International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)最新文献

筛选
英文 中文
Design of low power current starved VCO with improved frequency stability 提高频率稳定性的低功率缺流压控振荡器设计
R. Jagtap, S. Pable
{"title":"Design of low power current starved VCO with improved frequency stability","authors":"R. Jagtap, S. Pable","doi":"10.1109/ICRAIE.2014.6909152","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909152","url":null,"abstract":"Voltage Controlled Oscillator (VCO) plays a vital role in deciding the performance of VLSI circuits. Lot of research work is carried out on VCO from the past decades to achieve higher frequency, low power, low operating voltage, lower phase noise, and to increase tuning range. This paper mainly explores design of current starved voltage controlled ring oscillator for ultra low power applications. The performance comparison is done with respect to frequency stability and power consumption characteristics at 32nm technology node. Proposed C.S.D.T connection of VCO shows 48% higher speed at the cost of 18.9% increased power consumption over conventional VCO at VDD = 0.4V. Furthermore, this paper explores effect of temperature variations on VCO performance. Proposed VCO shows less sensitivity to temperature variation over conventional VCO.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132372481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Comparison of classification techniques for intrusion detection dataset using WEKA 基于WEKA的入侵检测数据集分类技术比较
Tanya Garg, Surinder Singh Khurana
{"title":"Comparison of classification techniques for intrusion detection dataset using WEKA","authors":"Tanya Garg, Surinder Singh Khurana","doi":"10.1109/ICRAIE.2014.6909184","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909184","url":null,"abstract":"As the network based applications are growing rapidly, the network security mechanisms require more attention to improve speed and precision. The ever evolving new intrusion types pose a serious threat to network security. Although numerous network security tools have been developed, yet the fast growth of intrusive activities is still a serious issue. Intrusion detection systems (IDSs) are used to detect intrusive activities on the network. Machine learning and classification algorithms help to design “Intrusion Detection Models” which can classify the network traffic into intrusive or normal traffic. In this paper we present the comparative performance of NSL-KDD based data set compatible classification algorithms. These classifiers have been evaluated in WEKA (Waikato Environment for Knowledge Analysis) environment using 41 attributes. Around 94,000 instances from complete KDD dataset have been included in the training data set and over 48,000 instances have been included in the testing data set. Garrett's Ranking Technique has been applied to rank different classifiers according to their performance. Rotation Forest classification approach outperformed the rest.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114943939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Secret communication using Public Key steganography 使用公钥隐写术的秘密通信
Madhusudhan Mishra, G. Tiwari, A. Yadav
{"title":"Secret communication using Public Key steganography","authors":"Madhusudhan Mishra, G. Tiwari, A. Yadav","doi":"10.1109/ICRAIE.2014.6909252","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909252","url":null,"abstract":"This paper introduces a new steganographic technique for secret data communication based on Public Key Digital Image steganography by combining public key cryptography with Digital Image Steganography. The proposed scheme employs RSA algorithm with 1024 bits key size for secret data encryption before inserting it into cover image and F5 steganographic technique to hide the encrypted message inside the cover image imperceptibly. The F5 algorithm embeds the message into randomly chosen Discrete Courier Transform (DCT) coefficients. By employing matrix embedding which minimizes the changes to be made to the length of certain message, it provides high Steganographic capacity, faster speed and can prevent visual and statistical attacks. The encryption key used in message encryption is big enough to thwart known cryptanalytic attacks. Experiments suggest that the stego image and cover images are perceptually similar. Further, the stego images are robust against image processing distortions.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"262 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116373994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Applicability of wavelet transform in Multi-Resolution Motion estimation technique 小波变换在多分辨率运动估计中的应用
H. Kumar, Prativa Rai, D. Sarma, G. Thapa
{"title":"Applicability of wavelet transform in Multi-Resolution Motion estimation technique","authors":"H. Kumar, Prativa Rai, D. Sarma, G. Thapa","doi":"10.1109/ICRAIE.2014.6909211","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909211","url":null,"abstract":"The lossy compression scheme is often used to compress data such as digital image and video. Such a video compression scheme based on the wavelet transform is presented in this paper. The multi-resolution/multi-frequency nature of the discrete wavelet transform is an ideal tool for representing images and video signals. Wavelet transform decomposes a video frame into a set of sub-frames with different resolutions corresponding to different frequency bands. These multi-resolution frames also provide a representation of the global motion structure of the video signal at different scales. The motion activities for a particular sub-frame at different resolutions are different but highly correlated since they actually specify the same motion structure at different scales. In the multi-resolution motion compensation approach, motion vectors in higher resolution are predicted by the motion vectors in the lower resolution and are refined at each step. In this paper, we propose a variable block-size MRMC (Multi-Resolution Motion Compensation) scheme. The approximate sub-image which carries the maximum information of the image sequence is compensated using the smallest block size and the other approximate sub-images are compensated using relatively bigger block sizes. The motion vectors of the approximate sub-images in lower resolution are used for motion compensation of their corresponding sub-images. This scheme considerably reduces the computing load, storage and transmission bandwidth. During transmission of an image sequence, only the residual image after motion compensation and the motion vector of the first level decomposition need to be transmitted to the decoder in order to reconstruct the original image. The simulation results show that the proposed approach has a satisfactory performance in terms of peak-to-peak signal-to-noise ratio (PSNR).","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114635086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy efficient communication protocol for wireless sensor networks with mobile node 具有移动节点的无线传感器网络节能通信协议
Hiren Kumar Deva Sarma, Prativa Rai, Bhupesh Deka
{"title":"Energy efficient communication protocol for wireless sensor networks with mobile node","authors":"Hiren Kumar Deva Sarma, Prativa Rai, Bhupesh Deka","doi":"10.1109/ICRAIE.2014.6909210","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909210","url":null,"abstract":"Wireless Sensor Networks have become hot research stuff in the current age. This field has got tremendous scopes in various application areas. Generally, a Wireless Sensor Network contains hundreds or thousands of sensing nodes. It is desirable to make these nodes cheaper. This fact also instigates design of simple and yet efficient algorithms and protocols for data communication over the sensor network and also for the successful operation of the network. Though the sensor nodes are expected to be static throughout, the mobility of the sensor nodes gives rise to some more sophisticated applications like better environment monitoring and tracking.The mobility of the sensor nodes increases the complexity in the design of the algorithms and protocols since it increases the rate of topology change. In this paper, sensor node mobility is considered and a routing protocol for such a mobile sensor network has been proposed.The base station is considered to be powerful as well as static. The proposed routing protocol is hierarchical. The formation of clusters and cluster head node selection are done by the base station. During the clustering process, the sensor field is divided into some virtual grids. The sensor node mobility factor is considered during the cluster formation process. The communication between ordinary sensor nodes and the cluster head node is carried out in single hop fashion. And depending on the current topology, the communication between the cluster head node and the base station may be of multi-hop fashion. The performance of the proposed protocol in terms of energy efficiency is observed through simulation. The results of simulation are reported here. The future scope of the work is outlined.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"2022 40","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134413095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Energy efficient techniques for greener wirelesss cellular networks 绿色无线蜂窝网络的节能技术
Priya Singhal, V. Bohara
{"title":"Energy efficient techniques for greener wirelesss cellular networks","authors":"Priya Singhal, V. Bohara","doi":"10.1109/ICRAIE.2014.6909285","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909285","url":null,"abstract":"Recent analysis revealed that the current wireless networks are not very energy efficient.From the network operator's perspective, energy consumption forms portion of their OPEX(Operational Expenses).The consumption has negative impact on the environment to increased carbon footprints worldwide.This motivated a process known as “green radio communication” which focuses on improving the energy efficiency and reducing the gases such as carbon dioxide (CO2) emissions. There are several methods that can substantially reduce the energy consumption. This article focuses on background of some of the energy conservation techniques used in wireless cellularnetworks that is 1) using renewable sources of energy at the base station such as locally generated wind/ power,2) dynamic operation of the base station switching on and off their resources depending on the traffic load conditions, 3) energy efficient cooperative routing, of the base stations with different cell sizes and management and mitigation.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133130720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimal placement and sizing of SVC for loss minimization and voltage security improvement using differential evolution algorithm 基于差分进化算法的SVC最小损耗和电压安全性优化布局与尺寸
Shraddha Udgir, L. Srivastava, M. Pandit
{"title":"Optimal placement and sizing of SVC for loss minimization and voltage security improvement using differential evolution algorithm","authors":"Shraddha Udgir, L. Srivastava, M. Pandit","doi":"10.1109/ICRAIE.2014.6909310","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909310","url":null,"abstract":"The emerging trend of restructuring power systems, security is becoming a major concern for electric utilities. The security assessment of power system is being considered as an important problem in planning, operation and control. Security assessment entails that the system should remain in secure operating state under abnormal conditions. In a power system the Security assessment is carried out by using the voltage performance index (VPI) following a contingency. Contingencies are termed as the uncertain events, occurred due to line outage in the system. VPI can be used for identifying the critical contingency from the perspective of bus voltage violation limits. Flexible Alternating Current Transmission Systems (FACTS) devices are having a great impact on the performance of the transmission network. FACTS devices are used for controlling real and reactive power flows and regulating the bus voltages in power systems. Also, FACTS devices raises power transfer capability reduces system losses and improves system stability, because of their fast and flexible control characteristics. Owing to their huge capital cost, it is essential to place these devices optimally in a power system. In this paper, Differential Evolution (DE), a population based stochastic meta-heuristic optimization algorithm is applied for optimal placement of static var compensator (SVC) aimed to the voltage security enhancement of a power system. The SVC placement is considered to be a planning problem and is formulated as a multi-criteria problem comprising of minimization of real power loss, voltage security and investment cost of SVC under single line outage contingencies. Effectiveness of the DE algorithm based approach has been demonstrated on IEEE 30-bus test system.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125526143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
An energy efficient zone-based clustering approach for target detection in wireless sensor networks 一种高效的基于区域的无线传感器网络目标检测聚类方法
Pradeep Gangwar, Yashwant Singh, Vandana Mohindru
{"title":"An energy efficient zone-based clustering approach for target detection in wireless sensor networks","authors":"Pradeep Gangwar, Yashwant Singh, Vandana Mohindru","doi":"10.1109/ICRAIE.2014.6909135","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909135","url":null,"abstract":"Target tracking is one of the challenging issues in WSN. The goal of using the sensor network over a region is to provide location of the detected object and to provide the real time report. In this paper we proposed an energy efficient algorithm for deciding the cluster and the head which is based on Zone formation. A node is elected as cluster head on the basis of highest residual energy in each zone. Proposed approach produces a method of tracking in which only those nodes are active which are able to sense the target in their sensing range and while acting these nodes calculates its distance from the target with the help of RSS (received signal strength) and send it to the corresponding head and this Cluster Head locate the target using the concept of “Trilateration”.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"2289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130289030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
High efficient AC/DC Converter For micro-hydro-power plant for DC grid 微型水电厂直流电网用高效交直流变换器
Vijendra Kumar Dubey, Ankit Singhal, H. Suryawanshi
{"title":"High efficient AC/DC Converter For micro-hydro-power plant for DC grid","authors":"Vijendra Kumar Dubey, Ankit Singhal, H. Suryawanshi","doi":"10.1109/ICRAIE.2014.6909163","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909163","url":null,"abstract":"In this paper, a single-phase two-stage zero-voltage-transition zero-current-transition pulse-width-modulation power-factor-correction (ZVT-ZCT-PWM-PFC) AC/DC boost converter with active snubber cell is presented, which can be interfaced with micro-hydro power plant and can be used for telecommunication, data center, and commercial building applications. Snubber cell facilitate all semiconductor switches to undergo soft-switching for every switching period. Proposed Converter operates in continuous-conduction-mode (CCM) and uses average current control scheme for PFC. Nearly unity-power-factor (UPF) operation is achieved for wide range of load. Design and analysis of a ZVT-ZCT-PWM PFC boost converter rated at 1 kW, output voltage 400 V, operating at 100 kHz, fed from AC voltage of 230 V RMS is presented. Proposed schematic is simulated in PSIM 9.0 and simulation results are provided. An efficiency of 97.8% and power factor above 0.998 is achieved at nominal power.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130323846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effective resource management technique using reservation pool 使用预留池的有效资源管理技术
Madhavi Devi Botlagunta, S. Agrawal, R. Rajeshwara Rao
{"title":"Effective resource management technique using reservation pool","authors":"Madhavi Devi Botlagunta, S. Agrawal, R. Rajeshwara Rao","doi":"10.1109/ICRAIE.2014.6909221","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909221","url":null,"abstract":"Systems where resources are shared among the processes, Deadlock often occurs due to resource contention. The existing techniques that are used to deal with it either perform stringent testing or no testing at all. In both the cases either the overhead is substantial or the technique is inefficient. This paper aims to present resource reservation technique that will reduce the overhead for deciding about the resource allocation for system consisting of shared resources. It presents a technique for resource reservation namely Worst-Case Execution Time Based Resource Reservation (ETRR). The motivational examples illustrates that the proposed technique are capable of performing resource allocation without checking the safety sequence as proposed by Banker's algorithm. The overhead of resource allocation for the proposed techniques merely O(m) as compared to Banker's algorithm of O(mn2). Further, they are able to predict a deadlock more efficiently, when some of the other existing techniques fail to do so. The simulation results indicate that the average turnaround time of the ETRR is approximately 13% better than the existing Banker's algorithm.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127293033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信