International Conference for Convergence for Technology-2014最新文献

筛选
英文 中文
Implementation of synthetic brain concept in humanoid robot 合成脑概念在仿人机器人中的实现
International Conference for Convergence for Technology-2014 Pub Date : 2014-04-06 DOI: 10.1109/I2CT.2014.7092212
Sagar D. Korde, G. Talmale
{"title":"Implementation of synthetic brain concept in humanoid robot","authors":"Sagar D. Korde, G. Talmale","doi":"10.1109/I2CT.2014.7092212","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092212","url":null,"abstract":"This paper is elaborate the model of humanoid robot interacts with human being and perform various operation as per the command given by the human being. A humanoid robot having Synthetic brain can able to do Interaction, communication, Object detection, information acquisition about any object, response to voice command, chatting logically with human beings. Object detection will be done by this robot for that purpose there is use image processing concept (HAAR Technique), And to make the system intelligent that is whenever system interact, communicate, chat with human it gives proper response, question / answers there is integrates artificial intelligence and DFA / NFA automata and Prolog language concept for answering logically over the complex and relevant strings or data.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130210746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and implementation of fuzzy based robust controller for process control instrumentation 过程控制仪表模糊鲁棒控制器的设计与实现
International Conference for Convergence for Technology-2014 Pub Date : 2014-04-06 DOI: 10.1109/I2CT.2014.7092084
N. Akshay
{"title":"Design and implementation of fuzzy based robust controller for process control instrumentation","authors":"N. Akshay","doi":"10.1109/I2CT.2014.7092084","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092084","url":null,"abstract":"Precised and robust controllers are need of Industries like Chemical, Petrochemical plants which required to operate with the defined parameters and unknown disturbances. Therefore a robust controller is required to maintain process parameters. Conventional PID Controller tuning requires lot of mathematical hard work. Though, mathematical controllers are easy to implement, but are not précised one. Also, the tuned parameters of PID Controller for a particular setup will not be optimum when the system physical parameter is changed, then the controller should be robust to overcome such scenario. An approximate mathematical controller for real time applications requires complex considerations. Previous knowledge on system characteristic equation as PID controller is not required while implementing Fuzzy Logic Controller. Fuzzy Logic Controller based on theory of approximate mathematical reasoning enables to treat decisively and precisely. This paper focuses on design and implementation of fuzzy based control to utilize human intelligence and reasoning. The fuzzy logic control is implemented using Fuzzy Logic Toolkit in LabVIEW software and tested with Process Control temperature and level loops. Data Acquisition is done using NI cFP AIO-610 with NI cFP-2020 PAC modules.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130159864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamics of spray dryer 喷雾干燥机动力学
International Conference for Convergence for Technology-2014 Pub Date : 2014-04-06 DOI: 10.1109/I2CT.2014.7092266
Meghana M. Santre, S. Agashe
{"title":"Dynamics of spray dryer","authors":"Meghana M. Santre, S. Agashe","doi":"10.1109/I2CT.2014.7092266","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092266","url":null,"abstract":"This work aims at mathematical modeling of spray dryer for drying the milk. This spray dryer is a pilot plant designed and implemented for an educational institute. Drying process has gained importance in making powder form of extract of fruit juice, milk, liquid chemicals etc in large quantity. By spray drying process water activity of food product is reduced which inhibits the growth of micro-organisms. [1] Due to reduce in size cost of transportation and cost of storage is get reduced. Also quality of food product is remained for long time. In a spray drying process a liquid feedstock is dried by spraying the feed into heated air. The purpose of modeling the spray dryer is to use the model for the development and testing of control strategies to the dryer. The model is based on mass and energy equations, as well as product drying characteristics. The model describes the drying conditions in the drying chamber with regards to temperature and humidity. The product temperature relates with the moisture content of the powder. Thus temperature control of the powder ultimately controls the quality of powder.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114705155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Histogram of oriented gradients for English-Bengali script recognition 面向梯度的英-孟加拉文字识别直方图
International Conference for Convergence for Technology-2014 Pub Date : 2014-04-06 DOI: 10.1109/I2CT.2014.7092329
Anurima Tikader, N. Puhan
{"title":"Histogram of oriented gradients for English-Bengali script recognition","authors":"Anurima Tikader, N. Puhan","doi":"10.1109/I2CT.2014.7092329","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092329","url":null,"abstract":"Script recognition plays a key role in successful implementation of Optical Character Recognition (OCR) in multi-script document analysis environment. In this paper, we propose a new method for English-Bengali script recognition based on histogram of gradient orientation. We observe that both the scripts of consideration have distinct nature of edge orientations. English and Bengali script can be distinguished based on frequency of different edge directions. A modified version of the HOG feature is suggested towards script recognition. Experimental results show very high recognition accuracy by the proposed method in case of printed and handwritten document image databases.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133715652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Effective utilization of page ranking and HITS in significant information retrieval 在重要信息检索中有效利用页面排名和HITS
International Conference for Convergence for Technology-2014 Pub Date : 2014-04-06 DOI: 10.1109/I2CT.2014.7092030
Shailendra G. Pawar, P. Natani
{"title":"Effective utilization of page ranking and HITS in significant information retrieval","authors":"Shailendra G. Pawar, P. Natani","doi":"10.1109/I2CT.2014.7092030","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092030","url":null,"abstract":"World Wide Web is the treasury of information. It contain huge amount of interrelated data but it is very difficult to find the relevant data from it. To search for relevant information user uses search engine. Ranking algorithms are used by search engine to retrieve the most relevant and popular web pages. PageRank and HITS (Hyperlink-Induced Topic Search) algorithm are very popular among them. In this paper PageRank and HITS algorithm and their working are discussed briefly. This paper proposed an approach in which both Page Rank and HITS algorithm applied simultaneously to find most relevant web pages and improve the result of web searching. An experimental result shows that performance of proposed approach is better than individual application of algorithms.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133861862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance analysis of patient monitoring system under different routing algorithm 不同路由算法下病人监护系统的性能分析
International Conference for Convergence for Technology-2014 Pub Date : 2014-04-06 DOI: 10.1109/I2CT.2014.7092140
R. Tiwari, S. Shrivastava, Susmita Das
{"title":"Performance analysis of patient monitoring system under different routing algorithm","authors":"R. Tiwari, S. Shrivastava, Susmita Das","doi":"10.1109/I2CT.2014.7092140","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092140","url":null,"abstract":"For the sake of improving the overhead occurring due to control operations and to attain the reliable data signaling in the patient monitoring system based on ZigBee, we are focusing on the comparative performance evaluation of different routing algorithm in a wireless body area network (WBAN) using the OPNET simulation tool. WBAN contains the number of wireless mobile nodes forming an unpredictable topology and link instability that make routing a core issue. In this paper a comparative study of three routing algorithms named AODV, DSR, and OLSR has been done with increasing number of wireless nodes in WBAN on account of end to end delay, load, and throughput. Simulation results demonstrate that OLSR routing protocol outperforms among all protocols under an increasing number of node scenario.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133912927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Anomaly detection using smart tracing tricks on call stack 在调用堆栈上使用智能跟踪技巧进行异常检测
International Conference for Convergence for Technology-2014 Pub Date : 2014-04-06 DOI: 10.1109/I2CT.2014.7092136
Goverdhan Reddy Jidiga, P. Sammulal
{"title":"Anomaly detection using smart tracing tricks on call stack","authors":"Goverdhan Reddy Jidiga, P. Sammulal","doi":"10.1109/I2CT.2014.7092136","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092136","url":null,"abstract":"The call stack is an important baseline to detecting the intrusions spread over the system application programs penetrate and injected with malicious programs, also exploited by unauthorized users. But the previous work presented based on stack with the long training period, so in this paper demonstrate the extraction of sequences of return addresses generated by function calls in the code. This approach use two sets of input test data like return address set and function call sequence (virtual path) set. We apply smart trace tool and it is easy for anomaly detection and finding the unknown coding exploits as anomaly. We tested 14 attacks on Linux platform by setting different threshold values while training and given the affect of this technique with discussions on false positive rate.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116651177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and analysis of single patch, 2×1 and 4×1 microstrip antenna arrays 单贴片、2×1和4×1微带天线阵列的设计与分析
International Conference for Convergence for Technology-2014 Pub Date : 2014-04-06 DOI: 10.1109/I2CT.2014.7092286
Shivani Singh, Neha Tyagi, N. Sinha
{"title":"Design and analysis of single patch, 2×1 and 4×1 microstrip antenna arrays","authors":"Shivani Singh, Neha Tyagi, N. Sinha","doi":"10.1109/I2CT.2014.7092286","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092286","url":null,"abstract":"Considering the changing trends in communication system, the requirement of a low cost, minimal weight and a low profile antenna is much needed. Therefore, fulfilling the above-mentioned requirements microstrip patch antennas are designed. The objective of this paper is to design a single patch, 2×1 and 4×1 patch antenna array and also analyze their advantages and disadvantages depending upon the results obtained. Antenna parameters such as radiation pattern, antenna gain, directivity and power obtained are studied. The work involves designing of single patch, 2×1 and 4×1 patch arrayat resonant frequency of 2.4GHz. The results are obtained using Advance Design System (ADS).","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127732170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
NTHC: A nested tunnel header compression mechanism for tunneling over IP NTHC:一种用于IP隧道的嵌套隧道报头压缩机制
International Conference for Convergence for Technology-2014 Pub Date : 2014-04-06 DOI: 10.1109/I2CT.2014.7092197
Swati Sagar, D. Gothawal
{"title":"NTHC: A nested tunnel header compression mechanism for tunneling over IP","authors":"Swati Sagar, D. Gothawal","doi":"10.1109/I2CT.2014.7092197","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092197","url":null,"abstract":"The Internet Protocol (IP) is the widely used transport protocol for wired and wireless networks. In the Internet applications such as interactive games, messaging, etc., the payload of the IP packet is of the smaller size or the same size as compared to the header size of the packet. Moreover, the size of headers in IP packets also increases in various IP tunneling mechanisms that are used in multiple contexts such as virtual-private networks and transitions of IPv4-to-IPv6. These tunneling mechanisms add multiple levels of encapsulations in each packet. Thus, they introduce an overhead due to a high packet header size which leads to a poor performance in wireless network links. This protocol header overhead further increases when several nested tunnels are used in end-to-end path. Techniques to compress IP packet headers can be used on tunnel headers to reduce the overhead introduced by protocol headers. However, the existing techniques available for packet header compression are not suitable to the characteristics of IP tunneling. In this paper, we propose a design of a novel nested tunneling header compression (NTHC) mechanism to efficiently use IP tunneling while reducing the transmission overhead of tunneling protocol headers. NTHC reduces the protocol header overhead especially in the scenarios where several nested tunnels are in use for end-to-end connectivity. NTHC is able to compress headers of various tunneling protocols such as UDP, PPP and L2TP. Our prototype implementation of the NTHC shows it's feasibility. The evaluation results show the effectiveness and efficiency of the proposed solution.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127955069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient cross user data deduplication in remote data storage 远程数据存储的高效跨用户重复数据删除
International Conference for Convergence for Technology-2014 Pub Date : 2014-04-06 DOI: 10.1109/I2CT.2014.7092019
Priteshkumar Prajapati, Parth Shah
{"title":"Efficient cross user data deduplication in remote data storage","authors":"Priteshkumar Prajapati, Parth Shah","doi":"10.1109/I2CT.2014.7092019","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092019","url":null,"abstract":"Cloud data storage service providers such as Mozy, Dropbox, and others perform deduplication to save space by only storing one copy of each file uploaded. While using cloud data storage clients always concern for confidentiality of data. So clients usually encrypt their data, and put it on to the storage. If client specific key is used for encryption then each client has different key so in this case deduplication is not possible. Single key within the network is used for encryption then all data is insecure even if one client is compromised and attacker gets the key. Message-locked encryption resolves this problem. But it is inherently subject to brute-force attacks that can recover files falling into a known set. In DupLESS get and put operations are most expensive operations in terms of time. In proposed architecture, we provide secure deduplicated storage resisting brute-force attacks, and realize it in a modification of existing system DupLESS using blowfish algorithm. Clients encrypt under message-based keys obtained via an oblivious PRF protocol from a key-server. Clients encrypt data and send it to the storage server provider then storage server performs deduplication. It is observed that compare to DupLESS, Proposed System achieve more performance in terms of time. Post process and target deduplication is used at storage server side.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130498074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信