{"title":"A new secure model for quantum key distribution protocol","authors":"R. Sharma, Asok De","doi":"10.1109/ICIINFS.2011.6038114","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038114","url":null,"abstract":"All Classical cryptographic methods used in our life based on mathematical ideas & computational assumption are actually unsafe, so quantum cryptography is proposed nowadays Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. QKD will be an important part of future cryptographic infrastructures. It can provide long-term confidentiality for encrypted information without reliance on computational assumptions. Although QKD still requires authentication to prevent man-in-the-middle attacks. Firstly, In this paper At quantum key distribution protocol process is introduced. Secondly, several improvements to the basic steps of two references are reviewed because of its defects, mainly about identity authentication in order to prevent communication partners' counterfeit, including errors removing, estimating Attacker's information, secrecy enhancement, etc. At last, based upon original improvements reserved selectively, the whole process of quantum key distribution protocol after improvement & then comparison is introduced in detail.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133392845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A microcontroller based power electronic controller for PV assisted DC motor control","authors":"S. Krithiga, N. A. Gounden","doi":"10.1109/ICIINFS.2011.6038122","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038122","url":null,"abstract":"A PIC microcontroller based closed loop speed control scheme has been developed for the speed control of a separately excited DC motor fed from PV array. An IGBT based boost converter is used as an interface between PV array and the DC motor. The microcontroller has been programmed to automatically vary the duty cycle of the boost converter depending upon the set/required speed of the motor. The DC motor model has been developed and the complete simulink model of the proposed scheme has been built using MATLAB/PSB. Simulation studies and experimental investigations have been carried out on a laboratory size prototype separately excited DC motor fed from a PV array and the results are presented. The comparison of experimental and simulation results shows very close agreement between the two thus validating the controller proposed.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116865092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wyner-Ziv based error correction of non-key frames for low complexity streaming applications","authors":"M. B. Dissanayake, S. Worrall, W. Fernando","doi":"10.1109/ICIINFS.2011.6038115","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038115","url":null,"abstract":"The paper presents a novel error robustness method for H.264/AVC video data, based on the redundant data encoding concept. The proposed redundant data codec incorporates the Wyner-Ziv (WZ) theory and motion vectors (MV) of the H.264/AVC scheme. The performance of the proposed method is evaluated under both error free and error prone Internet Protocol (IP) Packet network environments. The proposed architecture improves the error recovery of the system in terms of objective quality. Furthermore, the simulation outcome shows that the proposed method outperforms the existing redundant coding method of JSVM by 0.7 dB in an error free environment and by 0.4 dB in a 10% packet loss rate (PLR) environment with medium and high motion sequences.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128588811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Dissanayake, Shoudong Huang, Zhan Wang, Ravindra Ranasinghe
{"title":"A review of recent developments in Simultaneous Localization and Mapping","authors":"G. Dissanayake, Shoudong Huang, Zhan Wang, Ravindra Ranasinghe","doi":"10.1109/ICIINFS.2011.6038117","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038117","url":null,"abstract":"Simultaneous Localization and Mapping (SLAM) problem has been an active area of research in robotics for more than a decade. Many fundamental and practical aspects of SLAM have been addressed and some impressive practical solutions have been demonstrated. The aim of this paper is to provide a review of the current state of the research on feature based SLAM, in particular to examine the current understanding of the fundamental properties of the SLAM problem and associated issues with the view to consolidate recent achievements.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131591556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal design and control of multiple boiler systems using fuzzy-evolutionary hybrid algorithm","authors":"A. Perera, P. Kumarage, K. Perera","doi":"10.1109/ICIINFS.2011.6038097","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038097","url":null,"abstract":"Optimal load management of energy system is been widely discussed due to the higher depletion rate of fossil fuel resources and ever increasing energy demands. In such circumstances, optimal design and control of boiler systems play a major role. New algorithm based on fuzzy-evolutionary hybrid techniques is being introduced in this study to carry out this work. Detailed energy flow and lifecycle cost model was introduced in order to support the optimization. Finally, optimization algorithm was tested for two different load curves and obtained results were discussed.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133086539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protocol implementation for Short Message Service over IP","authors":"Roshan D'Souza, B. Kariyappa, B. Kumar, M. Kumari","doi":"10.1109/ICIINFS.2011.6038110","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038110","url":null,"abstract":"The Short Message Service (SMS) is one of the most successful services in existing cellular networks. The SMS provides a means of sending messages of limited size to and from Global System for Mobile Communications (GSM) or Universal Mobile Telecommunications System (UMTS) phones. SMS technology has evolved out of the GSM standard and presently, the 3rd Generation Partnership Project (3GPP) maintains the SMS standards. Because of its ease to use and cost effectiveness SMS has become one of the popular services in the mobile communication world. The main objective of this paper is to introduce a methodology to provide Short Message Service over Internet Protocol (SoIP) network, which is addressed to mobile or soft phone users connected over IP network. The proposed method is based on sending SMS directly to the Short Message Switching Centre (SMSC) using the Short Message Peer to Peer (SMPP) communication protocol over IP network. SMPP protocol design has been coded in Java/Microsoft Visual Basic and simulated in Android Mobile Simulator. The design is synthesized using Eclipse Integrated Development Environment (IDE) with Android development plug-in. The results obtained are validated against design specifications. At present SoIP system is tested on Android mobile simulator and the work is underway in implementing the solution on Android mobile platform. Using this method, direct communication with SMSC, higher degree of message throughput and reduced cost per SMS can be achieved.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133158378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of three evolutionary algorithms for harmonic mitigation using SAPF","authors":"Rambir Singh, Ashutosh Kumar Singh, Pradeep Kumar","doi":"10.1109/ICIINFS.2011.6038100","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038100","url":null,"abstract":"For power quality improvement, shunt active power filters (SAPF) having PWM controlled voltage source inverter (VSI) topology is extensively used in distribution networks, which utilizes the PI controller for reference voltage tracking. PI controller tuning with the assumption of linear PWM model leads to unsatisfactory results under varying operating conditions. Optimal tuning of PI gains is required to get the best response of PI controllers. This paper presents a comparative study of PI controller tuning in a SAPF using three evolutionary algorithms (EAs), viz. bacteria foraging (BF), bacteria foraging with swarming (BFS) and particle swarm optimisation (PSO), for current harmonic mitigation. The minimization of integral time square error (ITSE) and integral time absolute error (ITAE) as performance indices is used as objective function for optimisation. The simulation results show that PSO tuned PI with ITSE as minimized parameter performs better.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"52 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132076636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of spectrum sensing in cognitive radio","authors":"L. Perera, H.M.A. Herath","doi":"10.1109/ICIINFS.2011.6038031","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038031","url":null,"abstract":"The frequency spectrum bandwidth used in modern wireless systems is limited while the number of wireless systems is rapidly increasing. In order to alleviate the spectrum scarcity, secondary systems can opportunistically access the temporarily unused licensed bands of primary systems which are known as spectrum holes or white spaces, by altering their transmitting parameters so that the interference is minimal to primary user while coordinating access to this channel with other cognitive radio (CR) users in the vicinity. Spectrum sensing is necessary to enable dynamic spectrum access without interfering with primary users. This optimizes the use of available radio frequency spectrum while minimizing interference to other licensed or unlicensed users by detecting and utilizing only the white spaces. This paper explores various sensing methods, their performance, applicability and effectiveness under different transmission conditions and advantages and disadvantages incorporated with each sensing method.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129158975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. M. P. B. Ranasinghe, K. Abeyrathne, A. Bandara, K. Narampanawe
{"title":"An empirical characterization of wireless objects localization","authors":"H. M. P. B. Ranasinghe, K. Abeyrathne, A. Bandara, K. Narampanawe","doi":"10.1109/ICIINFS.2011.6038082","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038082","url":null,"abstract":"The free-space path loss is proportional to the square of the distance between a wireless transmitter and a receiver. The mathematical model of that can be used to determine the signal intensity of transmitted radio signal at a definite distance from the transmitting antenna. Nevertheless different environments present multipath effects and other active/ passive interferences that affect Received Signal Strength (RSS). Therefore pure mathematical models become less robust for object localization. The objective of this research was to conduct an empirical analysis based on received signal strength measurements in different environments using various wireless transmitters and receivers. Robust localization algorithm is developed by analyzing empirically obtained data sets. The system is tested for different terrains and frequencies with calibration.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128650542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Kumarage, S. Fernando, P. Fernando, D. Madushanka, R. Samarasinghe
{"title":"Real-time sign language gesture recognition using still-image comparison & motion recognition","authors":"D. Kumarage, S. Fernando, P. Fernando, D. Madushanka, R. Samarasinghe","doi":"10.1109/ICIINFS.2011.6038061","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038061","url":null,"abstract":"A sign language is a language which uses visually transmitted sign patterns, instead of acoustically conveyed sound patterns, to deliver the meaning. Sign languages are typically constructed by simultaneous combination of hand shapes, orientations and movements of the hands, arms or body, with facial expressions to fluidly express a speaker's thoughts. This paper presents a less costly approach to develop a computer vision based sign language recognition application in real time context with motion recognition. We explore new concepts of breaking down motion gestures to sub components for parallel processing and mapping motion data into static data representations. This concept can be used to identify sign language gestures, without performing computational intensive tasks of each and every frame captured. Moreover, sign language gestures can be evaluated with minimal image processing and map the motion to linear/non-linear equations using functionalities proposed in this paper.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116374235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}