{"title":"Fuzzy based Fault Tolerant shunt Active Power Filter","authors":"N. Madhuri, S. Doradla, M. Kalavathi","doi":"10.1109/ICCICCT.2014.6993169","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993169","url":null,"abstract":"Active Power Filters are developed for compensating the harmonics, reactive power simultaneously. The performance of shunt Active Power Filter depends on the two factors i.e., type of the controller and methods used to obtain the reference current. Generally, the type of controller used in most of the Active Power Filters is traditional PI controller or Fuzzy Logic Controller. Recently, Fault Tolerant Shunt Active Power Filter was proposed using PI controller with redundancy method to guarantee reliability of Active Power Filters. However in this study, we propose a Fault tolerant Shunt Active Power Filter using Fuzzy Logic Controller instead of PI controller to achieve better performance in terms of Total Harmonic Distortion. Simulation results are obtained using MATLAB/SIMULINK for Fuzzy based Fault tolerant Shunt Active Power Filter in presence of open / short circuit fault and shown better results in comparison with Fault Tolerant Shunt Active Filter using PI controller.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"379 1","pages":"1334-1337"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78799358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Payel Roy, Goutami Dey, S. Dutta, Sayan Chakraborty, N. Dey, R. Ray
{"title":"Adaptive thresholding: A comparative study","authors":"Payel Roy, Goutami Dey, S. Dutta, Sayan Chakraborty, N. Dey, R. Ray","doi":"10.1109/ICCICCT.2014.6993140","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993140","url":null,"abstract":"With the growth of image processing applications, image segmentation has become an important part of image processing. The simplest method to segment an image is thresholding. Using the thresholding method, segmentation of an image is done by fixing all pixels whose intensity values are more than the threshold to a foreground value. The remaining pixels are set to a background value. Such technique can be used to obtain binary images from grayscale images. The conventional thresholding techniques use a global threshold for all pixels, whereas adaptive thresholding changes the threshold value dynamically over the image. This paper offers a comparative study on adaptive thresholding techniques to choose the accurate method for binarizing an image based on the contrast, texture, resolution etc. of an image.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"1 1","pages":"1182-1186"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89680457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rahul Raveendranath, V. Rajamani, Anoop Babu, S. K. Datta
{"title":"Android malware attacks and countermeasures: Current and future directions","authors":"Rahul Raveendranath, V. Rajamani, Anoop Babu, S. K. Datta","doi":"10.1109/ICCICCT.2014.6992944","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992944","url":null,"abstract":"Smartphones are rising in popularity as well as becoming more sophisticated over recent years. This popularity coupled with the fact that smartphones contain a lot of private user data is causing a proportional rise in different malwares for the platform. In this paper we analyze and classify state-of-the-art malware techniques and their countermeasures. The paper also reports a novel method for malware development and novel attack techniques such as mobile botnets, usage pattern based attacks and repackaging attacks. The possible countermeasures are also proposed. Then a detailed analysis of one of the proposed novel malware methods is explained. Finally the paper concludes by summarizing the paper.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"23 1","pages":"137-143"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86342373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Segmentation in Malayalam OCR — Handling broken characters using active contour model","authors":"M. Praseetha, S. Deepa","doi":"10.1109/ICCICCT.2014.6993097","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993097","url":null,"abstract":"Character segmentation is a significant phase in an Optical Character Recognition (OCR) system. In this stage of OCR, the image of sequence of characters is decomposed into sub-images of individual symbols. The recognition of characters depends on this phase so that any mistake in the segmentation leads to a complete failure of the OCR system. One of the main reasons for incorrect segmentation of characters is the presence of broken characters in the input document. Here an approach based on Active Contour Model is proposed to solve this problem.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"71 1","pages":"958-962"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86405958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud storage system enabling secure privacy preserving third party audit","authors":"D. Rewadkar, Suchita Y. Ghatage","doi":"10.1109/ICCICCT.2014.6993049","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993049","url":null,"abstract":"Cloud computing is a revolutionary new approach to how computing services are produced and consumed. It is an abstraction of the concept of pooling resources and presenting them as virtual resources. Using cloud computing resources, data, computations, and services can be shared over scalable network of nodes; these nodes may represent the datacenters, end user computers and web services. On the same note cloud storage refers to storing the data on a remote storage located at other organization's infrastructure. The data storage is maintained and managed by the organization; the user will pay for the storage space which is used. Outsourcing data ultimately relinquishes the control of data from user and the fate of data is in control of the cloud server. As the data is stored on cloud server, the storage correctness of data is put on risk. The cloud server is managed by cloud service provider which is a different administrative entity, so ensuring the data integrity is of prime importance. This article studies the problems of ensuring data storage correctness and proposes an efficient and secure method to address these issues. A third party auditor is introduced securely, who will on behalf of users request will periodically verify the data integrity of the data stored on cloud server. There will not be any online burden on user and security of data will be maintained as the data will not be shared directly with the third party auditor. A homomorphic encryption scheme is used to encrypt the data which will be shared with the TPA. The results can be further extended to enable the third party auditor to do multiple auditing.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"52 1","pages":"695-699"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79127852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smile detection from still images using KNN algorithm","authors":"T. George, Sumi P. Potty, Sneha Jose","doi":"10.1109/ICCICCT.2014.6993006","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993006","url":null,"abstract":"Reliable detection and recognition of facial expression from still images in the unconstrained real world situations has many potential applications. Smile detection can be used in many applications include modeling systems for psychological studies on human emotional responses, expression recognition technologies, extending image search capabilities etc. This paper proposes an experimental study of smile detection in embedded environment using Raspberry Pi board, by extracting mouth and eye pair from images using Haar-cascade classifier and train these images using KNN matching algorithm. The relatively simple K- Nearest Neighbor is used because of its lazy learning efficiency. OpenCV- 2.3.1(Open Source Computer Vision) library is used as the imaging library. The experiments explored that the proposed approach has an accuracy of 66.6%.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"1 1","pages":"461-465"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76459096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Area efficient fully parallel distributed arithmetic architecture for one-dimensional discrete cosine transform","authors":"Teena Susan Elias, P. Dhanusha","doi":"10.1109/ICCICCT.2014.6992973","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992973","url":null,"abstract":"The paper describes the design of one-dimensional discrete cosine transform (DCT) which is widely used in image and video compression systems. The objective of this paper is to design an area efficient fully parallel distributed arithmetic (DA) architecture for one-dimensional DCT to be implemented on field programmable gate array (FPGA). DCT requires large amount of mathematical computations including multiplications and accumulations. The multipliers consume increased power and area; hence multipliers are completely discarded in the proposed design. Distributed arithmetic is a method of modification at bit stream for sum of product or vector dot product to hide the multiplications. DA is very much suitable for FPGA designs as it reduces the size of a multiply and accumulate hardware. The speed is increased in the proposed design with the fully parallel approach. In this work, existing DA architecture for 1D-DCT and the proposed area efficient fully parallel DA architecture for 1D-DCT are realized. The simulation is performed using Modelsim6.2b and synthesized with Xilinx IS E Simulator. The 1D-DCT can be extended to 2D-DCT by using row column decomposition technique.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"29 1","pages":"294-299"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90665341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of various ARP poisoning mitigation techniques: A comparison","authors":"Nikhil Tripathi, B. Mehtre","doi":"10.1109/ICCICCT.2014.6992942","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992942","url":null,"abstract":"Address Resolution Protocol (ARP) is the fundamental and one of the most frequently used protocol involved in computer communications. Within a LAN, ARP messages are used to resolve IP addresses into corresponding MAC addresses. Nevertheless, some of the limitations within this protocol make it rather vulnerable. The two most prominent limitations are - unauthenticated and stateless nature of ARP. The attackers can easily exploit these loopholes for their personal gain. ARP poisoning is considered as unitary of the basic attacks which is utilized to launch higher level attacks. Several solutions have been proposed in the literature to detect and prevent these attacks. However, all of the proposed solutions are limited to a certain extent. Some solutions are effective in a special set of scenarios while others are rather suited for scenarios belonging to a different band. As new techniques of ARP poisoning have evolved with time, researchers are getting motivated to propose new solutions. In this paper, we have presented a comparative analysis of different proposed solutions which are rather popular in the literature. We have compared different mitigation techniques based on some of the important factors that are considered as limitations to the proposed solutions. These factors are derived from the scenarios which are possible within a LAN when an ARP Poisoning attack is launched. A brief tabular format is likewise introduced in this paper which offers a fast overview of comparison between different proposed schemes. This comparative study can further be used to offer and build up a more efficient and effective scheme which, on one hand, enjoys the combined advantage of different mitigation techniques and on the other hand, does not hold the old limitations.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"69 1","pages":"125-132"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73435204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A retrospective study based on the soft computing approach in Electro Chemical discharge machining","authors":"J. Joe, Jeba Rajan, M. Dev Anand, P. Gopu","doi":"10.1109/ICCICCT.2014.6993194","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993194","url":null,"abstract":"The improvement in materials strength as days goes and goes, hybrid type of unconventional machining process has been developed and continuous. In that case researchers developed the combined process of Electro Chemical Machining (ECM) and Electrical Discharge Machining (EDM) for increase the quality of the components. In this current review work, the setting of different levels of parameters in Electro Chemical Discharge Machining (ECDM) and their corresponding effect in the various responses has been studied. The different prediction and optimization approaches used for control the parameters in different work also reviewed.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"4 1","pages":"1482-1486"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90636073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Gopi Krishna Rao, M. Subramanyam, K. Satyaprasad
{"title":"Study on PID controller design and performance based on tuning techniques","authors":"P. Gopi Krishna Rao, M. Subramanyam, K. Satyaprasad","doi":"10.1109/ICCICCT.2014.6993183","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993183","url":null,"abstract":"The simplicity, ease of implementation and robustness has attracted the use of Proportional, Integral and Derivative (PID) controllers in the chemical process industries. Numerous tuning techniques are available for tuning of PID controllers, each one of it has its pros and cons. Majority of the tuning techniques are proposed for First Order System with Time Delay (FOPDT). This paper presents the technique for obtaining the FOPDT model using Sundaresan and Krishnaswamy method and performance comparison of PID controller based on open loop, closed loop tuning techniques and PID controller tuned with Internal Model Control (IMC) technique for setpoint tracking and disturbance rejection. Analysis is carried out in terms of Integral error criteria's, Integral Absolute Error (IAE) and Integral Squared Error (ISE) and time response information viz. rise time, settling time, % peak overshoot and maximum sensitivity. Superheated steam temperature system of 500 MW boiler and Mean arterial blood pressure system are considered for the simulation study. The results indicate that the ratio of time delay and time constant have influence on the performance of the tuning techniques. IMC - PID provides the flexibility of adjustment for desired performance in comparison to other tuning techniques.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"23 1","pages":"1411-1417"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78229963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}