2013 15th International Conference on Advanced Computing Technologies (ICACT)最新文献

筛选
英文 中文
Development of software interface for testing of embedded system 嵌入式系统测试软件接口的开发
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710547
S. Karmore, A. Mahajan, Goldi C. Jarbias
{"title":"Development of software interface for testing of embedded system","authors":"S. Karmore, A. Mahajan, Goldi C. Jarbias","doi":"10.1109/ICACT.2013.6710547","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710547","url":null,"abstract":"Testing of embedded devices is a big challenge in a changing and competitive technical environment, as testing of one embedded application is not similar to another. For testing of embedded system generic middleware, device driver and operating systems are required and ruled over target hardware for the execution. Companies developing products based on embedded systems understand the fact that high quality and unique application software plays an important role in the differentiation of their products from their competitors. This generic interface can test the various services of the embedded system, and supports unit test and integration test which are based system testing technology. By using generic interface in the target embedded platform to do testing the results show that our constructed testing interface is workable. This paper, in the perspective of software solution, presents a generic API for testing the target embedded system.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121660733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and analysis of two-input DC-DC converter used in low voltage DC-grid applications 低压直流电网双输入DC-DC变换器的设计与分析
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710505
E. V. Kumar, M. Veerachary
{"title":"Design and analysis of two-input DC-DC converter used in low voltage DC-grid applications","authors":"E. V. Kumar, M. Veerachary","doi":"10.1109/ICACT.2013.6710505","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710505","url":null,"abstract":"The paper brings into depiction a novel two input DC-DC converters topology, for DC micro-grid applications. The paper proposes a topology which is capable of providing excessive bucking with one source and also boosting operation. On account of excessive stepping down of the input dc voltage the converter uses additional energy storage components and hence it belongs to seventh order family. The proposed converter regulates the power flow between input de sources and dc micro-grid either individually or collectively at a reduced source ripple. The digital voltage regulation while the current controller is used, for second input DC source, to ensure load division. A 72/ 36 V to 24 V, with power capacity of, 150 ~ 300W dc low voltage micro-grid is designed to validate the proposed concept. The theoretical analysis is validated through simulations.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121923568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Speech synthesizer with speculative multithreading and speculative computation reuse 具有推测多线程和推测计算重用的语音合成器
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710531
S. Suma, N. Gopalan
{"title":"Speech synthesizer with speculative multithreading and speculative computation reuse","authors":"S. Suma, N. Gopalan","doi":"10.1109/ICACT.2013.6710531","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710531","url":null,"abstract":"Speculative multithreading and speculative computation reuse uses profiles for exploiting and to increase the cache memory performance. Currently proposed multithreaded processors try to improve on execution of number of instructions in each clock cycle. Even the general purpose applications can enchance the Instruction level parallelism through these techniques. Hence in this paper we are proposing an idea of the hybrid technique of both multithreading and instruction reuse to enhance the performance and execution rate comparatively with the sequential computation. We are also computing the thread interval for the reliability testing such that at what interval the value to be passed from the producer thread to the consumer thread.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115151188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating contributors of the mixed DNA samples by forensic bioinformatics; uncertainty to certainty for crime laboratories 用法医生物信息学方法调查混合DNA样本的贡献者;从犯罪实验室的不确定性到确定性
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710508
Amit Kumar, Sharda Awadhanam, Amita Kashyap
{"title":"Investigating contributors of the mixed DNA samples by forensic bioinformatics; uncertainty to certainty for crime laboratories","authors":"Amit Kumar, Sharda Awadhanam, Amita Kashyap","doi":"10.1109/ICACT.2013.6710508","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710508","url":null,"abstract":"Evidences from the crime scene inculcating mixed DNA profiling data has always been a challenge to the forensic science laboratories and the crime investigation agencies. Not only it confuses the analysis but it may lead to serious fatal errors in analysis of final results which may result in convicting an innocent and quittance of a criminal free. 16 STR markers have become one of the most widely used genomic markers for identity testing and gene mapping due to their high degree of heterozygosity. We introduce forensic bioinformatics approach which proved to be very quick, precise and conclusive in assessment and analysis of the raw DNA profiling data provided from the laboratory. In the present study, we have discussed the utility of forensic bioinformatics application to Short tandem repeat (STR) data in a theft and looting case which was used to evaluate specific regions (loci) within nuclear DNA. The analysis was made through an “MS-Excel database management tool” where the DNA Profiling data provided by the Forensic Laboratory was managed and analyzed on the grounds of the various loci present and their variability in different individuals. We have incorporated the same universal concept “Variability in STR regions can be used to distinguish one DNA profile from another”.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130767443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A new approach for secure data transfer in audio signals using DWT 一种基于小波变换的音频信号安全数据传输新方法
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710492
B. Geethavani, E. V. Prasad, R. Roopa
{"title":"A new approach for secure data transfer in audio signals using DWT","authors":"B. Geethavani, E. V. Prasad, R. Roopa","doi":"10.1109/ICACT.2013.6710492","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710492","url":null,"abstract":"Steganography is an information hiding technique where secret message is embedded into unsuspicious cover signal. In this paper, a novel approach of integrating the features of cryptography and audio Steganography is presented. The information to be transmitted is encrypted by using modified blowfish algorithm and resultant cipher text is embedded into a cover audio file using discrete wavelet transform (DWT). The resultant stego audio is transmitted to the receiver and the reverse process is done in order to get back the original plain text. The proposed method presents a steganographic scheme along with the cryptographic scheme which enhances the security of the algorithm.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"354 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134087975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Indian MST radar digital receiver first results 印度MST雷达数字接收机首个结果
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710541
T. Prasad, P. Satyanarayana, P. Srinivasulu, S. Godbole, A. Jayaraman, V. Anandan
{"title":"Indian MST radar digital receiver first results","authors":"T. Prasad, P. Satyanarayana, P. Srinivasulu, S. Godbole, A. Jayaraman, V. Anandan","doi":"10.1109/ICACT.2013.6710541","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710541","url":null,"abstract":"In this article we explain the features of a Digital Receiver developed for atmospheric science research applications. The digital receiver is initially test validated with an analog receiver of MST (Mesosphere-Stratosphere-Troposphere) Radar located at NARL (National Atmospheric Research Laboratory), Gadanki, India. This article presents a brief overview of NARL scientific research activities, two decades of technological development activities of MST Radar system, radar receiver features for estimation of atmospheric parameters, specifications and hardware details of digital receiver, performance test methods of digital receiver with simulated signals. Furthermore, an atmospheric wind profile obtained after implementing the digital receiver with MST Radar is presented. These digital receivers are now operational with 1.28-GHz lower atmospheric wind profilers, pilot active array of 53-MHz MST Radar and 30-MHz HF radar developed at NARL to estimate atmospheric parameters at different height levels of Earth's atmosphere.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115849174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Obtaining a pure sinusoidal waveform using multilevel inverters with increased higher voltage levels using NPC H-bridge 使用NPC h桥增加更高电压水平的多电平逆变器获得纯正弦波形
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710518
S. Devi Lavanya, D. Kirubakaran
{"title":"Obtaining a pure sinusoidal waveform using multilevel inverters with increased higher voltage levels using NPC H-bridge","authors":"S. Devi Lavanya, D. Kirubakaran","doi":"10.1109/ICACT.2013.6710518","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710518","url":null,"abstract":"This paper presents a Multilevel inverter that consists of a standard 3-leg two level inverter cascaded with two new neutral point clamped H-bridge inverter in series with each inverter leg with a single dc voltage source of 300V. The control signals for this multilevel inverter is obtained by using carrier based PWM technique. The proposed multilevel inverter is used to obtain a pure sinusoidal waveform which is verified using MATLAB/SIMULINK software. The results of the simulation, the output waveform of three phase voltage and phase current obtained are pure sinusoidal therefore the proposed topology can be implemented for HVDC transmission and induction motor drives using the dc source obtained from solar panels which is converted to ac using proposed topology. The proposed topology is concentrated to increase the voltage levels of the output using a single dc source. The new NPC flying capacitor H-Bridge inverter is invented in this paper and its advantages are discussed in this paper by doing so a pure sine wave is obtained.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116527554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
HOG descriptor based registration (A new image registration technique) 基于HOG描述符的配准(一种新的图像配准技术)
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710513
Eldho Abraham, S. Mishra, Nivedita Tripathi, Gineesh Sukumaran
{"title":"HOG descriptor based registration (A new image registration technique)","authors":"Eldho Abraham, S. Mishra, Nivedita Tripathi, Gineesh Sukumaran","doi":"10.1109/ICACT.2013.6710513","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710513","url":null,"abstract":"This paper proposes a novel feature based technique that can be used to address image registration problems in the field of Digital Image Processing. The two major parts of this proposed method is key point description and the matching of those key points. This process requires two images, one as a reference and another as a target image, and applies FAST (Features from Accelerated Segment Test) Feature Detector to detect the key points in both images. For every detected key point, a rectangular region is selected and feature vector (feature descriptor) for respective key point is generated using Histogram of Oriented gradients (HOG). All the feature vectors are then matched in both the images to generate the Transformation Matrix (containing transformation values of image in x-y direction) which is used to align target image. An additional refinement stage is introduced to eliminate outliers and to improve registration accuracy. The proposed method has been tested on a number of general and microscopic images, and the method proves to be registering images with high accuracy in presence of different transformations.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128932346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A service based trust management classifier approach for cloud security 基于服务的云安全信任管理分类器方法
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710519
Chandan Banerjee, A. Kundu, Moitree Basu, P. Deb, Devtapa Nag, R. Dattagupta
{"title":"A service based trust management classifier approach for cloud security","authors":"Chandan Banerjee, A. Kundu, Moitree Basu, P. Deb, Devtapa Nag, R. Dattagupta","doi":"10.1109/ICACT.2013.6710519","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710519","url":null,"abstract":"In this paper, we have proposed a framework for cloud data security which is capable of securing users' data, such that malicious user is detected quickly. The domain remains unaffected in worst case scenario. In this method, we have introduced a new constant value for classification that can automatically be redirected to access the requests for the corresponding cluster. Each service type has its own range of action value based on the user. Weight of the action has been calculated and once a user of trusted or innocent region does the same malicious work repeatedly, the user would be directly transferred to non-trusted user region and the data would remain un-available to the user, if and only if the threshold value of tolerance is reached. In this work, a service based trust management classifier approach is proposed for cloud security.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129018704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Genalign — A high performance implementation for aligning the compressed DNA sequences Genalign -一个用于对齐压缩DNA序列的高性能实现
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710490
D. Satyanvesh, Kaliuday Balleda, P. K. Baruah, S. Sai
{"title":"Genalign — A high performance implementation for aligning the compressed DNA sequences","authors":"D. Satyanvesh, Kaliuday Balleda, P. K. Baruah, S. Sai","doi":"10.1109/ICACT.2013.6710490","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710490","url":null,"abstract":"In molecular biology, sequence alignment is a way of arranging DNA, RNA or protein sequences to identify regions of similarity between the sequences. However, this is a challenging problem since the DNA sequences are huge in size and the databases are growing at an exponential rate. It requires tremendous amount of memory and large computational power. For example, the human genome in raw format ranges from 2 to 30 Tera-bytes. The inherent property of DNA is that it contains many repeats which makes it highly compressible. This paper presents a new approach of aligning the sequences after compressing them. The alignment consists of both ungapped and gapped alignment. Multi-cores and GPUs can be used to align these huge sequences quickly on the compressed sequences. The focus mainly is on aligning the huge sequences accurately. The ungapped alignment achieves a speedup of upto 56 on K20 Kepler GPUs and the gapped alignment achieves a speedup of upto 15 on multi-cores.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132594848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信