2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)最新文献

筛选
英文 中文
N-Curve Analysis of Low power SRAM Cell 低功耗SRAM电池的n曲线分析
D. Anitha, K. M. Chari, P. Kumar
{"title":"N-Curve Analysis of Low power SRAM Cell","authors":"D. Anitha, K. M. Chari, P. Kumar","doi":"10.1109/ICICCT.2018.8473215","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473215","url":null,"abstract":"In this paper, a low power SRAM cell is proposed, whose leakage power is almost negligible compared to that of conventional 6T SRAM cell. All the stability parameters like static voltage noise margin(SVNM), static current noise margin(SINM), write trip voltage (WTV) and write trip current (WTI) are calculated using N-curve analysis. A better write stability is achieved for the proposed cell than 6T SRAM cell with a slight reduction in the read stability. The N-curves are plotted under different process corners and different temperatures. The standby power of the 6T SRAM cell and proposed SRAM cell is 6.22nW and 4.23uW respectively. Therefore, for low standby power applications the proposed cell is more suitable. Cadence tools are used for simulation of SRAM cells with gpdk 45-nm technology.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127164401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis on Periodic Web Personalization for the Efficiency of Web services 基于周期性Web个性化的Web服务效率分析
Y. Rajul, D. Babu, K. Anuradha
{"title":"Analysis on Periodic Web Personalization for the Efficiency of Web services","authors":"Y. Rajul, D. Babu, K. Anuradha","doi":"10.1109/ICICCT.2018.8473276","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473276","url":null,"abstract":"World Wide Web is an endless network and has numerous browsing categories. But, the information available on the web is not appropriate to all categories of web surfers. Also, retrieving the data and documents for a particular user at a specific period of time is very important. Relevant, customized and specific information made available to the specific category of users to their satisfactory levels along with time optimization is called Web Personalization. Data, information, Knowledge and Web services made accessible and producing personalized output for individual users or groups of users for the following developments of web: Efficiency, Accuracy, Productivity etc.,. The assessment of Internet usage in temporal and periodic way is essential to determine the above parameters for web service providers. We propose a potential technique for extraction of periodic web usage of individual users. This is a different way to extract user changes and personalization on the web periodically.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"10 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123263164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Protecting Agents from Malicious Hosts using Trusted Platform Modules (TPM) 使用可信平台模块(TPM)保护代理免受恶意主机攻击
M. Shaik
{"title":"Protecting Agents from Malicious Hosts using Trusted Platform Modules (TPM)","authors":"M. Shaik","doi":"10.1109/ICICCT.2018.8473278","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473278","url":null,"abstract":"Software agents represent an assured computing paradigm that tends to emerge to be an elegant technology to solve present day problems. The eminent Scientific Community has proved us with the usage or implementation of software agent's usage approach that simplifies the proposed solution in various types to solve the traditional computing problems arise. The proof of the same is implemented in several applications that exist based on this area of technology where the software agents have maximum benefits but on the same hand absence of the suitable security mechanisms that endures for systems that are based on representation of barriers exists in the paradigm with respect to present day industry. As the application proposing present security mechanisms is not a trivial one as the agent based system builders or developers who are not often security experts as they subsequently do not count on the area of expertise. This paper presents a novel approach for protecting the infrastructure for solving the issues considered to be malicious host in mobile agent system by implementing a secure protocol to migrate agents from host to host relying in various elements based on the enhanced Trusted Platforms Modules (TPM) for processing data. We use enhanced extension to the Java Agent Development framework (JADE) in our proposed system and a migrating protocol is used to validate the proposed framework (AVASPA).","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124091556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Enhanced Energy Efficient OSPF Algorithm for Wireless Sensor Network 面向无线传感器网络的增强节能OSPF算法
Ashutosh Anand, Himanshu Garg, Vinay Joshi, Sanjay Kumar
{"title":"Enhanced Energy Efficient OSPF Algorithm for Wireless Sensor Network","authors":"Ashutosh Anand, Himanshu Garg, Vinay Joshi, Sanjay Kumar","doi":"10.1109/ICICCT.2018.8473348","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473348","url":null,"abstract":"Wireless sensor network is a group of sensors which has the characteristic of sensing the data, then processing it and finally communicating the data according to the desired application. These sensors are connected in distributed form which basically performs four major tasks which are aggregation of data, sending and receiving data, and data processing inside the network. Many research have already been done related to making the sensor network more energy efficient. The major issue of wireless sensor network nowadays in terms of application is increasing the lifetime of sensors in the network by decreasing their energy consumption. In this paper an approach is used for making the enhanced version of OSPF (open shortest path first) algorithm more fruitful than the LEACH protocol and when direct transmission between the nodes are done.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122210008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
R Peak Detection using Empirical Mode Decomposition with Shannon Energy Envelope 基于Shannon能量包络的经验模态分解R峰值检测
K. Kumari, S. Sahu, R. Sinha
{"title":"R Peak Detection using Empirical Mode Decomposition with Shannon Energy Envelope","authors":"K. Kumari, S. Sahu, R. Sinha","doi":"10.1109/ICICCT.2018.8473279","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473279","url":null,"abstract":"R peak is an important parameter of ECG for monitoring the cardiac health. In this paper we present R peak detection algorithm from electrocardiogram (ECG) signal using Empirical Mode Decomposition (EMD) with combination of Shannon Energy Envelope. In this algorithm the ECG signal is decomposed by using the EMD and for highlighting the QRS complex we have take summation of first three Intrinsic Mode Functions (IMFs). The Shannon energy envelope is used for obtaining the envelope for detection of R peaks. MIT-BIH arrhythmia database is used for evaluation of proposed algorithm and compared with existing techniques. The comparison results shows that the proposed methodology is superior providing sensitivity of 97.85 %, positive predictive rate of 98.15% and accuracy of 98.19% of our proposed algorithm.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134137695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Overview of DC Microgrid as a Conceivable Future Power System 直流微电网作为一种可想象的未来电力系统概述
S. Choudhury, S. Nayak, Tara Prasanna Dash, P. Rout
{"title":"Overview of DC Microgrid as a Conceivable Future Power System","authors":"S. Choudhury, S. Nayak, Tara Prasanna Dash, P. Rout","doi":"10.1109/ICICCT.2018.8473326","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473326","url":null,"abstract":"Diminution in conventional fuels likely petroleum and fossil fuel, global warming due to green house gas effusion and ozone layer degradation has led to shift in power generation from conventional to renewable source based generation. Further integration of power storage systems had led to emergence of Microgrid. DC Microgrid is preferably gaining popularity due to advancement in semiconductor devices and simpler configurable structure. This paper provides a comprehensive idea about DC Microgrid structure, control, protection and possible prospects to meet future expectations of the power system along with the inspiration that guided towards the study of DC Microgrid.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131286077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative Study on Data Mining Classification Algorithms for Predicting Road Traffic Accident Severity 道路交通事故严重程度预测的数据挖掘分类算法比较研究
Tadesse Kebede Bahiru, Dheeraj Kumar Singh, Engdaw Ayalew Tessfaw
{"title":"Comparative Study on Data Mining Classification Algorithms for Predicting Road Traffic Accident Severity","authors":"Tadesse Kebede Bahiru, Dheeraj Kumar Singh, Engdaw Ayalew Tessfaw","doi":"10.1109/ICICCT.2018.8473265","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473265","url":null,"abstract":"According to World Health Organization report the number of deaths by road traffic accident is more than 1.25 million people and every year with non-fatal accidents affecting more than 20–50 million people. Several factors are contributed on the occurrence of road traffic accident. In this study, data mining classification techniques applied to establish models (classifiers) to identify accident factors and to predict traffic accident severity using previously recorded traffic data. Using WEKA (Waikato Environment for Knowledge Analysis) data mining decision tree (J48, ID3 and CART) and Naïve Bayes classifiers are built to model the severity of injury. The classification performance of all these algorithms is compared based on their results. The experimental result shows that the accuracy of J48 classifier is higher than others.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129837331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
De-Militarized Zone: A Next Level to Network Security 非军事区:网络安全的新阶段
Krati Dadheech, Arjun Choudhary, Gaurav Bhatia
{"title":"De-Militarized Zone: A Next Level to Network Security","authors":"Krati Dadheech, Arjun Choudhary, Gaurav Bhatia","doi":"10.1109/ICICCT.2018.8473328","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473328","url":null,"abstract":"In recent years, due to rapid enhancement in computer technology, network security has become a big concern for any organization. As a result, most of the organizations are investing billions of dollars every year to get strengthen their network infrastructure. Now, when we look into this problem, one of the possible solutions which can be thought off as is to implement industrial level De-Militarized Zone. The De-Militarized Zone is a process of building up a semi-secure network which works as the first line of defense to protect the internal infrastructure of any organization from external threats. By implementing this small and efficient technique, many network security problems can be resolved at first sight. This paper provides an insight view of different levels of DMZ design and based on these design levels, a small DMZ model has been proposed to enhance the internal security of an organization keeping common network security problems in mind.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"46 43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132470602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Transient Response Improvement of DC to DC Converter by Using Auto-tuned PID Controller 用自整定PID控制器改善DC - DC变换器的瞬态响应
Prashant Malik, S. S. Gawas, Imran AltafPatel, Ninad P Parsekar, Akshay A Parab, Shubham S Parkar
{"title":"Transient Response Improvement of DC to DC Converter by Using Auto-tuned PID Controller","authors":"Prashant Malik, S. S. Gawas, Imran AltafPatel, Ninad P Parsekar, Akshay A Parab, Shubham S Parkar","doi":"10.1109/ICICCT.2018.8473075","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473075","url":null,"abstract":"The DC-DC converters are extensively used in modern telecommunication and consumer electronics. Stability is one of the most aspect in designing of automatic control of DC-DC buck converter. In this paper a discrete auto-tuning PID scheme is developed for DC-DC converters for fast response time. When the required output does not follow the set point, a controller for synchronous buck converter is to be used with objective of keeping the error as minimum. The algorithm is used for the tuning discrete PID controller to obtain its parameters with a minimum error and is applied to Synchronous buck converter to improve its performance. For fast transient response, settling time and rise time of the Converter, the controller gains are continuously modified. For its implementation a buck converter is designed and its MATLAB/Simulink model is developed. The simulation results describes the effectiveness of the developed algorithms.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132506603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Weather Forecasting Using Artificial Neural Network 利用人工神经网络进行天气预报
Dires Negash Fente, Dheeraj Kumar Singh
{"title":"Weather Forecasting Using Artificial Neural Network","authors":"Dires Negash Fente, Dheeraj Kumar Singh","doi":"10.1109/ICICCT.2018.8473167","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473167","url":null,"abstract":"Accurate weather forecast plays a vital role in today's world as agricultural and indusrial sectors are principally dependent on weather conditions. It is also used to forecast and warm about natural disasters. Weather forecasting is determination of the right values of weather parameters and furhermore the future weather condition based on these parameters. In this study different weather parameters were collected from national climate data center then using Long-short term memory(LSTM) technique, the neural network is trained for different combinations. In prediction of future weather condition using LSTM the neural network is trained using different combinations of weather parameters, the weather parameters used are temperature, precipitation, wind speed. pressure, dew point visibility and humidity. After training of LSTM model using these parameters the prediction of future weather is done.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132893095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信