2013 3rd IEEE International Advance Computing Conference (IACC)最新文献

筛选
英文 中文
Design and development of digital PID controller for DC motor drive system using embedded platform for mobile robot 基于嵌入式移动机器人平台的直流电机驱动系统数字PID控制器的设计与开发
2013 3rd IEEE International Advance Computing Conference (IACC) Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514193
C. S. Gohiya, S. Sadistap, S. A. Akbar, B. Botre
{"title":"Design and development of digital PID controller for DC motor drive system using embedded platform for mobile robot","authors":"C. S. Gohiya, S. Sadistap, S. A. Akbar, B. Botre","doi":"10.1109/IADCC.2013.6514193","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514193","url":null,"abstract":"In Agriculture industry, plants are prone to diseases caused by pathogens and environment conditions and it is a prime cause to lose of revenue. It requires continuous monitoring of plants and environment parameters to overcome this problem. A mobile Robotic system for monitoring these parameters using wireless network has been envisaged here and developed based on ARM-Linux platform. Robotic platform consists of ARM9 based S3C2440 processor from SAMSUNG and Linux Kernel , Motor driver, robot mechanical assembly. The farm environment and plant condition such as temperature, humidity soil moisture content etc. are continuously monitored through suitable data acquisition system incorporated in the robotic system. A servo motor based robotic arm is designed for collecting soil sample and test various soil parameters. A closed loop feedback algorithm based on Digital PID controller has been developed for precise position and speed control of mobile robot. The wireless control of mobile robot and monitored data acquisition is accomplished using zigbee wireless protocol. For displaying acquired data on host system a Graphical user interface is designed using qt creater framework. For independent functioning of mobile robot, application program is written in c language and cross compiled using arm-linux-gcc compiler on Ubuntu 10.04 platform and ported on the memory of ARM processor.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"517 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123097380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Model for drain current based on the exponential distribution of tail states for nanocrystalline silicon thin film transistor 基于尾态指数分布的纳米晶硅薄膜晶体管漏极电流模型
2013 3rd IEEE International Advance Computing Conference (IACC) Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514459
P. Sharma, N. Gupta
{"title":"Model for drain current based on the exponential distribution of tail states for nanocrystalline silicon thin film transistor","authors":"P. Sharma, N. Gupta","doi":"10.1109/IADCC.2013.6514459","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514459","url":null,"abstract":"In this paper we have modeled the drain current based on the exponential distribution of tail states for nanocrystalline silicon thin film transistor (nc-Si TFT). The degradation of mobility due to the presence of acoustic phonons and interface roughness are taken into account. The model thus developed has been simulated for two different aspect ratios (W/L= 400 μm / 20 μm and W/L = 400 μm / 8 μm), the shape of the curves obtained are similar to the experimental ones validating the developed model.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124430882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposed Profile Translation based Proactive Adaptation using Context Management (PTPACM) in Smartphones 在智能手机中使用上下文管理(PTPACM)提出基于配置文件翻译的主动适应
2013 3rd IEEE International Advance Computing Conference (IACC) Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514250
P. Railkar, P. Mahalle
{"title":"Proposed Profile Translation based Proactive Adaptation using Context Management (PTPACM) in Smartphones","authors":"P. Railkar, P. Mahalle","doi":"10.1109/IADCC.2013.6514250","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514250","url":null,"abstract":"Mobile technology and Internet is becoming an integral part of our daily life. Various transactions like shopping, ticket booking and banking transactions have been done on the fly. The technology like Smartphone adds portability for these activities. To manage information and applications on Smartphone, user must provide credentials or profiles to service provider with their details filled by logging onto different websites. To this purpose, user's profile resides in control of multiple service providers. Due to this, duplication of data occurs which will leads to a data inconsistency. To overcome these issues, this paper proposes Profile Translation based Proactive Adaption using Context Management (PTPACM) in Smartphones which automatically generates user's profile according to the scenarios. Proposed system allows keeping user's full profile in user domain resulting into centralizing or exchanging the profile information with increase in the consistency of profile information. This paper presents the layered architecture for PTPACM with Context Awareness Layer, Proactive Analyzer Layer and Profile Translation in a system. This paper also presents probabilistic representation of PTPACM as well as pseudo codes for different operations in the functional blocks of presented architecture.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116772650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RSS based detection and expulsion of malicious users from cooperative sensing in Cognitive Radios 基于RSS的认知无线电协同感知恶意用户检测与驱逐
2013 3rd IEEE International Advance Computing Conference (IACC) Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514217
S. Yadav, M. Nene
{"title":"RSS based detection and expulsion of malicious users from cooperative sensing in Cognitive Radios","authors":"S. Yadav, M. Nene","doi":"10.1109/IADCC.2013.6514217","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514217","url":null,"abstract":"In recent past there has been an increasing interest in wireless communication applications owing to its ease of use, cost effectiveness, maintainability and ease of deployment. Consequently, a number of wireless systems have been developed and deployed, thereby, leading to a belief that frequency spectrum is slowly running out of usable frequencies. Concept of Cognitive Radio (CR) has been proposed to overcome this issue of spectrum scarcity by making use of opportunistic spectrum access. Along with CRs, new types of security threats have evolved e.g. Primary User Emulation Attack (PUEA) and Spectrum Sensing Data Falsification (SSDF) attack. This paper introduces a simple yet efficient technique to counter the SSDF attack. Rigorous survey study shows that a handful of techniques are proposed to counter SSDF attack. The results show that the proposed techniques fail when malicious secondary users outnumber the genuine secondary users, which is a possible threat scenario in CR networks. We propose a technique that is independent of the number of malicious SUs in the network. It makes use of primary user's Received Signal Strength (RSS) at an SU to localize its position and compare this with that calculated using received signal strength of SU transmissions at data fusion center.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121078221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Clustering techniques for streaming data-a survey 流数据的聚类技术——调查
2013 3rd IEEE International Advance Computing Conference (IACC) Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514355
Y. Yogita, Durga Toshniwal
{"title":"Clustering techniques for streaming data-a survey","authors":"Y. Yogita, Durga Toshniwal","doi":"10.1109/IADCC.2013.6514355","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514355","url":null,"abstract":"Nowadays many applications are generating streaming data for an example real-time surveillance, internet traffic, sensor data, health monitoring systems, communication networks, online transactions in the financial market and so on. Data Streams are temporally ordered, fast changing, massive, and potentially infinite sequence of data. Data Stream mining is a very challenging problem. This is due to the fact that data streams are of tremendous volume and flows at very high speed which makes it impossible to store and scan streaming data multiple time. Concept evolution in streaming data further magnifies the challenge of working with streaming data. Clustering is a data stream mining task which is very useful to gain insight of data and data characteristics. Clustering is also used as a pre-processing step in over all mining process for an example clustering is used for outlier detection and for building classification model. In this paper we will focus on the challenges and necessary features of data stream clustering techniques, review and compare the literature for data stream clustering by example and variable, describe some real world applications of data stream clustering, and tools for data stream clustering.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121123320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Prevention of ARP spoofing: A probe packet based technique 防止ARP欺骗:一种基于探测包的技术
2013 3rd IEEE International Advance Computing Conference (IACC) Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514211
P. Pandey
{"title":"Prevention of ARP spoofing: A probe packet based technique","authors":"P. Pandey","doi":"10.1109/IADCC.2013.6514211","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514211","url":null,"abstract":"In today's competitive world consideration of maintaining the security of information is must. Nowadays LAN is generally the most common and popular network domain. Network domains are always prone to number of network attacks. One of the most dangerous form of such network attacks is ARP Cache Poisoning also known as ARP Spoofing. ARP is a stateless protocol and ARP Spoofing takes place mainly because it lacks any mechanism of verifying the identity of sending host. It has been seen that most of the LAN attacks results from ARP Spoofing. So prevention, detection and mitigation of this problem can stop number of network attacks. ARP Spoofing is the act of vindictively changing the IP,MAC associations stored in ARP cache of any network host. In this paper we have proposed a probe based technique with an Enhanced Spoof Detection Engine (E- SDE) which not only detects ARP Spoofing but also identifies the genuine IP,MAC association. ARP and ICMP packets have been used as probe packets. Working of E-SDE is explained with the help of algorithm. We have also proposed an attacking model to clearly understand the incremental development of E-SDE to work effectively against most of the type of attackers. We have also measured the network traffic added by the proposed technique.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127216116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
An efficient wavelet based approach for texture classification with feature analysis 基于小波特征分析的纹理分类方法
2013 3rd IEEE International Advance Computing Conference (IACC) Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514389
M. Shaikhji Zaid, R. Jagadish Jadhav, P. Deore
{"title":"An efficient wavelet based approach for texture classification with feature analysis","authors":"M. Shaikhji Zaid, R. Jagadish Jadhav, P. Deore","doi":"10.1109/IADCC.2013.6514389","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514389","url":null,"abstract":"Textures play important roles in many image processing applications, since images of real objects often do not exhibit regions of uniform and smooth intensities, but variations of intensities with certain repeated structures or patterns, referred to as visual texture. The textural patterns or structures mainly result from the physical surface properties, such as roughness or oriented structured of a tactile quality. It is widely recognized that a visual texture, which can easily perceive, is very difficult to define. The difficulty results mainly from the fact that different people can define textures in applications dependent ways or with different perceptual motivations, and they are not generally agreed upon single definition of texture [1]. The development in multi-resolution analysis such as Gabor and wavelet transform help to overcome this difficulty [2]. In this paper it describes that, texture classification using Wavelet Statistical Features (WSF), Wavelet Co-occurrence Features (WCF) and to combine both the features namely Wavelet Statistical Features and Wavelet Co-occurrence Features of wavelet transformed images with different feature databases can results better [2]. And further the Features are analyzed introducing Noise (Gaussian, Poisson, Salt n Paper and Speckle) in the image to be classified. The result suggests that the efficiency of Wavelet Statistical Feature is higher in classification even in noise as compared to other Features efficiency. Wavelet based decomposing is used to classify the image with code prepared in MATLAB.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125091732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Intelligent computing in a system of systems environment: A case of tourism industrial analysis and policy making 系统环境下的智能计算:旅游产业分析与决策案例
2013 3rd IEEE International Advance Computing Conference (IACC) Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514195
L. Bai
{"title":"Intelligent computing in a system of systems environment: A case of tourism industrial analysis and policy making","authors":"L. Bai","doi":"10.1109/IADCC.2013.6514195","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514195","url":null,"abstract":"As computer and information technologies advance, intelligent computing begins to play more and more important role in industrial management. However, new phenomena continue to emerge in many industries' evolution processes, thereby limiting the effectiveness of conventional systems approaches as a basis for intelligent computing applications. Therefore, it becomes critical to recognize the nature and manifestation of a system of systems (SoS) environment, and to develop a corresponding pathway to holistic intelligent computing methodology. This paper discusses the intelligence computing process and suggests that the key application fields in challenging system of systems environment include SoS complexity, indistinction of component boundaries, hidden systems processes, holistic emergent behaviors, uncertainty and unpredictability. Furthermore, taking tourism as an example of typical complex industrial SoS, a technical system of systems engineering framework is presented as a basis for industrial analysis and policy making process. The framework focuses: 1) SoS virtualization through geographical intelligent computing; 2) SoS process simulation using network algorithms; 3) SoS evaluation though progressive analysis approach. This integrated methodology is to be tested in empirical study. Though SoS engineering remains full of challenges and opportunities, exploration of its role and its coupling with intelligent computing in complex task of managing industrial systems will have tremendous influence to management discipline.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"33 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126068494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Visual Cryptographic shares using Public Key Encryption 使用公钥加密保护可视化加密共享
2013 3rd IEEE International Advance Computing Conference (IACC) Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514382
K. Kaur, V. Khemchandani
{"title":"Securing Visual Cryptographic shares using Public Key Encryption","authors":"K. Kaur, V. Khemchandani","doi":"10.1109/IADCC.2013.6514382","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514382","url":null,"abstract":"The Visual Cryptography Scheme is a secure method that encrypts a secret document or image by breaking it into shares. A distinctive property of Visual Cryptography Scheme is that one can visually decode the secret image by superimposing shares without computation. By taking the advantage of this property, third person can easily retrieve the secret image if shares are passing in sequence over the network. The project presents an approach for encrypting visual cryptographically generated image shares using Public Key Encryption. RSA algorithm is used for providing the double security of secret document. Thus secret share are not available in their actual form for any alteration by the adversaries who try to create fake shares. The scheme provides more secure secret shares that are robust against a number of attacks & the system provides a strong security for the handwritten text, images and printed documents over the public network.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122892760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Goodwill based scheduling algorithm for economy grid 基于商誉的经济网格调度算法
2013 3rd IEEE International Advance Computing Conference (IACC) Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514194
S. Bansal, C. Hota
{"title":"Goodwill based scheduling algorithm for economy grid","authors":"S. Bansal, C. Hota","doi":"10.1109/IADCC.2013.6514194","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514194","url":null,"abstract":"The conventional deadline and budget constrained scheduling heuristics for economics-based computational grids do not consider goodwill of resources, that could lead to an increase in application cost and execution time. This paper proposes a new scheduling algorithm that not only considers resource cost and time but also considers goodwill when resources are selected. Resources goodwill is calculated based on their past performances. Goodwill is broader and more representative characteristic than reliability of a resource to use as criterion for selecting the resource for execution. Goodwill criterion takes into account “on time performance” of a resource calculated as real time basis where reliability criterion works on a predefined static term expressed by the system designer. The Gridsim toolkit, standard workload model and resource configuration was used to simulate the grid environment and application. The experimental results show that the average overall time and cost of parallel tasks are lesser than existing approaches.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"425 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122796731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信