{"title":"Regression based analysis of effective hydrocast in underwater environment","authors":"J. Anand, S. Titus","doi":"10.1109/TENCON.2014.7022394","DOIUrl":"https://doi.org/10.1109/TENCON.2014.7022394","url":null,"abstract":"Undersea exploration is one of the pioneering fields in an oceanic environment for various tactical surveillances. Underwater acoustic communication is preferred over electromagnetic communication due to limited bandwidth, energy consumption and delay. Propagation speed in underwater environment is five orders magnitude less than terrestrial communication. The prime objective is to find out a good performance metric protocol design with recovery mode in underwater environment, so, Effective Hydrocast was proposed which was partially state full and the cost was calculated with Energy Consumption, Throughput, Packet Delivery Ratio and Propagation Delay. The concept of triangulation was introduced in order to avoid long detour paths incurred by Hydrocast. The simulations of this network in an underwater environment was estimated using ns2 simulator with Aquasim patch and comparisons had been made for Effective Hydrocast, Hydrocast, and Void Aware Pressure Routing with 100 nodes for Energy Consumption and Throughput of which Effective Hydrocast is found to be better than Hydrocast. A simple regression model is developed for the data obtained through ns2 simulation and tested without any autocorrelation between them with Durbin Watson analysis using Statistical Package for Social Science tool.","PeriodicalId":292057,"journal":{"name":"TENCON 2014 - 2014 IEEE Region 10 Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122273948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sangwook Bae, Shimin Sun, Li Han, Sunyoung Han, B. Paillassa
{"title":"Design and deployment of IPv6 address management system on research networks","authors":"Sangwook Bae, Shimin Sun, Li Han, Sunyoung Han, B. Paillassa","doi":"10.1109/TENCON.2014.7022480","DOIUrl":"https://doi.org/10.1109/TENCON.2014.7022480","url":null,"abstract":"Recently, research for Future Internet has been proposed and carried out in order to address two kinds of issues. First, the existing Internet protocol does not use new identifiers, and secondly the Internet protocol should be improved to meet usage requirements. Internet Protocol version 6 (IPv6) has been applied to fix the second issue. IPv6 has almost infinite address space. In addition, it has a significant feature in that it allows the host to generate and configure its own IPv6 addresses. We call that feature the Stateless Address Auto Configuration (SLAAC). However, this feature has drawbacks with respect to security for the network management system. Illegal hosts or unauthorized hosts could access the network and attack critical equipment, such as financial or industrial IT infrastructure. Users are exposed to such attacks as identity theft. In order to solve this issue, a host management method is needed to control and protect from illegal or unauthorized hosts. In this paper, we developed and implemented a mechanism for collecting host information and blocking specific hosts using features of ICMPv6. This proposal is tested and implemented in Korea Advance Research Network (KOREN). Through this, our solution covers the mechanisms to control host which is illegal or unauthorized in local network. Therefore, it can be protection from any Virus, DDOS and etc.","PeriodicalId":292057,"journal":{"name":"TENCON 2014 - 2014 IEEE Region 10 Conference","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122312866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of training methods on the accuracy of PCA-KNN partial discharge classification model","authors":"N. Pattanadech, P. Nimsanong","doi":"10.1109/TENCON.2014.7022350","DOIUrl":"https://doi.org/10.1109/TENCON.2014.7022350","url":null,"abstract":"The aim of this paper is to describe the effect of training methods on the accuracy of PCA-KNN partial discharge (PD) classification model. This model used principal component analysis (PCA) combined with k-nearest neighbor (KNN) model, so called, PCA-KNN PD classification model for PD pattern classification. PD phenomena, corona at high voltage side in air (CHV), corona at low voltage side in air (CLV), surface discharge (SF), and internal discharge (IN) were experimented in the shielding room. Electromagnetic wave due to PD phenomena was detected using a log-periodic antenna and recorded employing a spectrum analyzer. 80 PD experiments in total were performed. The original independent variables for the classification model, skewness and kurtosis of each period of the captured signals, were calculated. To study the effect of training methods: two patterns for data training, odd/even and block training methods were investigated. In case of the block training method, the effect of training data number can be examined as well. Besides, noise signals were generated with the computer program and trained into the PD classification models. The peak of noise signal was set up at 30% of the peak value of the PD signal. These noise signals were added with the PD signals to generated a mixed noise - PD signal. Then, the mixed noise - PD signals were used to evaluate the performance of the PCA-KNN PD classification model. It was found that the block data training method provided the higher accuracy PD classification compared with the odd/event data training method. The block training method with 80% training data/20% testing data gave the highest accuracy (95% correction) for PD classification without noise signal. However, this training technique provided the lowest accuracy (56.25% correction) for PD classification with the mixed noise-PD signals.","PeriodicalId":292057,"journal":{"name":"TENCON 2014 - 2014 IEEE Region 10 Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130920983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new cross correlation based double talk detection algorithm for nonlinear acoustic echo cancellation","authors":"Vineeta Das, Asutosh Kar, M. Chandra","doi":"10.1109/TENCON.2014.7022293","DOIUrl":"https://doi.org/10.1109/TENCON.2014.7022293","url":null,"abstract":"Acoustic echo canceller (AEC) is present in mobile communication system which is a popular mode of personal communication systems. AECs are used to eliminate the echo which dampens the speech signal and reduces the efficiency of signal transmission. The major problems faced by AECs are non-linearity and double talk. Non-linearity occurs due to the use of low cost electronic loud speaker, microphones and poorly designed enclosures in an AEC framework. Non-linearity causes vibration and harmonic distortion and also degrades the speech quality. Double talk occurs when both near end and far end speakers are active at a time. A Double Talk Detector (DTD) senses the presence of the two remote end speakers and modifies the weights of the filter through an adaptive algorithm to prevent the divergence of the adaptive filter. Double talk detection algorithms like Geigel, cross correlation and optimized cross correlation DTD are used to improve the performance of AECs. In this paper a unique way is proposed for the use of cross correlation between the far end signal and the received signal to obtain an efficient algorithm for double talk detection. Variable Step Size Least Mean Square algorithm is used as the adaptive algorithm in the proposed method.","PeriodicalId":292057,"journal":{"name":"TENCON 2014 - 2014 IEEE Region 10 Conference","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134313022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OpenFlow-based IPv6 Rapid Deployment mechanism","authors":"Kuo-Cheng Yang, Hsiang-Ting Fang, Quincy Wu","doi":"10.1109/TENCON.2014.7022481","DOIUrl":"https://doi.org/10.1109/TENCON.2014.7022481","url":null,"abstract":"As more devices are connected to the Internet, the speed of global IPv4 address depletion also gets faster and faster. Although IETF proposed IPv6 to solve the problem of IPv4 address exhaustion, replacing the underlying protocol of the Internet is a complicated task. It is expected that the transition from IPv4 to IPv6 will take several years. Among proposed transition mechanisms, IPv6 Rapid Deployment (6rd) is a tunneling mechanism similar to 6to4, which was proposed to promote IPv6 deployment utilizing current IPv4 infrastructure. Although it was reported that some ISP utilized 6rd to successfully made millions of users IPv6-ready, the same model may not be always easily duplicated by other ISPs. In this paper, we propose a new approach which allows ISPs using OpenFlow to rapidly provide connection to IPv6 customer networks. Moreover, this OpenFlow-based approach provides security services such as intrusion prevention system (IPS) and management services such as load-balancing and quality of service. Experimental evaluation shows that the overhead of the tunneling mechanism degrades about 10% of performance, which is acceptable at the initial stage compared with the efficiency of rapid IPv6 deployment.","PeriodicalId":292057,"journal":{"name":"TENCON 2014 - 2014 IEEE Region 10 Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132349877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SOA selection and replication based on QoS","authors":"S. Puntheeranurak, Aekkawit Chanpen","doi":"10.1109/TENCON.2014.7022290","DOIUrl":"https://doi.org/10.1109/TENCON.2014.7022290","url":null,"abstract":"Service Oriented Architecture (SOA) which contains a lot of consumers faces with reliability and availability problem. If one service fails, the user expects another alternative service to take the place of. In order to, increase service instance, service replication is adopted. To control the selection and replication of service, this paper proposes a service selection and replication based on Quality of Service (QoS). Service invocation will be even separated to each provider. While service replication will begin only if current service instances are not enough for number of consumers. Thus the system is able to control service replica properly and force service distribution for effecting regular consumer as few as possible.","PeriodicalId":292057,"journal":{"name":"TENCON 2014 - 2014 IEEE Region 10 Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130106628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network routing over erasure channels using systematic rateless codes","authors":"Soumya Indela, Sonu K. Mishra, S. Bose, W. Zhong","doi":"10.1109/TENCON.2014.7022276","DOIUrl":"https://doi.org/10.1109/TENCON.2014.7022276","url":null,"abstract":"Rateless Codes can reduce the costs of retransmissions over erasure channels. It has been shown in the literature that having a systematic part in a rateless codes enhances its performance. This paper proposes an extended systematic rateless encoding scheme to improve performance. The scheme is easy to analyze and implement. We also study several fixed and opportunistic routing protocols for a network where the nodes use systematic rateless code schemes for communication. Their performance is studied through analysis and simulations in a network scenario.","PeriodicalId":292057,"journal":{"name":"TENCON 2014 - 2014 IEEE Region 10 Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114864775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gautam Rituraj, Ezhil Reena Joy, B. Kushwaha, Praveen Kumar
{"title":"Analysis and comparison of series-series and series-parallel topology of contactless power transfer systems","authors":"Gautam Rituraj, Ezhil Reena Joy, B. Kushwaha, Praveen Kumar","doi":"10.1109/TENCON.2014.7022440","DOIUrl":"https://doi.org/10.1109/TENCON.2014.7022440","url":null,"abstract":"Due to large leakage inductance, compensation is usually necessary in contactless system to achieve the required power transfer. A contactless power transfer system is designed with two such compensation topologies and are presented in this paper. Primary compensation is designed to make the primary phase angle equal to the secondary resonant frequency with minimum VA rating of the power supply. Secondary compensation is designed to increase the power transfer capability. The theory of contactless system is explained with analytical expressions for voltage, current and impedance as well as the power transfer efficiency. Using 18cm × 14.5cm primary coil and 19cm × 11cm secondary coil, a functional contactless system is realized in the laboratory. The operating characteristics of contactless system at various frequency of operation, loads and distances with the two compensation techniques are detailed. Efficiency of two compensation techniques in various operating conditions are found and compared.","PeriodicalId":292057,"journal":{"name":"TENCON 2014 - 2014 IEEE Region 10 Conference","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116737348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extraction of the financial policy topics by latent dirichlet allocation","authors":"Y. Shirota, T. Hashimoto, Tamaki Sakura","doi":"10.1109/TENCON.2014.7022493","DOIUrl":"https://doi.org/10.1109/TENCON.2014.7022493","url":null,"abstract":"We conducted topic extraction concerning the financial policy topics in Japan just after the East-Japan great earthquake disaster in 2011. The target document is text data of the Policy Board of the Bank of Japan financial policy meeting proceedings summaries. The topic extraction methods we used was the LDA algorithm. We extracted interesting three topics from the summaries. One topic has the peaks which overlapped the Japanese stock price fall times. The topic is considered to be related to the risk around the future of Japan. We think that another disaster-related topic expresses the uncertainty of the company production activity. In this paper, we used other economics time series data as plausible reasons to explain the extract topic. We discuss in the paper our approach by economics data to give a plausible excuse for the topic.","PeriodicalId":292057,"journal":{"name":"TENCON 2014 - 2014 IEEE Region 10 Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115029360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joseph Leandro B. Peje, Hani Herbert L. Ho, Floro Barot, Maria Fe G. Bautista, Carl Christian E. Misagal, J. Hizon, L. Alarcón
{"title":"An ultra low-voltage standard cell library in 65-nm CMOS process technology","authors":"Joseph Leandro B. Peje, Hani Herbert L. Ho, Floro Barot, Maria Fe G. Bautista, Carl Christian E. Misagal, J. Hizon, L. Alarcón","doi":"10.1109/TENCON.2014.7022443","DOIUrl":"https://doi.org/10.1109/TENCON.2014.7022443","url":null,"abstract":"In this paper, the design of an ultra-low voltage standard cell library is discussed. This includes the design constraints in designing each gate on a schematic level as well as techniques used in designing the layout. The method of performing timing and power characterization of the standard cell library and how the logical and physical library files are generated are discussed. The accuracy of the standard cell library is then verified through the use of several test circuits.","PeriodicalId":292057,"journal":{"name":"TENCON 2014 - 2014 IEEE Region 10 Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132879928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}