2012 IEEE Students' Conference on Electrical, Electronics and Computer Science最新文献

筛选
英文 中文
Dual Gate enhancement-mode JFET (DG-JFET) for ultra low power applications 用于超低功耗应用的双栅增强模式JFET (DG-JFET)
2012 IEEE Students' Conference on Electrical, Electronics and Computer Science Pub Date : 2012-03-01 DOI: 10.1109/SCEECS.2012.6184726
N. M. Biju, R. Komaragiri
{"title":"Dual Gate enhancement-mode JFET (DG-JFET) for ultra low power applications","authors":"N. M. Biju, R. Komaragiri","doi":"10.1109/SCEECS.2012.6184726","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184726","url":null,"abstract":"Dual Gate enhancement mode Junction Field Effect Transistors (DG-JFETs) was recognized as one of the possible choice to continue the scaling beyond the conventional limits. The need for ultra-low voltage ICs necessitates the scaling of MOSFETs beyond 25nm. However, the advanced standard MOSFET devices and CMOS technologies have several limitations for ultra-low voltage analog operation and the JFET devices offer a great potential for such applications. The device architecture and performance of 16nm enhancement mode SOI DG-JFET is analyzed in this work. DAVINCI (a synopsis 3D device simulation tool) is used to analyze the device architecture and performance initially. The numerical device simulation results show that the enhancement mode DG-JFETs offer low threshold voltage and an excellent ON/OFF performance at a power supply voltage of 0.5 V required for ultra-low voltage analog ICs.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131935989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Bilateral converter to interface small battery energy storage system with micro-grid 小型电池储能系统与微电网的双边变换器接口
2012 IEEE Students' Conference on Electrical, Electronics and Computer Science Pub Date : 2012-03-01 DOI: 10.1109/SCEECS.2012.6184785
S. Mohan, E. P. Cheriyan
{"title":"Bilateral converter to interface small battery energy storage system with micro-grid","authors":"S. Mohan, E. P. Cheriyan","doi":"10.1109/SCEECS.2012.6184785","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184785","url":null,"abstract":"A power electronic circuit to interface small battery energy storage (BES) system with grid is proposed in this paper. BES is essential in micro grid to have power balance and stable operation when there is an intermittent power generation and demand. A single phase bilateral converter proposed here is operated as an inverter when there is no supply from grid and operated as a charging circuit to charge the BES connected at one side of the converter when there is a grid supply. Two main switching schemes are suggested and a comparison is made between them while the converter is operated in inverter mode.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131090988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A biorthogonal wavelet transform based robust watermarking scheme 一种基于双正交小波变换的鲁棒水印方案
2012 IEEE Students' Conference on Electrical, Electronics and Computer Science Pub Date : 2012-03-01 DOI: 10.1109/SCEECS.2012.6184796
R. S. Shekhawat, V. S. Rao, V. K. Srivastava
{"title":"A biorthogonal wavelet transform based robust watermarking scheme","authors":"R. S. Shekhawat, V. S. Rao, V. K. Srivastava","doi":"10.1109/SCEECS.2012.6184796","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184796","url":null,"abstract":"This paper presents a robust watermarking technique using biorthogonal wavelet transform. In proposed method the blue channel of the color host image is selected for embedding watermark because it is more resistant to changes compared to red and green channels. The blue channel is decomposed into n levels using biorthogonal wavelet transform because biorthogonal wavelet transform is an invertible transform and has the property of exact reconstruction and smoothness. This method is shown to be robust against many signal processing operations as well as geometrical attacks.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114303980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
TouchX — Mouse simulation using gestures on a virtual screen TouchX -在虚拟屏幕上使用手势的鼠标模拟
2012 IEEE Students' Conference on Electrical, Electronics and Computer Science Pub Date : 2012-03-01 DOI: 10.1109/SCEECS.2012.6184760
M. Birla, R. Kulal, S. Bardia, S. Rudra
{"title":"TouchX — Mouse simulation using gestures on a virtual screen","authors":"M. Birla, R. Kulal, S. Bardia, S. Rudra","doi":"10.1109/SCEECS.2012.6184760","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184760","url":null,"abstract":"Vision based finger tracking is a constraint in the field of gesture recognition. Thus to overcome this constraint, the project implements a cost effective touch screen and reduce the issues of its maintainability and portability. This paper proposes an approach to mouse simulation using finger tracking on a virtual screen with the aid of color cameras. The finger is confined within a range of projection of the cameras. The system aims to reduce the hardware costs involved in the touch screen by eliminating the need of sensor and improve interactivity by integrating with skin color model. Due to real time recognition, items in the background or distinct features of the users do not hamper its efficiency.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121254980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reconfiguration of distribution network for loss reduction at different load schemes 配电网在不同负荷方案下的减损重构
2012 IEEE Students' Conference on Electrical, Electronics and Computer Science Pub Date : 2012-03-01 DOI: 10.1109/SCEECS.2012.6184772
Sandeep Sehgal, A. Swarnkar, N. Gupta, K. R. Niazi
{"title":"Reconfiguration of distribution network for loss reduction at different load schemes","authors":"Sandeep Sehgal, A. Swarnkar, N. Gupta, K. R. Niazi","doi":"10.1109/SCEECS.2012.6184772","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184772","url":null,"abstract":"This paper presents a meta-heuristic based algorithm for determining the minimum loss reconfiguration for different load models in radial distribution system. Proposed method includes the genetic algorithm (GA) for optimizing the reconfiguration problem. After investigating the results obtained by the proposed method, it is clear that the type of load is a main deciding factor for reconfiguration problem and the methodology is capable to find out the optimal solution for any size of distribution systems and demands much less computational burden as compared to other existing algorithms. Simulation results are tested on widely used 33-node test distribution system and compared to the conventional constant load model.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114766443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reduction of large scale linear dynamic SISO and MIMO systems using differential evolution optimization algorithm 基于差分进化优化算法的大规模线性动态SISO和MIMO系统缩减
2012 IEEE Students' Conference on Electrical, Electronics and Computer Science Pub Date : 2012-03-01 DOI: 10.1109/SCEECS.2012.6184732
G. Vasu, K. Santosh, G. Sandeep
{"title":"Reduction of large scale linear dynamic SISO and MIMO systems using differential evolution optimization algorithm","authors":"G. Vasu, K. Santosh, G. Sandeep","doi":"10.1109/SCEECS.2012.6184732","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184732","url":null,"abstract":"In this paper, a computationally simple approach is proposed for order reduction of large scale system linear dynamic SISO and MIMO system using differential evolutionary (DE) optimization technique. The method is based on minimizing the integral square error (ISE) between the transient responses of original and reduced order models pertaining to step input. The reduction procedure is simple, efficient and computer oriented. Stability of the reduced order system is always assured in proposed method. The algorithm is illustrated with help of two numerical examples and results are compared with other well known reduction techniques to show its superiority.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129426645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Study of shaft voltage & bearing currents in electrical machines 电机轴电压和轴承电流的研究
2012 IEEE Students' Conference on Electrical, Electronics and Computer Science Pub Date : 2012-03-01 DOI: 10.1109/SCEECS.2012.6184738
A. Datta, M. Dubey, S. Jain
{"title":"Study of shaft voltage & bearing currents in electrical machines","authors":"A. Datta, M. Dubey, S. Jain","doi":"10.1109/SCEECS.2012.6184738","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184738","url":null,"abstract":"Shaft voltage & bearing currents in electric motors are not new. Its presence is noticed probably after the invention of electric rotating machines which is confirmed by observing pitting in the bearing rubbing surfaces and changing the chemical composition of lubricating oil or grease used in the bearings. Currents flowing through motor bearings have the potential of creating premature failure of bearings. This paper discusses about the origination of shaft voltage and bearing currents. A few mitigation techniques are also touched upon.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128481880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Performance evaluation of cryptographic algorithms: DES and AES 加密算法的性能评估:DES和AES
2012 IEEE Students' Conference on Electrical, Electronics and Computer Science Pub Date : 2012-03-01 DOI: 10.1109/SCEECS.2012.6184991
Akash Kumar Mandal, Chandra Parakash, Archana Tiwari
{"title":"Performance evaluation of cryptographic algorithms: DES and AES","authors":"Akash Kumar Mandal, Chandra Parakash, Archana Tiwari","doi":"10.1109/SCEECS.2012.6184991","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184991","url":null,"abstract":"With the fast progression of digital data exchange in electronic way, information security is becoming much more important in data storage and transmission. Cryptography has come up as a solution which plays a vital role in information security system against malicious attacks. This security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by party those possesses the associated key. These algorithms consume a significant amount of computing resources such as CPU time, memory and computation time. In this paper two most widely used symmetric encryption techniques i.e. data encryption standard (DES) and advanced encryption standard (AES) have been implemented using MATLAB software. After the implementation, these techniques are compared on some points. These points are avalanche effect due to one bit variation in plaintext keeping the key constant, avalanche effect due to one bit variation in key keeping the plaintext constant, memory required for implementation and simulation time required for encryption.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130594269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 153
Multimodal biometric encryption using ridge and iris feature map 基于脊和虹膜特征图的多模态生物特征加密
2012 IEEE Students' Conference on Electrical, Electronics and Computer Science Pub Date : 2012-03-01 DOI: 10.1109/SCEECS.2012.6184838
I. Raghu, P. Deepthi
{"title":"Multimodal biometric encryption using ridge and iris feature map","authors":"I. Raghu, P. Deepthi","doi":"10.1109/SCEECS.2012.6184838","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184838","url":null,"abstract":"In modern world communication, securing information is a very important task. Hence Cryptographic systems are integral parts of communication systems in almost all applications. Security requirements demand that these systems be operated with very large secret keys. Since it is very difficult to remember large private keys, these keys are stored by using biometric features and this is called biometric encryption. In this paper we propose a multimodal biometrics based encryption scheme. Here we combine features of fingerprint and iris with a user defined secret key. It is experimentally verified that the proposed system outperforms unimodal biometric encryption systems.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130137110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Colorization of gray scale images in lαβ color space using mean and standard deviation 利用均值和标准差对l - αβ色彩空间中的灰度图像进行着色
2012 IEEE Students' Conference on Electrical, Electronics and Computer Science Pub Date : 2012-03-01 DOI: 10.1109/SCEECS.2012.6184773
S. Kumar, A. Swarnkar
{"title":"Colorization of gray scale images in lαβ color space using mean and standard deviation","authors":"S. Kumar, A. Swarnkar","doi":"10.1109/SCEECS.2012.6184773","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184773","url":null,"abstract":"Colorization of gray scale images is an appealing application of image processing. This work presents a technique of the gray image coloring. Here is introduced a general technique for “colorizing” grayscale images by transferring color between a source, color image and a destination or target, grayscale image. The approach presented here attempts to provide a method to help minimize the amount of human labor required for this task. Here we transfer the entire color “mood” of the source to the target image by matching luminance and texture information between the images. This work presents a technique of the gray image coloring, achieved using a very simple algorithm, and its core strategy is to choose a suitable color space and then to apply simple operations there. This work demonstrates that a color space with decorrelated axes is a useful tool for manipulating color images. Colorization of a gray scale image is achieved here by imposing mean and standard deviation onto the data points is a simple operation, which produces believable output images given suitable input images.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123894547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信