2017 International Conference on Inventive Computing and Informatics (ICICI)最新文献

筛选
英文 中文
D-Q axis voltage ripple minimization of vector control drive using Type-2 NFS controller D-Q轴电压纹波最小化矢量控制驱动器使用Type-2 NFS控制器
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365310
G. Sukumar, G. Srinivas
{"title":"D-Q axis voltage ripple minimization of vector control drive using Type-2 NFS controller","authors":"G. Sukumar, G. Srinivas","doi":"10.1109/ICICI.2017.8365310","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365310","url":null,"abstract":"The voltage ripple is reduced by using conventional proportional integral (PI) controllers require additional filter, and also occurs tuning problem with these controllers. Due to the operating point changes in conventional PI controllers get a nonlinearity output. To overcome above problem, this paper presents Type-2 Neuro fuzzy system (T2NFS) to reduce the voltage ripple in the induction motor by using indirect vector control method. The T2NFS controller performance as compared with conventional proportional integral (PI) controller, voltage ripple reduced in the induction motor without any additional filter and tuning problem is eliminated. In this, the current reference values and original values of current are fed to the T2NFS based controllers and the controller is trained based on the obtained values. The performance of induction motor with indirect vector control method by using T2NFS controllers has been simulated at different operation regions and compared results with PI controllers. The results are experimentally verified with d-space 1104.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121926357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automated experimental procedure using sensors and Arduino 自动实验程序使用传感器和Arduino
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365378
K. Arasu
{"title":"Automated experimental procedure using sensors and Arduino","authors":"K. Arasu","doi":"10.1109/ICICI.2017.8365378","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365378","url":null,"abstract":"This paper presents a novel method of automating experimental measurements in a laboratory environment. The acquisition and analysis of experimental data is possible using electronic sensors, open source software and hardware environment that makes the whole process simpler. This paper presents an experimental environment of testing of a centrifugal pump. However, the same approach can be extended to similar experiments that involve measurement of various parameters. In this experiment pressures, flow rate and speed that are essential parameters in a typical pump testing is measured using sensors and interfaced with the open source hardware Arduino. The advantage of using this approach is easy readability, more accurate and time saving. Different sensors that are used and calibration procedures involved are explained. The instrument chain consisting of sensors, Arduino and personal computer needed for the analysis of acquired data is explained.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116807757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detection of various attacks in wireless adhoc networks and its performance analysis 无线自组网中各种攻击的检测及其性能分析
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365237
J. Ananthi, S. Vengatesan
{"title":"Detection of various attacks in wireless adhoc networks and its performance analysis","authors":"J. Ananthi, S. Vengatesan","doi":"10.1109/ICICI.2017.8365237","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365237","url":null,"abstract":"Nowadays, Security is most important in all over fields as well as in wireless a hoc network. Due to the high mobility and wireless medium, third party can easily access the data and make the disturbances to the source and destination. To avoid this issue, proposed a new approach called smart attack detection (SAD) approach which is used to detect the type of denial of service attacks in wireless ad hoc network. This SAD approach consists of four types of attacks detection is possible. In general, detecting the types of malicious attacks is most important than detecting malicious node. By using this approach, can detect the type of malicious attack and after can make the perfect solution in future. SAD approach has detects the botnet attack, black hole attack, worm hole attack and sink hole attacks. Botnet attack will occur when the overflow occur to the particular node. Blackhole attack will occur when any of the intermediate node will block the data transmission to the destination. Wormhole attack will occur when any of the attacker node disturbs the nearby nodes. Sinkhole attack will occur when any of the attacker node disturbs the neighbor node continuously. In simulation, by using the network simulator version 2.35 performance of the wireless ad hoc network was analyzed.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124490000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Sleep order detection model using support vector machines and features extracted from brain ECG signals 利用支持向量机和特征提取脑心电信号的睡眠顺序检测模型
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365290
Dilip Singh Sisodia, Kunal Sachdeva, Arti Anuragi
{"title":"Sleep order detection model using support vector machines and features extracted from brain ECG signals","authors":"Dilip Singh Sisodia, Kunal Sachdeva, Arti Anuragi","doi":"10.1109/ICICI.2017.8365290","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365290","url":null,"abstract":"Out of many sleep disorders exist, sleep apnea is the most serious disorder in detection and cure. This disorder occurs when breathing of the person is disrupted or delay during their sleep. The untreated people will stop breathing regularly during sleep, which means that the whole body and the brain will not get the sufficient oxygen. Pause in breathing can have a particular domain in frequency and event. One of the common types of the sleep apnea is Obstructive sleep apnea (OSA), polysomnography (PSG) is used to examine the Obstructive sleep apnea (OSA) in sleep labs. The test of Obstructive sleep apnea (OSA) is too expensive and difficult as an expert is required to observe the patient overnight. So nowadays with the collaboration of bioengineers, new techniques are developed to classify and detect sleep apnea with higher accuracy. This paper mainly focuses on the computerized classification of OSA subject which is measured by very short length epochs of the electrocardiogram (ECG) data. Here we have implemented our model to classify sleep apnea recordings data with different classifiers like Naive Bayes, KNN, Random forest, support vector machines (SVM), C4.5, LVQ, Quadratic, and Bagging, but the best result is obtained from the SVM classifier with the highest accuracy of 94.32%.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125945984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Competitive study of engineering change process management in manufacturing industry using product life cycle management — A case study 应用产品生命周期管理的制造业工程变更过程管理的竞争性研究-一个案例研究
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365247
S. S. Sivam, S. Rajendrakumar, Sathiyamoorthy Karuppiah, A. Rajasekaran
{"title":"Competitive study of engineering change process management in manufacturing industry using product life cycle management — A case study","authors":"S. S. Sivam, S. Rajendrakumar, Sathiyamoorthy Karuppiah, A. Rajasekaran","doi":"10.1109/ICICI.2017.8365247","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365247","url":null,"abstract":"This case study deals with the engineering change in an exceedingly in a very particular component in an engineering design based company. This paper analyzes the practical style for the Engineering change, lead time of the modification and dynamic updating and communication of the switch to the concern departments. This study also present the strategies for improving the engineering changes and product life cycle management method to achieve efficient method design. Also, analyze the access control and security of the product data.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129892581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A framework for human-computer interaction using dynamic time warping and neural network 基于动态时间规整和神经网络的人机交互框架
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365346
D. Vishwakarma, Shamshad Ansari
{"title":"A framework for human-computer interaction using dynamic time warping and neural network","authors":"D. Vishwakarma, Shamshad Ansari","doi":"10.1109/ICICI.2017.8365346","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365346","url":null,"abstract":"Due to incapability in speaking and hearing, there always exist a group of people in the community who face difficulties in communication. These people use some symbols and gestures to convey their messages and receive their messages, this form of communication is known as Sign Language. We have provided a solution based on dynamic time warping (DTW) for the first module and software based solution for the second module by exploiting the latest technology of Microsoft Kinect depth camera which tracks the 20 joint location of human beings. In sign to speech/text conversion block, the actor performs some valid gestures within the Kinect field of view. The gestures are taken up by the Kinect sensor and then interpreted by comparing it with already stored trained gestures in the dictionary. After the sign is recognized, it is copied to the respective word which is transferred to the speech conversion and text conversion module to produce the output. In the second block, which is a speech to sign/gesture conversion, the person speaks in Kinect field of view which is taken by the Kinect, and the system converts speech into text, and corresponding word is mapped into predefined gesture which is played on the screen. This way a disabled person can visualize the spoken word. The accuracy of sign to speech module is found to be 87%, and that of speech to gesture module is 91.203%.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"0 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128558128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of novel reversible logic gate with enhanced traits 新型增强特性可逆逻辑门的设计
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365338
M. Singh, R. Nakkeeran
{"title":"Design of novel reversible logic gate with enhanced traits","authors":"M. Singh, R. Nakkeeran","doi":"10.1109/ICICI.2017.8365338","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365338","url":null,"abstract":"A reversible logic gate is a functional unit with a one-to-one mapping between inputs and outputs. A unique output vector is produced by the reversible circuit for each input vector. In this paper, a new reversible logic gate called G1 is proposed. A set of benchmark circuit is implemented using the proposed G1. The proposed design is better in terms of count of reversible gates, garbage outputs, constant inputs, quantum cost and delay when compared with the existing circuits. The design is simulated in Xilinx 14.7 Spartan 3E platform. The work has been done for making the design optimal in terms of count of reversible gates, garbage outputs, constant inputs and quantum cost.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129589091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Privacy-preserving multi-keyword search over the encrypted data for multiple users in cloud computing 云计算中多用户对加密数据的多关键字搜索保护隐私
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365306
Khirendra Alok Ranjan, Syam Kumar Pasupulati, Subramanian Ramaligam
{"title":"Privacy-preserving multi-keyword search over the encrypted data for multiple users in cloud computing","authors":"Khirendra Alok Ranjan, Syam Kumar Pasupulati, Subramanian Ramaligam","doi":"10.1109/ICICI.2017.8365306","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365306","url":null,"abstract":"With the growing popularity of cloud computing technology, data owners are moving towards cloud to outsource their data. It provides large amount of computing and storage with ease of access and economic saving. However, the data is not safe in cloud server as it faces many challenges like access control and privacy. Hence, the data is encrypted before uploading to the cloud to preserve the privacy of sensitive data but search over the encrypted data is a challenging task. A searchable encryption technique is required to search over the encrypted data to maintain the high level of privacy. Recently, many searchable encryption schemes have been proposed but they focused on single owner and single user scenario. In this paper, we propose a new approach for privacy preserving of outsourced data in cloud to support multiple owners and multiple users. Our design is based on the attribute-based encryption and tree based index. We prove the security and the efficiency of our scheme in security and performance analysis respectively.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127057992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Ergodic UL/DL capacity analysis of co-located and distributed antenna configuration for high speed train with massive MIMO system 大规模MIMO系统下高速列车共定位和分布式天线配置遍历UL/DL容量分析
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/icici.2017.8365393
Maharshi K Bhatt, B. Sedani, K. R. Parmar, M. P. Shah
{"title":"Ergodic UL/DL capacity analysis of co-located and distributed antenna configuration for high speed train with massive MIMO system","authors":"Maharshi K Bhatt, B. Sedani, K. R. Parmar, M. P. Shah","doi":"10.1109/icici.2017.8365393","DOIUrl":"https://doi.org/10.1109/icici.2017.8365393","url":null,"abstract":"This paper analyse the performance and design of high speed Train (HST) communications that use massive multiple-input multiple-output (MIMO) system. The users travelling in the train communicate with the Base Station by using antennas mounted on top of the train as gateways. Two antenna configuration are considered, one is co-located antennas (CA) at the center of the train, and the other is distributed antennas (DA) uniformly placed along the train. In the CA layout, the average ergodic uplink capacity is concave in the number of Tx antennas on the train, and the optimum antennas on the train is found by increasing the average uplink capacity. In the DA layout, the average ergodic capacity is bounded concave function, which are then used to find optimum value of the number of Tx antennas on the train. Both analytical and simulation results demonstrate that the CA layout has a higher average cell capacity while the DA layout has comparatively low capacity. In this paper downlink maximum achievable rate or capacity is also simulated and analysed with respect to number of base station antenna which shows that as we increase number of base station antenna, achievable rate from base station to user terminal is also increased.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127426888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel approach of video compression over 4g system using H.265 standard 一种基于H.265标准的4g系统视频压缩新方法
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365219
B. Sedani, D. Kamdar, Kavita Monpara
{"title":"A novel approach of video compression over 4g system using H.265 standard","authors":"B. Sedani, D. Kamdar, Kavita Monpara","doi":"10.1109/ICICI.2017.8365219","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365219","url":null,"abstract":"An innovative video coding standard as specified by ITU-T is popularly named as H.265/HEVC (High-Efficiency Video Coding) standard is supported by ISO/IEP Moving Picture Expert Group. The HEVC standard provides tree based structure for compression and individual prediction units (PU) are formed for further processing. HEVC has 35 modes from that 33 modes are angular for intra prediction. In HEVC standard, the individual PU are coded using integer transform, loop filtering and entropy coding. The HEVC standard provides higher compression ratio compared to existing standard.4G Wireless standard is designed to improve the QoS in the wireless cellular network. The paper is focused on compression ratio of HEVC standard and comparison with compression ratio of H.264/AVC is also given. The analysis of BER (Bit Error Rate) is presented by simulation model of transmitting video using H.265/HEVC compression standard over 4g channel.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129056933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信