2011 International Conference on Process Automation, Control and Computing最新文献

筛选
英文 中文
Sinusoidal PWM Signal Generation Using TMS320C6711 DSP for Power Control in Mobile Phones 利用TMS320C6711 DSP产生正弦PWM信号,实现手机电源控制
2011 International Conference on Process Automation, Control and Computing Pub Date : 2011-07-20 DOI: 10.1109/PACC.2011.5979019
K. Karthikeyan, J. Jaisheela, M. Dinesh Kumar, K. Senthil Kumar
{"title":"Sinusoidal PWM Signal Generation Using TMS320C6711 DSP for Power Control in Mobile Phones","authors":"K. Karthikeyan, J. Jaisheela, M. Dinesh Kumar, K. Senthil Kumar","doi":"10.1109/PACC.2011.5979019","DOIUrl":"https://doi.org/10.1109/PACC.2011.5979019","url":null,"abstract":"Pulse Width Modulation is a method of controlling the amount of power to a load without having to dissipate any power in the load driver. PWM signals are widely used in telecommunications, power control systems, voltage regulation and in audio signal processing. This paper deals with the optimized power control in mobile applications. PWM power control systems became reality with the advent of modern semiconductor switches like MOSFETs and Insulated Gate bipolar transistor (IGBT). PWM signals can be easily generated using microcontrollers rather than Digital signal processors (DSP), but when the sensor data from light intensity sensors are processed in real time, then microcontrollers can no longer be used because of less accuracy and speed and this is where DSP comes into play. Programming a DSP to generate PWM signal in accordance with the sensor data is not an easy task since the interfacing codes are not as simple as for microcontrollers. Hence the simulation of the PWM signal has been done to study the efficiency of the C code. This work is a part of a project to develop DSP-FPGA based BLDC motor control.","PeriodicalId":403612,"journal":{"name":"2011 International Conference on Process Automation, Control and Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123092655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Spam Classification Based on Supervised Learning Using Machine Learning Techniques 基于机器学习技术的监督学习垃圾邮件分类
2011 International Conference on Process Automation, Control and Computing Pub Date : 2011-07-20 DOI: 10.1109/PACC.2011.5979035
Ms. D. Karthika Renuka, Dr. T. Hamsapriya, Mr. M. Raja Chakkaravarthi, Ms. P. Lakshmi Surya
{"title":"Spam Classification Based on Supervised Learning Using Machine Learning Techniques","authors":"Ms. D. Karthika Renuka, Dr. T. Hamsapriya, Mr. M. Raja Chakkaravarthi, Ms. P. Lakshmi Surya","doi":"10.1109/PACC.2011.5979035","DOIUrl":"https://doi.org/10.1109/PACC.2011.5979035","url":null,"abstract":"E-mail is one of the most popular and frequently used ways of communication due to its worldwide accessibility, relatively fast message transfer, and low sending cost. The flaws in the e-mail protocols and the increasing amount of electronic business and financial transactions directly contribute to the increase in e-mail-based threats. Email spam is one of the major problems of the today‟s Internet, bringing financial damage to companies and annoying individual users. Spam emails are invading users without their consent and filling their mail boxes. They consume more network capacity as well as time in checking and deleting spam mails. The vast majority of Internet users are outspoken in their disdain for spam, although enough of them respond to commercial offers that spam remains a viable source of income to spammers. While most of the users want to do right think to avoid and get rid of spam, they need clear and simple guidelines on how to behave. In spite of all the measures taken to eliminate spam, they are not yet eradicated. Also when the counter measures are over sensitive, even legitimate emails will be eliminated. Among the approaches developed to stop spam, filtering is the one of the most important technique. Many researches in spam filtering have been centered on the more sophisticated classifier-related issues. In recent days, Machine learning for spam classification is an important research issue. The effectiveness of the proposed work is explores and identifies the use of different learning algorithms for classifying spam messages from e-mail. A comparative analysis among the algorithms has also been presented.","PeriodicalId":403612,"journal":{"name":"2011 International Conference on Process Automation, Control and Computing","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134314023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
Intelligent Schemes for Bandwidth Allocation in Cellular Mobile Networks 蜂窝移动网络中带宽分配的智能方案
2011 International Conference on Process Automation, Control and Computing Pub Date : 2011-07-20 DOI: 10.1109/PACC.2011.5978901
A. P. Isvarya Luckshmi, P. Visalakshi, N. Karthikeyan
{"title":"Intelligent Schemes for Bandwidth Allocation in Cellular Mobile Networks","authors":"A. P. Isvarya Luckshmi, P. Visalakshi, N. Karthikeyan","doi":"10.1109/PACC.2011.5978901","DOIUrl":"https://doi.org/10.1109/PACC.2011.5978901","url":null,"abstract":"A phenomenal growth is witnessed in the development and deployment of wireless services. Wireless bandwidth is a scarce resource in a cellular mobile network and hence must be effectively utilized. This paper introduces two intelligent schemes to investigate the bandwidth allocation in cellular mobile networks namely Back Propagation Neural Network (BPN) and Particle Swarm Optimization (PSO). The performance objective is to maximize the bandwidth utilization while minimizing the bandwidth allocation for individual users. PSO and BPN methods are compared with the conventional Random Allocation and Linear Programming based Resource Reduction methods. Simulation results prove that the PSO method performs better than the BPN method.","PeriodicalId":403612,"journal":{"name":"2011 International Conference on Process Automation, Control and Computing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132213578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance Comparison of Advanced Encryption Standard (AES) and AES Key Dependent S-Box - Simulation Using MATLAB 高级加密标准(AES)与AES密钥相关s盒的性能比较——MATLAB仿真
2011 International Conference on Process Automation, Control and Computing Pub Date : 2011-07-20 DOI: 10.1109/PACC.2011.5979007
S. Shivkumar, G. Umamaheswari
{"title":"Performance Comparison of Advanced Encryption Standard (AES) and AES Key Dependent S-Box - Simulation Using MATLAB","authors":"S. Shivkumar, G. Umamaheswari","doi":"10.1109/PACC.2011.5979007","DOIUrl":"https://doi.org/10.1109/PACC.2011.5979007","url":null,"abstract":"The growing popularity of mobile and hand held devices ignited the growth of wireless networks over the past years. Wireless data communications have transformed not only the business world but also the human society by improving efficiency, flexibility, convenience, and above all productivity. Wireless Local Area Networks (WLAN) typically emulate the wired networks traditional hub-spoke configuration. The best known and most widely used variation of the 802.11 WLAN standard is 802.11b. Encryption in 802.11b is provided by Wired Equivalent Privacy (WEP), which has many weaknesses and flaws. Therefore the IEEE ratified 802.11i WLAN security standard in June 2004. The new cryptography was based on the Advanced Encryption Standard (AES) algorithm. The Substitution box (S-box) in AES brings non linearity to cryptosystem and strengthens their cryptographic security. In this paper RC4 stream cipher is used to generate S-box for AES. The generated S-boxes are more dynamic and key dependent which will increase the complexity and make the differential and linear cryptanalysis more difficult.","PeriodicalId":403612,"journal":{"name":"2011 International Conference on Process Automation, Control and Computing","volume":"10 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133651156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Requirement Analysis of Ubiquitous Intelligence System for Personal Diet Formulation and Maintenance 个人饮食配方与维护泛在智能系统的需求分析
2011 International Conference on Process Automation, Control and Computing Pub Date : 2011-07-20 DOI: 10.1109/PACC.2011.5978970
Mary Tom, A. Chiou
{"title":"Requirement Analysis of Ubiquitous Intelligence System for Personal Diet Formulation and Maintenance","authors":"Mary Tom, A. Chiou","doi":"10.1109/PACC.2011.5978970","DOIUrl":"https://doi.org/10.1109/PACC.2011.5978970","url":null,"abstract":"Nutrition Related Diseases (NRD) are globally widespread causing substantial economic cost for governments and individuals. Formulating and maintaining a balanced diet meeting the Recommended Dietary Intake (RDI) is complex, time consuming task. The detailed analysis conducted in this study reveals many intellectual tasks involved in meals scheduling and diet formulation. This study reports the results of requirement analysis of a Ubiquitous Intelligence System for automating the diet formulation, monitoring and maintenance. The authors propose Dietary Intelligence System (DIligenS) that applies computational intelligence and has the architectural components of knowledge base, inference engine, data base and data extraction and conversion modules in addition to the knowledge building and application interface.","PeriodicalId":403612,"journal":{"name":"2011 International Conference on Process Automation, Control and Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116603230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Lexical Chaining Process for Text Generations 文本生成的词法链化过程
2011 International Conference on Process Automation, Control and Computing Pub Date : 2011-07-20 DOI: 10.1109/PACC.2011.5978932
V. Shanthi, S. Lalitha
{"title":"Lexical Chaining Process for Text Generations","authors":"V. Shanthi, S. Lalitha","doi":"10.1109/PACC.2011.5978932","DOIUrl":"https://doi.org/10.1109/PACC.2011.5978932","url":null,"abstract":"Lexical chains are defined as clusters of semantically related words. The Lexical chaining architecture integrates domain dependent statistical word associations into the chaining process. The statistical word associations represent an additional type of lexical cohesive relationship that is not found in WordNet. The architecture also recognizes the gloss definitions which identifies the relations between two concepts not directly related.","PeriodicalId":403612,"journal":{"name":"2011 International Conference on Process Automation, Control and Computing","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124767887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Dynamic Stability Enhancement Using Self-Tuning Static Synchronous Compensator 利用自整定静态同步补偿器增强动态稳定性
2011 International Conference on Process Automation, Control and Computing Pub Date : 2011-07-20 DOI: 10.1109/PACC.2011.5978924
R. Narne, J. Therattil, Laxmidhar Sahu, P. C. Panda
{"title":"Dynamic Stability Enhancement Using Self-Tuning Static Synchronous Compensator","authors":"R. Narne, J. Therattil, Laxmidhar Sahu, P. C. Panda","doi":"10.1109/PACC.2011.5978924","DOIUrl":"https://doi.org/10.1109/PACC.2011.5978924","url":null,"abstract":"The design of a self tuning Static Synchronous Compensator (STATCOM) based on pole placement method is presented. In order to maintain good damping characteristics when there is a drastic change in system operating condition, the gain settings are adapted in real time based on the continuously measured system inputs and outputs. The new self tuning proportional integral (PI) control can provide better damping characteristics than a fixed gain PI control STATCOM over a wide range of operating conditions. Digital simulation of a two machine system following a three phase fault under different loading conditions is performed to demonstrate the robustness and effectiveness of the developed controller. Simulation results are presented at the end of the paper.","PeriodicalId":403612,"journal":{"name":"2011 International Conference on Process Automation, Control and Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125431881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Kalman Filter Based State Estimation of a Thermal Power Plant 基于卡尔曼滤波的火电厂状态估计
2011 International Conference on Process Automation, Control and Computing Pub Date : 2011-07-20 DOI: 10.1109/PACC.2011.5978971
Akhil Nair, T. Radhakrishnan, K. Srinivasan, S. Rominus Valsalam
{"title":"Kalman Filter Based State Estimation of a Thermal Power Plant","authors":"Akhil Nair, T. Radhakrishnan, K. Srinivasan, S. Rominus Valsalam","doi":"10.1109/PACC.2011.5978971","DOIUrl":"https://doi.org/10.1109/PACC.2011.5978971","url":null,"abstract":"Tangentially-fired furnaces (TFF) are vortex-combustion units and are widely used in steam generators of thermal power plants. Perfect modeling and simulation of furnace gas temperature is quite difficult, due to its complex aerodynamics of burning particles, flame stability and hot gas flow distribution throughout the furnace. The temperature of the furnace gas depends on many parameters such as the inclination angle (tilt angle), fuel quality, burn out percentage and the flow rates in the burners for each of the furnace corners. However, the measurements are not available in the existing furnace operated at Neyveli Lignite Corporation (NLC), Neyveli. Thus, state estimation of temperature is an important prerequisite for safe and economical process operations. It is an integral part of applications such as process monitoring, fault detection and diagnosis, process optimization, and model-based control. Because all the process variables are generally not measured, an observer can be designed to generate an estimate of the state by making use of the relevant process inputs, outputs, and process knowledge, in the form of a mathematical model. The aim is to design a good state estimator for the furnace. Linear Kalman Filter (LKF) and Extended Kalman Filter (EKF) algorithms are developed for this problem and simulation results are compared.","PeriodicalId":403612,"journal":{"name":"2011 International Conference on Process Automation, Control and Computing","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125508838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy Efficient Routing Protocol for Wireless Sensor Networks 无线传感器网络的节能路由协议
2011 International Conference on Process Automation, Control and Computing Pub Date : 2011-07-20 DOI: 10.1109/PACC.2011.5978934
Manian Dhivya, Ashok Kumar Potnuru, M. Sundarambal
{"title":"Energy Efficient Routing Protocol for Wireless Sensor Networks","authors":"Manian Dhivya, Ashok Kumar Potnuru, M. Sundarambal","doi":"10.1109/PACC.2011.5978934","DOIUrl":"https://doi.org/10.1109/PACC.2011.5978934","url":null,"abstract":"Wireless sensor networks consist of tiny sensor nodes with sensing, computation and wireless communication capabilities. The design of routing protocols is influenced by various factors like fault tolerance, energy efficiency, scalability, latency, power consumption and network topology. The primary design objective of research is determining the active nodes and enhancing the energy efficiency. In this paper a new protocol is proposed based on the characteristics of Threshold - sensitive Energy Efficient sensor Network protocol and Ad hoc On-demand Distance Vector. The simulation results show that the proposed protocol is efficient in transmission of packets, energy and throughput.","PeriodicalId":403612,"journal":{"name":"2011 International Conference on Process Automation, Control and Computing","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125909708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Joint Timing, Carrier Frequency and Sampling Clock Offset Estimation for MIMO OFDM WLAN Systems MIMO OFDM WLAN系统的联合定时、载波频率和采样时钟偏移估计
2011 International Conference on Process Automation, Control and Computing Pub Date : 2011-07-20 DOI: 10.1109/PACC.2011.5978993
G. Prema, P. Ananthi
{"title":"Joint Timing, Carrier Frequency and Sampling Clock Offset Estimation for MIMO OFDM WLAN Systems","authors":"G. Prema, P. Ananthi","doi":"10.1109/PACC.2011.5978993","DOIUrl":"https://doi.org/10.1109/PACC.2011.5978993","url":null,"abstract":"This paper proposes time, frequency and clock synchronization technique for a Q transmit and L receive (Q x L), Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) for Wireless Local Area Network (WLAN) systems. OFDM is a multi-carrier modulation scheme that transmits a large number of closely spaced sub-carriers to be modulated with a conventional modulation technique. MIMO OFDM is a promising candidate for achieving high data rate transmission in mobile environment. However OFDM technique is sensitive to time offset, frequency offset and clock offset. OFDM is resistant to multi-path fading; it requires a high degree of synchronization to maintain sub-carrier orthogonality. Estimating the start of the frame minimizes the Inter Symbol Interference (ISI) and estimating the correct Carrier Frequency Offset (CFO) and Sampling Clock Offset (SCO) minimizes the Inter Carrier Interference (ICI).","PeriodicalId":403612,"journal":{"name":"2011 International Conference on Process Automation, Control and Computing","volume":"293 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123111038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信