on stationary models for the modelling of time varying parameters of the speech generation model which affects the perceptional quality of the coded speech. Physically non-stationarity can be interpreted as the manifestation of the time varying nature of the speech generation source-the vocal tract. The vocal tract can be roughly modelled as a Autoregressive (AR) filter(all pole model). The time varying nature of the vocal tract corresponds to the time-varying AR parameters. The time varying AR parameters are expressed as the sum of Haar wavelets. Thus the estimation of time varying AR parameters boils down to that of finding the time invariant coefficients of the Haar wavelet basis functions. Here we propose a variable bit rate codec which attempts to bring in the non stationary modelling of the time varying AR parameters of the speech. Further long term prediction(LTP) and AbS method can be incorporated to develop a codec using this short term prediction method. It can be seen that the Haar wavelet based speech coding method over-performs the traditional method.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121115545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Different similarity measures for text classification using KNN 基于KNN的文本分类的不同相似度度量
M. A. Wajeed, T. Adilakshmi
{"title":"Different similarity measures for text classification using KNN","authors":"M. A. Wajeed, T. Adilakshmi","doi":"10.1109/ICCCT.2011.6075188","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075188","url":null,"abstract":"Present days humans are associated with many electronic gadgets which generate large amount of data on regular basis. The sole purpose of generated data was to meet the immediate needs and no attempt in organizing the data for later efficient retrieval was attempted. Over the period of time, the data generated became voluminous, this paper attempts to classify the huge data into different categories for easy retrieval. We have many techniques to classify the data which exists in the structured format, but not much work has been addressed when the data is available in textual form. In the present paper an attempt to classify the textual data based on its content is explored. The paper explores the process of building multi-classifier model for textual data. In the process of designing the model the K-Nearest Neighbour paradigm was employed, which has given encouraging results. The paper also attempts to explore different similarity measures, different feature selection techniques in the process of designing textual multi-classification.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116772128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Detection and classification of faults on six phase transmission line using ANN 基于神经网络的六相输电线路故障检测与分类
Ebha Koley, Anamika Jain, A. S. Thoke, Abhinav Jain, Subhojit Ghosh
{"title":"Detection and classification of faults on six phase transmission line using ANN","authors":"Ebha Koley, Anamika Jain, A. S. Thoke, Abhinav Jain, Subhojit Ghosh","doi":"10.1109/ICCCT.2011.6075177","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075177","url":null,"abstract":"The demand of electrical energy is continuously increasing. High phase order transmission system is a viable alternative due to increasing costs of right of way. Six phase transmission lines can carry more power for same phase to phase voltage with the same right of way economically. Protection of six phase transmission lines has been a very challenging task. Earlier simulations of six phase transmission line have been done in PSCAD/EMTDC software. In this paper MATLAB® software and its associated Simulink® and Simpowersystem® toolboxes have been used to simulate the six phase transmission line. Application of Artificial Neural Network for protection of six phase transmission line against ground faults is presented, which the authors believe has not been reported earlier. Fundamental components of six phase voltages and currents have been used as inputs for training of the artificial neural network for detection and classification of faulted phase using neural network toolbox of MATLAB®. A sample 765 kV system of 60 km length has been selected for study. The study takes into account the effect of variation in fault inception angle, fault distance location and fault resistance. The results indicate the suitability of proposed technique and its adaptability to changing system conditions.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115942290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
A light-weight, dynamic call admission control for sudden user influx management 一个轻量级的动态呼叫允许控制,用于突然的用户涌入管理
R. Mishra, S. Choudhury, N. Chaki
{"title":"A light-weight, dynamic call admission control for sudden user influx management","authors":"R. Mishra, S. Choudhury, N. Chaki","doi":"10.1109/ICCCT.2011.6075123","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075123","url":null,"abstract":"Occasional user influx in a cell in a public place like a football stadium congests the network and even leads towards total disruption of services. However, for this temporary high user concentration, the service providers would not be interested in maintaining a huge infrastructure. This demands an efficient, provisional capacity enhancement technique without any additional infrastructure towards increasing service accessibility to maximum number of users. In this paper, an attempt has been made to propose a light weight call admission algorithm for increasing the number of admitted call in this type of constrained scenario. The proposed algorithm is supposed to work satisfactory for a GSM standard telephone network in terms of adaptability, number of admitted customer and the involved cost overhead.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123475221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reverse scheduling approach for burst loss minimization in WDM OBS based networks WDM OBS网络中突发损失最小化的逆向调度方法
L. Netak, G. Chowdhary, V. N. Suryawanshi, J. Borade
{"title":"Reverse scheduling approach for burst loss minimization in WDM OBS based networks","authors":"L. Netak, G. Chowdhary, V. N. Suryawanshi, J. Borade","doi":"10.1109/ICCCT.2011.6075184","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075184","url":null,"abstract":"In optical burst switched (OBS) networks burst scheduling is one of the key issue, which affects the burst loss in the optical networks. Scheduling algorithms utilizes wavelength channels by scheduling burst efficiently and reduces burst losses. Several types of scheduling algorithms such as horizon and void filling are used to schedule bursts. Horizon algorithms consider only unscheduled time whereas void filling algorithms consider time gap created by two successive scheduled burst on a channel. Horizon and void filling algorithms are simple and easy to implement but accounts in poor utilization of channels. In this paper, we present a novel approach for burst scheduling called reverse scheduling. In reverse scheduling normal flow of void filling algorithm is reversed for better utilization of channels capacity. Hence the effect of dropping probability can be studied through the analytical and simulation experiments.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128597831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security mechanism for C-Governance using Hadamard matrices 使用Hadamard矩阵的c -治理安全机制
K. Mukherjee, Gadadhar Sahoo
{"title":"Security mechanism for C-Governance using Hadamard matrices","authors":"K. Mukherjee, Gadadhar Sahoo","doi":"10.1109/ICCCT.2011.6075133","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075133","url":null,"abstract":"Cloud Computing has started an era of “shared based IT infrastructure”, in which large pools of computer systems are linked together to provide IT services on “pay per user basis”. It uses virtual resources and hence is not limited by the power and capabilities of local or remote computers. It transforms computer processing, data storage, and software applications, allowing them to be delivered as a utility to end users. But the overall technology is in its nascent stage of progression. There are lots of key issues like security, job scheduling, availability etc; which are to be addressed in order to make it a “mature technology”. Again we observe that for running Government machinery smoothly and transparently, e-Governance plays a significant role in it. But establishment of e-Governance is a costly affair. So, we propose a cloud computing based e-Governance i.e. C-Governance, for better execution of Government machinery at a lower cost compared to traditional e-Governance architecture. But the implementation of C-Governance needs strong security mechanism because the sensitive data goes beyond the boundary of Government organization. In this endeavor, we intend to throw light on security aspect of C-Governance using Hadamard matrices.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"30 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123776872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信