International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)最新文献

筛选
英文 中文
A new approach for flame image edges detection 一种火焰图像边缘检测的新方法
Pranev Gupta, Vilas H. Gaidhane
{"title":"A new approach for flame image edges detection","authors":"Pranev Gupta, Vilas H. Gaidhane","doi":"10.1109/ICRAIE.2014.6909178","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909178","url":null,"abstract":"In this paper, a simple and robust approach for flame image analysis is presented. It is based on the Local Binary Patterns and thresholding techniques. The main features of an image are obtained by Local Binary patterns, and two level thresholding is used to make the edges visible and clear. The simplicity and robustness of the proposed approach in noisy environment makes it suitable for the subsequent analysis of the flame features. Various experimentations are carried out on synthetic as well as real images. The results show the proposed approach gives good localization and effective edge detection as compared to the existing methods.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132325945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Evaluation of a new modified Firefly algorithm 一种新的改进的Firefly算法的评价
Divya Gupta, Medha Gupta
{"title":"Evaluation of a new modified Firefly algorithm","authors":"Divya Gupta, Medha Gupta","doi":"10.1109/ICRAIE.2014.6909251","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909251","url":null,"abstract":"Swarm based algorithms with features like easy implementation; self-organization and decentralization have led to emergent behavior successful in bridging the gap from idealistic situation to reality. Firefly Algorithm is one such new nature-inspired metaheuristic algorithms used for solving various optimization problems. It mimics the flashing behaviour of fireflies at night and was first proposed in 2008. In this work, performance of a new modified version of Firefly algorithm (MoFA) is compared with standard FA and two more versions of FA on various parameters. Results demonstrate that the new modified algorithm is superior to all the other three algorithms in all aspects.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130860303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real time condition monitoring system for tomato ripening 番茄成熟实时状态监测系统
N. Khera
{"title":"Real time condition monitoring system for tomato ripening","authors":"N. Khera","doi":"10.1109/ICRAIE.2014.6909258","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909258","url":null,"abstract":"Ripening of tomato is divided into several stages that are identified by their color index. This paper proposes a simple microcontroller based real time tomato ripening condition monitoring system which will identify ripening stages of tomato and send useful information to the farmer. RGB values of the image pixels of tomato is processed in MATLAB and are communicated to microcontroller which detects the ripening condition and finally the farmer is informed for this condition using GSM technology.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130293090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Active damped LCL filter based DSTATCOM with reduced sensors 有源阻尼LCL滤波器的DSTATCOM与减少传感器
E. Sai Sudheer Reddy, Rao E. Shanmukha, M. Ramteke
{"title":"Active damped LCL filter based DSTATCOM with reduced sensors","authors":"E. Sai Sudheer Reddy, Rao E. Shanmukha, M. Ramteke","doi":"10.1109/ICRAIE.2014.6909199","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909199","url":null,"abstract":"This paper deals with active resonance damping of LCL-filter-based DSTATCOM with reduced number of sensors, which can effectively compensate non-linear load harmonics, reactive, negative sequence current and neutral current in three-phase four wire distribution system. With an LCL-filter, additional switching frequency current components can be reduced more effectively. However, because of the resonance phenomenon of the supply filter and the DSTATCOM wide operating bandwidth, the use of the LCL filter in DSTATCOM is challenging. By selecting two similar inductance, LCL-filter design becomes more simpler. The entire system is numerically simulated using MATLAB/SIMULINK platform and the results showing the feasibility and stability of DSTATCOM LCL-filter with reduced number of sensors is presented.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127861633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data security protocol for cloudlet based architecture 基于cloudlet架构的数据安全协议
Manisha Jindal, M. Dave
{"title":"Data security protocol for cloudlet based architecture","authors":"Manisha Jindal, M. Dave","doi":"10.1109/ICRAIE.2014.6909186","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909186","url":null,"abstract":"Mobile cloud computing is a combination of mobile computing and cloud computing that provides a platform for mobile users to offload heavy tasks and data on the cloud, thus, helping them to overcome the limitations of their mobile devices. However, while utilizing the mobile cloud computing technology users lose physical control of their data; this ultimately calls for the need of a data security protocol. Although, numerous such protocols have been proposed,none of them consider a cloudlet based architecture. A cloudlet is a reliable, resource-rich computer/cluster which is well-connected to the internet and is available to nearby mobile devices. In this paper, we propose a data security protocol for a distributed cloud architecture having cloudlet integrated with the base station, using the property of perfect forward secrecy. Our protocol not only protects data from any unauthorized user, but also prevents exposure of data to the cloud owner.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131327971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Gain enhancement of a CPW - Fed horse shoe shaped slot antenna with defected ground structures for WiMax/WLAN applications 用于WiMax/WLAN应用的具有缺陷接地结构的CPW馈电马蹄形槽天线的增益增强
V. Tiwari, K. Vyas, N. Goyal
{"title":"Gain enhancement of a CPW - Fed horse shoe shaped slot antenna with defected ground structures for WiMax/WLAN applications","authors":"V. Tiwari, K. Vyas, N. Goyal","doi":"10.1109/ICRAIE.2014.6909177","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909177","url":null,"abstract":"In this paper we present, design and analysis of a coplanar waveguide (CPW) fed slot antenna for broadband applications. The technique of Defected Ground Structure (DGS) is used to enhance the gain of proposed antenna. The antenna size is compact with dimension of 30 × 43 × 1.6 mm3, built over low cost FR4-epoxy substrate with relative permittivity of εr = 4.4. The antenna covers Wireless Local Area Network (WLAN) applications including WLAN IEEE 802.11 g/a (5.15 GHz - 5.35 GHz and 5.725 GHz - 5.825 GHz) band and Worldwide Interoperability for Microwave Access (WiMAX) applications at 2.5 GHz - 2.69 GHz, 3.4 - 3.69 GHz, and 5.25 GHz - 5.85 GHz bands ; HIPERLAN/1/2 (5.150 GHz) and upper Ultra Wide Band (UWB) applications, at 3 GHz - 6 GHz Prototype of the proposed antenna is fabricated and measured for its performance evaluation. The experimental results show that impedance bandwidth (S11<; -10 dB) of antenna is 85.135%. The performance of proposed antenna (with DGS) is compared to conventional slot antenna (without DGS) in terms of reflection coefficient, radiation characteristics and gain.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129041605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Combination of encryption and digital watermarking techniques used for security and copyright protection of still image 结合加密和数字水印技术用于静态图像的安全和版权保护
S. Gonge, A. Ghatol
{"title":"Combination of encryption and digital watermarking techniques used for security and copyright protection of still image","authors":"S. Gonge, A. Ghatol","doi":"10.1109/ICRAIE.2014.6909274","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909274","url":null,"abstract":"For faster transmission of the question paper of university exam, electronic system is used along with wired or wireless network. This system avoids the physical work of staff. It helps to transport the question papers of university exam within short period of time to respected colleges. However, the issue of copyright protection and security issue arise. There are many techniques use in practice to provide the copyright protection such as digital watermarking techniques using various transforms and Computational Intelligence techniques. Security can be provided by encryption and decryption technique using various methods such as RSA, AES, DES, etc. In this paper, it is going to discuss the combination of encryption and digital watermarking techniques used for security and copyright protection of still image.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129248528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Optimal coded sequence design for radar using fractional oppositional particle swarm optimization 基于分数对置粒子群算法的雷达编码序列优化设计
J. Pandu, N. Balaji, C. D. Naidu
{"title":"Optimal coded sequence design for radar using fractional oppositional particle swarm optimization","authors":"J. Pandu, N. Balaji, C. D. Naidu","doi":"10.1109/ICRAIE.2014.6909106","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909106","url":null,"abstract":"Polyphase coded radar signals is one of the most important and usually used in MIMO Radar systems. Polyphase coded radar signals with good orthogonal properties having low autocorrelation and a low crosscorrelation property is a nonlinear multivariable optimization problem. The proposed technique yield polyphase waveforms with orthogonal properties which effectively removes the interference issues faced by radars and also help in attaining high radar resolution. The oppositional concept is included in the initial population selection in the PSO algorithm and fractional calculus is used for modifying the velocity updation equation in PSO. Peak Sidelobe Ratio (PSLR) and Integrated Energy Sidelobe ratio (ISLR) of the polyphase waveforms are incorporated in the fitness function defined for the PSO. The experimental analysis based on different phases, different sequence lengths, different code set and different cost function are carried out. In all cases, the proposed technique has achieved good results.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125490452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Automated methodology comprised of supervised techniques to assist product selection 由监督技术组成的自动化方法,以协助产品选择
Neelamadhav Gantayat, Rathish Das, S. Cherukuri
{"title":"Automated methodology comprised of supervised techniques to assist product selection","authors":"Neelamadhav Gantayat, Rathish Das, S. Cherukuri","doi":"10.1109/ICRAIE.2014.6909149","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909149","url":null,"abstract":"Customer targeted markets are inundated with similar products from multiple vendors and selecting a product of choice is a challenging task. All varieties of a product have pros and cons in plenty, and the task of identifying a suitable product is daunting and cumbersome. To address this, we propose a methodology to identify preferred products in an automated manner. The end result is achieved by analyzing the history of multiple factors involved with the product of study and utilizing a supervised learning algorithm to predict the worthiness of the product with respect to the user. This algorithm is designed by combining and customizing sentiment analysis and automatic ontology construction algorithms. Dependency parsing for ontology construction, HMM/CRF for decision making, and a new personalized algorithm for sentiment analysis were utilized to customize the prediction method. For a product under consideration, the algorithm takes into account all the user specified features and predicts an outcome of it being good (positive) or bad (negative) to the interested user. This outcome is achieved by analyzing the past history of the features specified by the user. Using this algorithm we studied a set of 20 movies released during the period of January - March 2013 and achieved 70% accuracy in predicting their box office outcome. Our results indicate that there is a correlation between the selected features past performance and the overall success of a new product with the same features. Given a wide array of available choices, this algorithm can predict an ideal product for a customer.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123337476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A resource allocation algorithm for heterogeneous jobs in grid environment 网格环境下异构作业的资源分配算法
Kailash Kumar, S. Singhal, S. Tripathi
{"title":"A resource allocation algorithm for heterogeneous jobs in grid environment","authors":"Kailash Kumar, S. Singhal, S. Tripathi","doi":"10.1109/ICRAIE.2014.6909234","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909234","url":null,"abstract":"Grid is a large-scale, heterogeneous, dynamic collection of independent systems which are geographically distributed and interconnected with high speed networks to meet ever increasing demand of high performance computing. Allocating distributed computational resources for end-user applications is one of the most complex and challenging tasks in Grid computing. Brokers are required for submitting the jobs of the end users to accomplish their demands of resources. To allocate resources in Grid, the Grid requires the description of a framework that can permit brokers to communicate to accomplish an efficient utilization of the resources themselves. The user applications must simultaneously assure both constraints of job execution and policies that govern system usage. This paper discusses an algorithm for resource allocation for heterogeneous jobs, subject to a set of constraints. The strategy used tries to reduce the cost of the Grid users' while allocating resources to Grid users. The resource allocation strategy discussed can control the task assignment to Grid resources with the objective to minimize the execution cost of the Grid users. The technique is analytically examined to obtain results under various environment conditions.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121612501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信