2016 10th International Conference on Intelligent Systems and Control (ISCO)最新文献

筛选
英文 中文
Using cell division for text to image encryption 使用细胞分裂对文本到图像进行加密
2016 10th International Conference on Intelligent Systems and Control (ISCO) Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2016.7727107
Vaishnavikannan, Smita Jhajharia
{"title":"Using cell division for text to image encryption","authors":"Vaishnavikannan, Smita Jhajharia","doi":"10.1109/ISCO.2016.7727107","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7727107","url":null,"abstract":"Protection of data has always been an issue and newer encryption methods are a constant need. Our paper provides a novel text encryption technique that encrypts a text message into an image using the concept of cell division that occurs in cellular organisms. Cell division, that includes the meiotic and the mitotic division, leads to the distribution of genetic material between two daughter cells. We draw a parallel between the cell division and encryption to achieve a high level of security. Our method works in three main stages - the mitotic phase, the meiotic phase and the image formation phase. Encrypted message is obtained in the form of an image. The results are passable. As per our knowledge, no prior work similar to our approach has been done.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121468372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A hybrid multilevel authentication scheme for private cloud environment 一种用于私有云环境的混合多级身份验证方案
2016 10th International Conference on Intelligent Systems and Control (ISCO) Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2016.7727141
S. Sridhar, S. Smys
{"title":"A hybrid multilevel authentication scheme for private cloud environment","authors":"S. Sridhar, S. Smys","doi":"10.1109/ISCO.2016.7727141","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7727141","url":null,"abstract":"Cloud Computing is the ubiquitous model of a shared pool of configurable computing resources. This paper proposes a multilevel authentication technique for use in Private Cloud network. Authentication of User is a challenging issue due to increasing security threats as it acts as the first defence against attackers. Whole authentication control lies in the server Side so Single-tier authentication is not enough to overcome these problems. We come up with a novel authentication mechanism, called Hybrid Multilevel Authentication, which provides the security against the insider attacks and virtualization attacks. Positives and negatives of other cloud setup were considered. Encryption function is implemented by symmetry-based AES encryption algorithm. This model provides a level of security for each member of that organisation.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128608893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Secure authentication process in smart cards 智能卡的安全认证过程
2016 10th International Conference on Intelligent Systems and Control (ISCO) Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2016.7726879
S. Nivetha, N. Elizabeth, T. P. Padmasha, I. Gohulalakshmi
{"title":"Secure authentication process in smart cards","authors":"S. Nivetha, N. Elizabeth, T. P. Padmasha, I. Gohulalakshmi","doi":"10.1109/ISCO.2016.7726879","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7726879","url":null,"abstract":"The application of smart cards and its fraudulent manipulation by software, hardware or telecommunication appears to be a major concern. Security breaches of smart cards, hacking into the system and creating duplicates of the cards have to be rectified. In this paper we propose an approach to design a more secure two-level authentication process that uses the PIN number as the first level of authentication and OTP generated using SHA-256 as the second level of authentication. Also comparison of various Hash algorithms are performed to justify the use of SHA-256 for OTP generation.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"30 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128470309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Summary of LED down light testing and its implications LED筒灯测试综述及其启示
2016 10th International Conference on Intelligent Systems and Control (ISCO) Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2016.7727086
K. Shailesh, S. Kini, C. P. Kurian
{"title":"Summary of LED down light testing and its implications","authors":"K. Shailesh, S. Kini, C. P. Kurian","doi":"10.1109/ISCO.2016.7727086","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7727086","url":null,"abstract":"LED lighting technology is advancing at fast pace, LED lighting products in the market show a wide range of performance characteristics. This work explains the need for trustworthy, fair product performance information to promote the market for LED lighting products. In this work more than 120 LED down lights were tested using industry-approved test procedures and summary of the results is presented in this report. This work has exposed a broad range of performance, from poor to exceptional. Some LED lighting products tested deliver lumen output and luminous efficacies that exceed all expectations others perform badly and do not produce enough luminous flux output for their intended application. Some manufacturers are publishing trustworthy values for luminous flux output and luminous efficacy, there is often broad gap between performance claims in marketing literature and actual tested LED lighting product performance. Test results indicate that there is urgent need to implement strict regulations to curb misleading product literature from representing LED lighting product information. The work aims to discourage cheap low-quality LED lighting products and exaggerated claims, but also serves as useful source of information for government agencies and end-users to make informed decisions. Lighting product distributors, retailers, lighting designers, government agencies, and other stakeholders can draw inferences from this study and know the current state of the LED lighting market and its course.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128524643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Localization of sensor nodes in the presence of obstruction in wireless sensor network environment 无线传感器网络环境中存在障碍物时传感器节点的定位
2016 10th International Conference on Intelligent Systems and Control (ISCO) Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2016.7727144
S. Gopikrishnan, P. D. Mahendiran, V. Jothiprakash
{"title":"Localization of sensor nodes in the presence of obstruction in wireless sensor network environment","authors":"S. Gopikrishnan, P. D. Mahendiran, V. Jothiprakash","doi":"10.1109/ISCO.2016.7727144","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7727144","url":null,"abstract":"Localization is considered as an important parameter in wireless sensor network where it support the node to identify its location so that routing can take place in power efficient way in a dynamic network topology. The issue of localization has been addressed in many research areas such as vehicle navigation systems, virtual reality systems, user localization in wireless sensor networks (WSNs). The proposed model presents a unique localization framework considering the presence of obstruction in the environment of wireless sensor network with random node placement and irregular radio patterns for minimizing the estimates of the range free localization errors. The mobile anchor nodes frequently broadcast beacon message, including their current location approach. The range-free localization algorithms evaluate the node ranging error accuracy in the anisotropic networks to address the localization inequality issues for the empty feasible set. Here, we applied the approach of convex optimization for localization since the computation is faster. Depending upon the node density the regular node need to communicate with the mobile anchor for the localization process by participating the regular nodes in the cooperative localization process.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116402203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Emerging time and frequency domain techniques for power quality disturbances analysis 电能质量扰动分析的时域和频域新技术
2016 10th International Conference on Intelligent Systems and Control (ISCO) Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2016.7727143
P. Nalini, K. Selvi
{"title":"Emerging time and frequency domain techniques for power quality disturbances analysis","authors":"P. Nalini, K. Selvi","doi":"10.1109/ISCO.2016.7727143","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7727143","url":null,"abstract":"Recognition of power quality events by analyzing voltage waveform disturbances is a very important task for power system monitoring. This paper presents a novel approach for the recognition and classification of power quality disturbances using wavelet transform and support vector machine. The proposed method employs wavelet transform techniques to extract the most important and significant features from details and approximation waves. The obtained severable feature vectors are used for training the support vector machines to classify the power quality disturbances. Five types of disturbances are considered for classification. The simulation results reveal that the combination of wavelet transform and SVM in time and frequency domain can effectively classify different PQ events.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116705232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of self powered wireless sensor network using hybrid PV-wind system 基于PV-wind混合系统的自供电无线传感器网络设计
2016 10th International Conference on Intelligent Systems and Control (ISCO) Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2016.7727037
P. Rangaree, G. Asutkar
{"title":"Design of self powered wireless sensor network using hybrid PV-wind system","authors":"P. Rangaree, G. Asutkar","doi":"10.1109/ISCO.2016.7727037","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7727037","url":null,"abstract":"The commercially available sensor nodes are battery-driven devices. A number of nodes together constitute a network called wireless sensor network. As days proceed, the batteries used in the WSN lose their charge and subsequently get isolated from the network. Many energy harvesting schemes have been proposed to alleviate this problem which is to convert the ambient energy from the environment into electricity to power the sensor nodes. Energy harvesting from single source have environmental limitations like if the sensor is installed inside a building solar energy cannot be used and with wind generators is that they are too big, and are expensive if the size has to be decreased. Hence proposed system is design to provide multisource and self powered power supply to wireless sensor node which could stay charged by generating power on its own.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116761942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
PID control of structure with tuned liquid column damper 可调谐液柱阻尼器结构的PID控制
2016 10th International Conference on Intelligent Systems and Control (ISCO) Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2016.7726928
Salsala Abubaker, S. Nagan, T. Nasar
{"title":"PID control of structure with tuned liquid column damper","authors":"Salsala Abubaker, S. Nagan, T. Nasar","doi":"10.1109/ISCO.2016.7726928","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7726928","url":null,"abstract":"New civil engineering structures are long and slender and they have less damping. Therefore they are subjected to large vibrations when earthquake or wind acts. These excitations may cause structural collapse of the structure. Therefore to control these vibrations supplementary control devices are used. Tuned liquid column damper (TLCD) is one of a passive control device to reduce the excitations. TLCD will transfer the energy from the structure to TLCD by the motion of water in a U-shape tube like devices fitted with an orifice opening. Due to this motion the excitations will reduced. The aim of this paper is to study the effectiveness of PID control in TLCD system. The results are obtained with structure only, passive, PID controlled system. From this paper, the vibrations can be effectively suppressed with the PID controller.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114312284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new k out of n secret image sharing scheme in visual cryptography 视觉密码学中一种新的k of n秘密图像共享方案
2016 10th International Conference on Intelligent Systems and Control (ISCO) Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2016.7726969
K. Shankar, P. Eswaran
{"title":"A new k out of n secret image sharing scheme in visual cryptography","authors":"K. Shankar, P. Eswaran","doi":"10.1109/ISCO.2016.7726969","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7726969","url":null,"abstract":"Visual cryptography (VC) is a method for shielding the secret image which encodes the image into many shares and allocates them to various participants. When all shares are aligned and stacked together, they expose the secret image. In k out of n (k, n) VC scheme, the secret image is shared into n shares such that when k or more participants by amassing their transparencies by means of an overhead projector to reveals the secret image. This paper proposed a brand new of simple and robust (k, n) visual cryptography technique which is used to effectively sharing the secret image with utmost confidentiality. In share creation process, specified new condition for random matrices and then XOR operations are performed to generate the `n' transparencies. It is possible to decode the secret image visually by superimposing a k subset of transparencies. Nevertheless no secret data can be acquired from the superposition of an illegal subset. Experiments, statistical and security assessments are carried out on the shares to validate the strength of the proposed scheme by means of a sequence of investigations such as visual testing, encryption quality testing, security analysis and different attacks. The proposed (k, n) VC scheme offers a consistent protection for communicating images over the public channels.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114481306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Design implementation of UART and SPI in single FGPA 单FGPA中UART和SPI的设计实现
2016 10th International Conference on Intelligent Systems and Control (ISCO) Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2016.7726983
M. Poorani, R. Kurunjimalar
{"title":"Design implementation of UART and SPI in single FGPA","authors":"M. Poorani, R. Kurunjimalar","doi":"10.1109/ISCO.2016.7726983","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7726983","url":null,"abstract":"The UART(Universal Asynchronous Receiver and transmitter) controller is the key component of the serial communications subsystem of a computer. The UART takes bytes of data and transmits the individual bits in a sequential fashion. SPI is a common technology used nowadays for communication with peripheral devices where we want to transfer data speedily and with in real time constraints. In the existing work data acquisition system for underground has been designed for counters triggered by surface detectors and they have used UART and SPI protocol for the communication with dedicated processor. In this paper we have used Xilinx 12.4i and SPARTAN 3E FPGA to implement the whole system. The hyper terminal is used to check the UART protocol and 12 bit DAC MCP4922 used for check SPI protocol. The proposed work can provides both protocol effectively for the wireless serial communication. These serial protocols mainly used in Zigbee wireless technology.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116226336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信