{"title":"Control technique for variable speed wind turbine using PI controller","authors":"S. Uma, S. Manikandan","doi":"10.1109/ICE-CCN.2013.6528578","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528578","url":null,"abstract":"This paper focuses on optimization algorithm of wind power tracking control system. Using the system to capture maximum wind power from the wind energy conversion system(WECS). The system consists of variable speed wind turbine with direct drive Permanent Magnet Synchronous Generator (PMSG). The simulation model is developed for the wind turbine power generation system to obtain maximum p o w e r from the incident wind. The PI controller along with Maximum Power Point Tracking (MPPT) is used in the model. The input voltage to the inverter was maintained. Simulation results show that the controller can extract maximum power.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124095202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematical modelling and speed control of a sensored brushless DC motor using intelligent controller","authors":"A. Kiruthika, A. Rajan, P. Rajalakshmi","doi":"10.1109/ICE-CCN.2013.6528495","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528495","url":null,"abstract":"Brushless DC motor are rapidly gaining popularity due to its high efficiency and accurate control characteristics. For any industrial and domestic application it is necessary to control the speed accurately. The drawbacks of the conventional PID controllers for the speed control can be minimized using Fuzzy PID controller. This paper aims at the design of Fuzzy PID controller for a BLDC motor inorder to dynamically update the parameters of PID controller. The mathematical modelling of the motor along with the controller is derived for the specific BLDC motor. The simulation is done on MATLAB/SIMULINK environment to verify the control characteristics of the Fuzzy PID controller.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"35 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132556740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Koul, A. Bahuguna, A. Singh, A. Pandita, M. K. Pattanshetti, R. Goudar
{"title":"AWES: Adaptive web exploration system based on similar user behavior and multiperspective thinking","authors":"A. Koul, A. Bahuguna, A. Singh, A. Pandita, M. K. Pattanshetti, R. Goudar","doi":"10.1109/ICE-CCN.2013.6528476","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528476","url":null,"abstract":"Internet users in the current digital age are increasingly using world wide web not only for entertainment but also for accessing information related to different topics. Our system aims at developing a web based environment that brings most of the information required by a user at one place. When a user searches a topic on the web, a lot of results are shown to the user which may or may not be relevant to the user. In our system, a user will be able to create shared bookmarks and save the links which would be relevant, so the user can access those links later also. Moreover when a user will search for a topic, the results shown to the user will be intelligently selected from the results that are searched by different users. This system will use concept of multiperspective thinking as well as implementation of intelligent user behavior for showing relevant links for a topic.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130940077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proficient algorithms for replication attack detection in Wireless Sensor Networks — A survey","authors":"R. Sathish, D. R. Kumar","doi":"10.1109/ICE-CCN.2013.6528465","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528465","url":null,"abstract":"Due to the operating nature of the sensor networks they are often unattended and the sensor nodes in the network are prone to different kinds of novel attacks. These networks are expected to find increasing deployment in coming years, as they enable reliable monitoring and analysis of unknown and untested environments. Enabling secure communication among the sensors is a major concern in WSN. In this paper we survey different efficient algorithms to detect the clone attacks in the Wireless Sensor Networks. We compare these algorithms considering various complexity metrics.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128462110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of low power sequential circuit using clocked pair shared flip flop","authors":"N. Nishanth, B. Sathyabhama","doi":"10.1109/ICE-CCN.2013.6528605","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528605","url":null,"abstract":"The clock system consisting of clock distribution networks and sequential elements is most power consuming VLSI components. Reductions of flip flop, power consumption have a deep impact on the total power consumption. Since power consumption is a major bottleneck of system performance, the clock load should be reduced to reduce the power consumption. The clock distribution network distributes the clock signal from a common point to all the elements that need it. Since this function is vital to synchronous system, much attention has been given to the characteristics of these clock signal and the electrical networks used in their distribution. In synchronous system clock distribution networks consumes a large amount of total power because of high operation frequency of highest capacitance. An effective way to reduce capacity of clock load is by minimizing number of clocked transistor. In low swing differential capturing flip flop system clock distribution networks consumes a large amount of chip power and there exist a more number of clocked transistor. Hence by a novel approach, clocked paired shared flip flop is used to reduce the number of local clocked transistors.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116915965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adding persuasive features in graphical password to increase the capacity of KBAM","authors":"U. Yadav, P. Mohod","doi":"10.1109/ICE-CCN.2013.6528553","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528553","url":null,"abstract":"Most of the existing authentication system has certain drawbacks for that reason graphical passwords are most preferable authentication system where users click on images to authenticate themselves. An important usability goal of an authentication system is to support users for selecting the better password. User creates memorable password which is easy to guess by an attacker and strong system assigned passwords are difficult to memorize. So researchers of modern days gone through different alternative methods and conclude that graphical passwords are most preferable authentication system. The proposed system combines the existing cued click point technique with the persuasive feature to influence user choice, encouraging user to select more random click point which is difficult to guess.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122114932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A high speed real time multi-bin CABAC encoder for ultra high resolution video","authors":"P. Jayakrishnan, P. V. A. Lincy, R. Niyas","doi":"10.1109/ICE-CCN.2013.6528494","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528494","url":null,"abstract":"The demand for better quality pictures, smaller sizes, lower energy consumption, lower cost of appliances has been a fuel for creation of better compression standards and great compression rate. The outstanding compression competence of H.264/AVC is extensively used for video conferencing, online streaming and for HD television. Context Adaptive Binary Arithmetic Coding (CABAC) encoder is a vital part in H.264/AVC (Advanced Video Coding) main and high profiles that provides a real time encoding video of ultra high resolution. CABAC compresses the components in the video signal according to the probability of those elements in a given context. CABAC encoder provides great compression rate over Context-Adaptive Variable Length Coding (CAVLC) baseline entropy encoder. An entropy encoder is a scheme used for lossless compression. A video sequence is a combination of bits which is referred as syntax element. The allocation of bits in various Syntax Elements (SE) [3] is analysed for the reduction in large amount of bit level operations involved and computational complexity involved. An optimised scheme for accessing the contexts and a Binary Arithmetic Encoder (BAE) capable of processing four bits simultaneously is presented. Hence parallelism and throughput is achieved by the means of reduction in syntax and bit level dependency. The proposed fully hardwired encoder is synthesised towards a 90nm CMOS cell library in ASIC flow using Cadence RTL Compiler.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115583789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fair scheduling approach for Load balancing and Fault tolerant in grid environment","authors":"S. K. Karthikumar, M. Preethi, P. Chitra","doi":"10.1109/ICE-CCN.2013.6528540","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528540","url":null,"abstract":"Grid computing is becoming an important technology in distributed environment. The Main issues consider in grid computing is Load balancing, Fault tolerance and Fault recovery. This paper Focuses on Load balancing and Fault tolerance. Load balancing is an important technique by maintaining the workload properly in the sites. This article designs a Grid Scheduler, which selects the Minimum Loaded Site for the candidate set of nearest sites, Execute the job within the Grid. Then the job is dispatched to the Fault Detector based on the availability of the site. The load balancing task in the grid environment will significantly improve the performance of the grid environment. Fault tolerance is a main technique in grid environment. This technique will used to execute the job from the processor failure. To achieve high throughput and resource utilization we propose a Fair scheduling algorithm. Trails for the proposed system are conducted using Grid Simulation Toolkit (GridSim).","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123720034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and analysis of a SWCNT piezoresistive pressure sensor","authors":"A. E. Bangera, S. Kulkarni","doi":"10.1109/ICE-CCN.2013.6528544","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528544","url":null,"abstract":"The paper considers modeling and analysis of a circular diaphragm Single Walled Carbon Nanotube (SWCNT) piezoresistive pressure sensor using COMSOL Multiphysics. Initially, the analysis of piezoresistivity in SWCNT by the application of strain is done both by analytical and numerical approach using MATLAB and COMSOL respectively. It is observed that both results are comparable. Thus, the analysis of the structural deformation of the piezoresistive SWCNT placed above the diaphragm which results in the change of resistance in SWCNT, which is in direct accordance with the applied pressure is performed in COMSOL Multiphysis. The simulations show that the results obtained are linear and the sensitivity of the sensor is adequate.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127891120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Benchmark evaluation of classification methods for single label learning with R","authors":"P. K. A. Chitra, S. Appavu","doi":"10.1109/ICE-CCN.2013.6528603","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528603","url":null,"abstract":"Classification in data mining is a procedure in which individual items are placed into groups based on quantitative information on one or more characteristics items and based on a training set of previously labeled items. The objective of this paper is to introduce, explain and compare the performance of the single - labeled supervised learning algorithms in R language on benchmark single labeled data set. The traditional classification algorithms like Decision Tree, Naïve Bayes, Support Vector Machine, Random Forest, Classification and Regression Trees are used under inspection. The R language is chosen to see the classification performances. Four measures (sensitivity, specificity, accuracy, F - measure) of performance here considered are based on confusion matrix, table of counts revealing the performance of algorithm's confusion regarding the true classifications. The observation of all the four performance measures lead to infer that the Decision Tree outperforms than other classification methods.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124660276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}