2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)最新文献

筛选
英文 中文
A study on the increasing in the performance of a solar photovoltaic cell during shading condition 遮阳条件下提高太阳能光伏电池性能的研究
2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) Pub Date : 2016-08-04 DOI: 10.1109/ICCPCT.2016.7530143
Ritesh Dash, S. Swain, P. C. Panda
{"title":"A study on the increasing in the performance of a solar photovoltaic cell during shading condition","authors":"Ritesh Dash, S. Swain, P. C. Panda","doi":"10.1109/ICCPCT.2016.7530143","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530143","url":null,"abstract":"This paper proposes a special type of converter with solar photovoltaic cell for extracting maximum amount of power from a variable source. The converter topology uses a special characteristics which enables it to extract maximum power from the source. Partial shading is a very critical problem which sometimes leads to permanent damage of the cell. This effect also reduces the system performance and efficiency.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122336075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal control of islanded microgrid with adaptive fuzzy logic & PI controller using HBCC under various voltage & load variation 基于自适应模糊逻辑和PI控制器的孤岛微电网在不同电压和负载变化下的最优控制
2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) Pub Date : 2016-08-04 DOI: 10.1109/ICCPCT.2016.7530251
S. Choudhury, Abhijeet Choudhury, Deepsikha Panda, P. Rout
{"title":"Optimal control of islanded microgrid with adaptive fuzzy logic & PI controller using HBCC under various voltage & load variation","authors":"S. Choudhury, Abhijeet Choudhury, Deepsikha Panda, P. Rout","doi":"10.1109/ICCPCT.2016.7530251","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530251","url":null,"abstract":"This paper presents a robust & astute voltage control avenue for micro grid system operating in autonomous mode. The proposed Adaptive Fuzzy Logic Controller contains two Mamdani based FLC which features in self adjustment of scaling factors, Membership Functions & control gains during uncertainties regardless of any change in the operating conditions. A Hysteresis Band Current Controller (HBCC) has been used which helps in generating the gate pulses for the Voltage Source Converters (VSCs) and also helps in controlling the current instantaneously. The HBCC used in this system limits the device current & gives a faster response irrespective of the controllers & the control outputs used. The proposed controller shows exceptional results as compared to the traditional PI controller. Irrespective of load variation, voltage variation & load unbalance the proposed technique holds good. The transient response time is exclusively reduced, power oscillations are wiped out and faster concurrence is obtained. The uncomplicated design & upgraded dynamic behavior of the A-FLC makes it assuring contestant for Voltage control in autonomous micro grid. Apart from all these disturbances the system was modeled, validated and simulated under the simulation studies in MATLAB environment.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130634207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design and analysis of hybrid DC-DC boost converter in continuous conduction mode 连续导通模式下DC-DC混合型升压变换器的设计与分析
2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) Pub Date : 2016-08-04 DOI: 10.1109/ICCPCT.2016.7530166
R. Prasana, S. Ramprasath, N. Vijayasarathi
{"title":"Design and analysis of hybrid DC-DC boost converter in continuous conduction mode","authors":"R. Prasana, S. Ramprasath, N. Vijayasarathi","doi":"10.1109/ICCPCT.2016.7530166","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530166","url":null,"abstract":"This paper presents the design and analysis of Hybrid DC-DC Step-up converter in continuous conduction mode (CCM). The proposed Hybrid DC-DC boost converter consists of conventional boost converter which incorporates switched capacitor cell-UP1. It provides high DC-DC voltage conversion(60 V-380 V) and eradicates the complexity in conventional boost converter while operating in high duty ratio. A small structure changes has to be made to convert conventional boost converter into a hybrid switched-cell-based boost converter. There are six different types of switch cells, of all UP1 cell has been used in this converter. The output results are validated with the help of simulation using MATLAB/SIMULINK. The performance, such as dc gain, voltage and current stresses on the actives witch, currents through the inductors are shown in output wave forms.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129925788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A novel approach to maximize network life time by reducing power consumption level using CGNT model 一种利用CGNT模型通过降低功耗水平来最大化网络寿命的新方法
2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) Pub Date : 2016-08-04 DOI: 10.1109/ICCPCT.2016.7530247
Manas Ranjan Mallick, S. S. Pradhan, Jagamohan Padhi, Seema Panigrahi
{"title":"A novel approach to maximize network life time by reducing power consumption level using CGNT model","authors":"Manas Ranjan Mallick, S. S. Pradhan, Jagamohan Padhi, Seema Panigrahi","doi":"10.1109/ICCPCT.2016.7530247","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530247","url":null,"abstract":"A system having an embedded processor which can operate at minimum power with a small memory, where sensor having low data rate, battery, a GPS system and transceiver that operates at low data rate, collectively constitute a wireless device system. The power source in a wireless device system has a fixed value electro motive force (EMF) which is nothing but a battery. The EMF placed to any wireless sensor network is fixed and has deployed at the time of installation. After deployment it is almost difficult to manage and readjust the power source of each component individually in a network. Therefore it is our prime concernto optimize the energy consumption in each node level to have Maximum Network Life Time(MNLT). We have proposed a model name as Complementary Grouping of Network Traffic(CGNT) which gives a better solution for a load balance power aware routing by dissolving theprime uniformly distributed with coalition routing network into two standard group configurations without coalition routing network. The packets are forwarded from source to destination using shortest distance among nodes taking different path for each configuration to balance the power load and to avoid dead node. CGNT model approach consists of two complementary heterogeneous network groups, one which holds the corner nodes named as Corner Complementary Grouping of Network Traffic (CCGNT) and the other which holds the mid nodes named as Mid Complementary Grouping of Network Traffic (MCGNT). Our approach is to follow the motive of power aware routing along with the load balance use of power where individual source to destination node path of total network traffic are carried out differently in two groups, as a result of which the total variance of power level of all nodes in our proposed model CGNT comes up with a satisfactory minimal value, hence that certainly ensures a network's maximized life time as compared to all other existing models.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133408429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mouse behaviour based multi-factor authentication using neural networks 基于鼠标行为的神经网络多因素认证
2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) Pub Date : 2016-08-04 DOI: 10.1109/ICCPCT.2016.7530312
D. Hema, S. Bhanumathi
{"title":"Mouse behaviour based multi-factor authentication using neural networks","authors":"D. Hema, S. Bhanumathi","doi":"10.1109/ICCPCT.2016.7530312","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530312","url":null,"abstract":"Increased usage of multilevel security is noticed along with a rise in vulnerabilities for password based authentication. This is a level III security protection by authentication, which uses handwritten signature using mouse movement. User mouse behavioral pattern based security is a paradigm for online security layers. It uses digital signature to establish authentication with a secure system. The hypothesis is that even if signature verification and respective issuing authorities exists today, their penetration is not felt among a wider audience. To make it affordable and common man, friendly this paper describes user behavior based security. The recorded behavior is transformed as inputs to construct system understandable features. These recordings are carried out in a training system. During the training phase, every position of mouse movement and its curvature is recorded. This data is processed by a data character classifier and provided to an analyzer such that it computes a feature based on distance between points to build a user profile. A secure messaging token mechanism is integrated for multi factor secure authentication. It uses tokenizer cloud service and its mobile app to receive the token.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132883264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Video coding on fast curvelet transform and burrows wheeler transform (Bch) 基于快速曲线变换和burrows wheeler变换的视频编码
2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) Pub Date : 2016-03-18 DOI: 10.1109/ICCPCT.2016.7530364
Mr. Nithin
{"title":"Video coding on fast curvelet transform and burrows wheeler transform (Bch)","authors":"Mr. Nithin","doi":"10.1109/ICCPCT.2016.7530364","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530364","url":null,"abstract":"Due to the improvement in quality of multimedia and video services, peoples are more experienced. Because of bandwidth requirements and resolution problem the designers still search for new robust coding technique. This paper narrates a systematic method for video compression using a new technique: collaboration of fast curvelet transform, burrows wheeler transform and Huffman coding. Modify the number of element in each matrix at the output of fast curvelet transform. Then we apply burrows wheeler and Shannon fano encoding. Burrows wheeler transform BWT is mainly used for compressing any category of data anyhow of its information content. The Huffman coding principle is, compact binary string is used to represent a compressed stream. Huffman codes can be properly reconstructed because no code can be placed before the another code. This technique is used for gray scale as well as color videos.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115629261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Recent survey on efficient trust management in mobile ad hoc networks 移动自组网中高效信任管理的研究进展
2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) Pub Date : 2016-03-18 DOI: 10.1109/ICCPCT.2016.7530315
M. Anugraha, S. Krishnaveni
{"title":"Recent survey on efficient trust management in mobile ad hoc networks","authors":"M. Anugraha, S. Krishnaveni","doi":"10.1109/ICCPCT.2016.7530315","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530315","url":null,"abstract":"A Mobile Ad hoc Network is a self-organized network. The nodes which are within its radio range can have a direct communication if not it use an intermediate node for transmitting data. In MANET the nodes are wireless and fully distributed but they do not have any fixed infrastructure like base station or access points. MANET is a dynamic topology that is in this type of network the nodes will move randomly at any location with different speed at unpredictable time, so that the trust relationship is distributed among each node. The trust management is a tricky task; here the trust measures a subjective belief of a node. In a network the trust among nodes are very important for communication. The trust of a node is affected by the selfish and malicious nodes. By measuring some of the parameters like connectivity, energy, unselfishness and healthiness the malicious and the selfish nodes are predicted. In this network the secure routing is performed by the development of trust management protocols which yields the minimization of trust bias and it maximizes the application performance. This paper surveys different trust based protocols which obtains the trusted routing in malicious and selfish affected nodes.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115718686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A comprehensive study on machine learning concepts for text mining 文本挖掘中机器学习概念的综合研究
2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) Pub Date : 2016-03-18 DOI: 10.1109/ICCPCT.2016.7530259
K. Surya, R. Nithin, S. Prasanna, R. Venkatesan
{"title":"A comprehensive study on machine learning concepts for text mining","authors":"K. Surya, R. Nithin, S. Prasanna, R. Venkatesan","doi":"10.1109/ICCPCT.2016.7530259","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530259","url":null,"abstract":"The aim of machine learning is to solve a given problem using past experience or example data. Many machine learning applications are using now-a-days already. More aspiring problems can be handled as more data become accessible. Here. in this context we learn in detail about text mining as a multi-dimensional field which involves the closely linked areas or sections like 1. Retrieving information, 2. Machine learning concepts shortly termed as ML, 3. Statistics, 4. And finally Computational linguistics and specifically to be mentioned, data mining. With the use of sample data or previously gained experience, machine learning is included into computers to enhance or improve a performance decisive factor. In this context we have detailed a model up to some level of constraints, and learning is the processing of a main content to enhance the parameter of the form using the training or sample data or previously gained experience. This may be designed to gain knowledge from the given data, or use the effect for changes in the future, or both. These learning techniques also helps us to make solutions to various bugs which includes vision, speech recognition, and robotics. We take the example of the main analysis of preprocessing of tasks and procedures, then classification, then clustering, information extraction and finally visualization.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123128423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Sensorless brushless DC motor drive fed by Cuk converter 无传感器无刷直流电动机由Cuk变换器驱动
2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) Pub Date : 2016-03-18 DOI: 10.1109/ICCPCT.2016.7530108
Merin Jacob, Aishwarya V
{"title":"Sensorless brushless DC motor drive fed by Cuk converter","authors":"Merin Jacob, Aishwarya V","doi":"10.1109/ICCPCT.2016.7530108","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530108","url":null,"abstract":"This paper deals with sensorless brushless DC motor drive fed by a Cuk converter as a cost-effective solution for low-power applications. The single phase supply is fed to uncontrolled bridge rectifier, which is followed by a Cuk converter used to control the voltage of DC link capacitor that feds the Voltage Source Inverter (VSI). Voltage of the DC link capacitor of Cuk converter is controlled to achieve the speed control of BLDC motor. The rotor position sensors are eliminated by using sensorless control. Electronic commutation of the VSI is done by detecting the zero crossing points (ZCP) of the back EMF voltage difference in order to avoid phase delay circuits. A mathematical model of the drive system is simulated with MATLAB/SIMULINK.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116687532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Auction based dynamic resource allocation in cloud 基于拍卖的云计算动态资源分配
2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) Pub Date : 2016-03-18 DOI: 10.1109/ICCPCT.2016.7530347
E. I. Nehru, J. Infant Smile Shyni, R. Balakrishnan
{"title":"Auction based dynamic resource allocation in cloud","authors":"E. I. Nehru, J. Infant Smile Shyni, R. Balakrishnan","doi":"10.1109/ICCPCT.2016.7530347","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530347","url":null,"abstract":"Cloud computing is one of the fastest emerging technology. As we all know, cloud is a wide pool of resource which provides resources based on the users request. Any service can be provided as a service through cloud. As the cloud contains many resources, there may also wastage of resources. To reduce this wastage, cloud providers enter into auctioning of resources when the demand is high. Cloud computing includes distinct resources. Because of the complementary and supplementary effects between distinct assets, bidders have preferences not for just a single resource but also for a set of resources. Auctioning for a bundle of resources is called combinatorial auction. Dynamic resource allocation in on demand for a bundle of resource is proposed by using CA - PROVISION algorithm and the scenarios are simulated using Cloudsim, a simulator meant for cloud computing analysis.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123234117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信