2013 5th International Conference on Computational Intelligence and Communication Networks最新文献

筛选
英文 中文
Analysis of Electromagnetic Fields of 1200kV UHV-AC Transmission Lines 1200kV特高压交流输电线路电磁场分析
M. Unde, B. E. Kushare
{"title":"Analysis of Electromagnetic Fields of 1200kV UHV-AC Transmission Lines","authors":"M. Unde, B. E. Kushare","doi":"10.1109/CICN.2013.126","DOIUrl":"https://doi.org/10.1109/CICN.2013.126","url":null,"abstract":"This paper presents the rigorous analysis of electric and magnetic field of 1200 KV, AC transmission line, India's most prestigious forthcoming project. The analysis has been carried out using MATLAB software for both proposed single circuit horizontal configuration and double circuit vertical configuration. Electric and Magnetic fields at power frequency are analyzed for various scenarios like varying height of ground clearance of conductors, fields at ground level, four meter and eight meter above ground level. Magnetic fields at different line loadings are analyzed for both the circuits. These results are compared with standard limits of exposure to human beings published by International Commission for Non-ionizing Radiation Protection (ICNIRP) and IEEE to examine the safety. Purpose of this study is to provide factual information on electrical and magnetic characteristics of 1200 KV AC power line and its biological effects on people, animals and plants.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128912200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multiband E-Shaped Fractal Microstrip Patch Antenna with DGS for Wireless Applications 无线应用的多波段e形分形微带贴片天线
Ajay Nagpal, Sukhwinder Singh Dillon, Anupama Marwaha
{"title":"Multiband E-Shaped Fractal Microstrip Patch Antenna with DGS for Wireless Applications","authors":"Ajay Nagpal, Sukhwinder Singh Dillon, Anupama Marwaha","doi":"10.1109/CICN.2013.14","DOIUrl":"https://doi.org/10.1109/CICN.2013.14","url":null,"abstract":"In this paper multiband E-Shaped fractal patch antenna with DGS (Defected Ground Structure) has been proposed. By applying the concept of fractal geometry on rectangular patch, self-similar E-Shaped structure has been obtained. Also, by using FR-4 epoxy (Fire Retardant-4) as substrate antenna resonates at 3.7 GHz, 6.7 GHz, 7.9 GHz and 8.7 GHz respectively with bandwidth 120 MHz, 495 MHz, 225 MHz and 315 MHz at corresponding frequencies. By inserting DGS in the proposed antenna the various parameters have been improved such as return loss, bandwidth and gain. Designing and simulation of this antenna has been done by the help of IE3D Software. The application of this antenna is to make it compatible with Satellite, Wi-Fi (Wireless Fidelity), Bluetooth, Cellular Phones and Radar etc.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128615318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Research and Application of Communication Gateway of EPA and MODBUS/TCP EPA与MODBUS/TCP通信网关的研究与应用
Li Hui, Zhang Hao, Peng Daogang
{"title":"Research and Application of Communication Gateway of EPA and MODBUS/TCP","authors":"Li Hui, Zhang Hao, Peng Daogang","doi":"10.1109/CICN.2013.44","DOIUrl":"https://doi.org/10.1109/CICN.2013.44","url":null,"abstract":"Through the research of EPA and MODBUS/TCP Industrial Ethernet technology, ARM embedded system and μC/OS-II real-time operating system, this paper designs and develops a communication gateway of EPA and MODBUS/TCP. The communication gateway can perform bidirectional data transceiving on EPA protocol and MODBUS/TCP protocol, which provides a secure, stable, real-time and flexible solution for process control of industrial field.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128510365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identity-Based Cryptography Techniques and Applications (A Review) 基于身份的密码技术及其应用(综述)
D. Anand, V. Khemchandani, R. Sharma
{"title":"Identity-Based Cryptography Techniques and Applications (A Review)","authors":"D. Anand, V. Khemchandani, R. Sharma","doi":"10.1109/CICN.2013.78","DOIUrl":"https://doi.org/10.1109/CICN.2013.78","url":null,"abstract":"This paper is reviewed the state of research on the important topic in the field of information interchange that is identity based cryptography which more or less extention of the public key cryptography field. The paper starts with analyzing the fundamental concepts of identity based cryptography techniques, which includes encryption and the techniques of digital signature for authentication, which is called as identity based signature. Afterwards the paper continue its analyses on various techniques and applications of identity-based cryptography depends on the methods of bilinear pairing that is a computational ancient widely used to build up various identity based cryptography system in the current literature. Afterwards this paper reviewed the identity based encryption applications in the field of various networks as ad-hoc networks, mobile networks and other wireless networks in the current era. At the end of this paper, we discuss how realistic and under what parameters identity-based cryptography may be used in current and future environment with its benefits and limitations.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"371 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115967780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Ergonomic Evaluation of Aircraft Cockpit Based on Model-Predictive Control 基于模型预测控制的飞机座舱工效评价
Yin Tangwen, Fu Shan
{"title":"Ergonomic Evaluation of Aircraft Cockpit Based on Model-Predictive Control","authors":"Yin Tangwen, Fu Shan","doi":"10.1109/CICN.2013.133","DOIUrl":"https://doi.org/10.1109/CICN.2013.133","url":null,"abstract":"A brief description about the ergonomic evaluation problems on the research subject of cockpit ergonomic evaluation theories and methods was made followed by the proposal of an aircraft cockpit ergonomic evaluation model based on the framework of model-predictive control. Repetitive decision making and feedback control made the model capable of handling constraints including physical limitations of aircraft dynamics as well as psychological and physiological limitations of flight crew. Active constraints which manifest limitations related to both human factors and cockpit ergonomic considerations can be determined by an optimization solver, in a real-time and quantitative manner. Such a model can be used to study the safety effect of flight due to pilot's human factors, and to guide safety design of aircraft. The model can also be used to locate the root of failure and its possibility caused by pilot's operate lapse in the human machine system, and then to compare the relative merits of various cockpit designs.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125668875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Library Automation in Cloud 云中的图书馆自动化
D. G. Chandra, M. Kathing, D. Kumar
{"title":"Library Automation in Cloud","authors":"D. G. Chandra, M. Kathing, D. Kumar","doi":"10.1109/CICN.2013.104","DOIUrl":"https://doi.org/10.1109/CICN.2013.104","url":null,"abstract":"By combining the most effective practices of Vitalization, Grid computing, utility computing and network technologies cloud computing is the resultant cost effective computing service delivery mechanism. This survey paper discusses prospect of cloud based Library Management System for cost effective library automation. Another important aspect of this survey work is analytic discussion on various open source library automation software. CYBRARIANTMTM an internet based integrated Library Automation and Management solution developed by CR2 Technologies Ltd is also included for the benefit of implementer.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126972347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A New Technique of Data Integrity for Analysis of the Cloud Computing Security 云计算安全分析中的数据完整性新技术
R. Chalse, A. Selokar, A. Katara
{"title":"A New Technique of Data Integrity for Analysis of the Cloud Computing Security","authors":"R. Chalse, A. Selokar, A. Katara","doi":"10.1109/CICN.2013.103","DOIUrl":"https://doi.org/10.1109/CICN.2013.103","url":null,"abstract":"Cloud computing is a latest and fast growing technology that offers an innovative, efficient and scalable business model for organizations to adopt various information technology resources i.e. software, hardware, network, storage, bandwidth etc. Cloud Computing is a jargon term without a commonly accepted non-ambiguous scientific or technical definition. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. It has the capability to incorporate multiple internal and external cloud services together to provide high interoperability there can be multiple accounts associated with a single or multiple service provider (SPs). So, Security in terms of integrity is most important aspects in cloud computing environment. In this paper, a detailed analysis of the cloud security problem is presented. Also the different problem in a cloud computing system and their effect upon the different cloud users are analyzed. It is providing a comparably scalable, position independent. Low cost platform for client's data. Since cloud computing environment is constructed based on open Architecture and interface. Based on this analysis various computing system and their effect upon the system, upon organizations and also upon different cloud users are analyzed. It is providing a comparably scalable, position-independent, low cost platform for client's data. Since cloud computing environment is constructed based on open architecture and interface. Based on this analysis various researches have also presented a view of measures that can be taken to deal with the cloud security problem and prevention that must be taken into account by any organization and cloud users seeking investment in cloud computing.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128188290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Effectiveness of Soft Computing Techniques for Medical Imaging 医学影像软计算技术的有效性
Anamika Ahirwar, R. S. Jadon
{"title":"Effectiveness of Soft Computing Techniques for Medical Imaging","authors":"Anamika Ahirwar, R. S. Jadon","doi":"10.1109/CICN.2013.76","DOIUrl":"https://doi.org/10.1109/CICN.2013.76","url":null,"abstract":"Segmentation of anatomical regions of the medical imaging is a critical problem. In this paper, we propose effectiveness of soft computing techniques for segmenting medical imaging. This paper explores the possibility of applying techniques for segmenting the regions of medical image. We them compute the effectiveness of the applied techniques on medical imaging and compare their results from the database given on the web. We tested the results to calculate the effectiveness of the techniques used for segmenting the tumor region in brain images and digital mammogram images.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122458913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Comparison of Digital Filters for Removal of Baseline Wandering from ECG Signal 去除心电信号基线漂移的数字滤波器的设计与比较
R. Lakhwani, S. Ayub, J. Saini
{"title":"Design and Comparison of Digital Filters for Removal of Baseline Wandering from ECG Signal","authors":"R. Lakhwani, S. Ayub, J. Saini","doi":"10.1109/CICN.2013.48","DOIUrl":"https://doi.org/10.1109/CICN.2013.48","url":null,"abstract":"Heart diseases, which are one of the death reasons, are among the several serious problems in this century and as per the latest survey, 60% of the patients die due to Heart problems. These diseases can be diagnosed by ECG (Electrocardiogram) signals. ECG measures electrical potentials on the body surface via contact electrodes thus it is very important signal in cardiology. Different artifacts affect the ECG signals which can thus cause problems in analyzing the ECG Thus signal processing schemes are applied to remove those interferences. The work proposed in this paper is removal of low frequency interference i.e. baseline wandering in ECG signal and digital filters are designed to remove it. The digital filters designed are FIR with different windowing methods as of Rectangular, Gaussian, Hamming, and Kaiser. The results obtained are at a low order of 56. The signals are taken from the MIT-BIH database which includes the normal and abnormal waveforms. The work has been done in MAT LAB environment where filters are designed in FDA Tool. The parameters are selected such that the noise is removed permanently. Also the best results are obtained at an order of 56 which makes hardware implementation easier. The result obtained for all FIR filters with different windows are compared by comparing the waveforms and power spectrums of the original and filtered ECG signals. The filters which gives the best results is the one using Kaiser Window.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123291063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Improved Iris Recognition System Using Wavelet Transform and Ant Colony Optimization 基于小波变换和蚁群优化的虹膜识别系统
V. Sharma, Sadhna K. Mishra, Deepika Dubey
{"title":"Improved Iris Recognition System Using Wavelet Transform and Ant Colony Optimization","authors":"V. Sharma, Sadhna K. Mishra, Deepika Dubey","doi":"10.1109/CICN.2013.58","DOIUrl":"https://doi.org/10.1109/CICN.2013.58","url":null,"abstract":"Feature selection and feature optimization play an important role in iris recognition system. Iris recognition system provide the great security flexibility for authentication and identification of genuine and imposters users. In this paper we proposed an optimized feature selection process for iris image template creation. The feature extraction process is performed by wavelet transform function and also modified the matching technique for iris recognition using multi-class SVM and ant colony optimization. Our empirical result evaluation shows that better performance of our proposed method in compression of hough tranform recognition technique.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"2000 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123549473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信