2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)最新文献

筛选
英文 中文
Fuzzy based Fault Tolerant shunt Active Power Filter 基于模糊容错的并联有源电力滤波器
N. Madhuri, S. Doradla, M. Kalavathi
{"title":"Fuzzy based Fault Tolerant shunt Active Power Filter","authors":"N. Madhuri, S. Doradla, M. Kalavathi","doi":"10.1109/ICCICCT.2014.6993169","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993169","url":null,"abstract":"Active Power Filters are developed for compensating the harmonics, reactive power simultaneously. The performance of shunt Active Power Filter depends on the two factors i.e., type of the controller and methods used to obtain the reference current. Generally, the type of controller used in most of the Active Power Filters is traditional PI controller or Fuzzy Logic Controller. Recently, Fault Tolerant Shunt Active Power Filter was proposed using PI controller with redundancy method to guarantee reliability of Active Power Filters. However in this study, we propose a Fault tolerant Shunt Active Power Filter using Fuzzy Logic Controller instead of PI controller to achieve better performance in terms of Total Harmonic Distortion. Simulation results are obtained using MATLAB/SIMULINK for Fuzzy based Fault tolerant Shunt Active Power Filter in presence of open / short circuit fault and shown better results in comparison with Fault Tolerant Shunt Active Filter using PI controller.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"379 1","pages":"1334-1337"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78799358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Adaptive thresholding: A comparative study 自适应阈值法的比较研究
Payel Roy, Goutami Dey, S. Dutta, Sayan Chakraborty, N. Dey, R. Ray
{"title":"Adaptive thresholding: A comparative study","authors":"Payel Roy, Goutami Dey, S. Dutta, Sayan Chakraborty, N. Dey, R. Ray","doi":"10.1109/ICCICCT.2014.6993140","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993140","url":null,"abstract":"With the growth of image processing applications, image segmentation has become an important part of image processing. The simplest method to segment an image is thresholding. Using the thresholding method, segmentation of an image is done by fixing all pixels whose intensity values are more than the threshold to a foreground value. The remaining pixels are set to a background value. Such technique can be used to obtain binary images from grayscale images. The conventional thresholding techniques use a global threshold for all pixels, whereas adaptive thresholding changes the threshold value dynamically over the image. This paper offers a comparative study on adaptive thresholding techniques to choose the accurate method for binarizing an image based on the contrast, texture, resolution etc. of an image.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"1 1","pages":"1182-1186"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89680457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 94
Android malware attacks and countermeasures: Current and future directions Android恶意软件攻击和对策:当前和未来的方向
Rahul Raveendranath, V. Rajamani, Anoop Babu, S. K. Datta
{"title":"Android malware attacks and countermeasures: Current and future directions","authors":"Rahul Raveendranath, V. Rajamani, Anoop Babu, S. K. Datta","doi":"10.1109/ICCICCT.2014.6992944","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992944","url":null,"abstract":"Smartphones are rising in popularity as well as becoming more sophisticated over recent years. This popularity coupled with the fact that smartphones contain a lot of private user data is causing a proportional rise in different malwares for the platform. In this paper we analyze and classify state-of-the-art malware techniques and their countermeasures. The paper also reports a novel method for malware development and novel attack techniques such as mobile botnets, usage pattern based attacks and repackaging attacks. The possible countermeasures are also proposed. Then a detailed analysis of one of the proposed novel malware methods is explained. Finally the paper concludes by summarizing the paper.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"23 1","pages":"137-143"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86342373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Segmentation in Malayalam OCR — Handling broken characters using active contour model 马来语OCR中的分割-使用活动轮廓模型处理破碎字符
M. Praseetha, S. Deepa
{"title":"Segmentation in Malayalam OCR — Handling broken characters using active contour model","authors":"M. Praseetha, S. Deepa","doi":"10.1109/ICCICCT.2014.6993097","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993097","url":null,"abstract":"Character segmentation is a significant phase in an Optical Character Recognition (OCR) system. In this stage of OCR, the image of sequence of characters is decomposed into sub-images of individual symbols. The recognition of characters depends on this phase so that any mistake in the segmentation leads to a complete failure of the OCR system. One of the main reasons for incorrect segmentation of characters is the presence of broken characters in the input document. Here an approach based on Active Contour Model is proposed to solve this problem.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"71 1","pages":"958-962"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86405958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud storage system enabling secure privacy preserving third party audit 云存储系统支持安全隐私保护第三方审计
D. Rewadkar, Suchita Y. Ghatage
{"title":"Cloud storage system enabling secure privacy preserving third party audit","authors":"D. Rewadkar, Suchita Y. Ghatage","doi":"10.1109/ICCICCT.2014.6993049","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993049","url":null,"abstract":"Cloud computing is a revolutionary new approach to how computing services are produced and consumed. It is an abstraction of the concept of pooling resources and presenting them as virtual resources. Using cloud computing resources, data, computations, and services can be shared over scalable network of nodes; these nodes may represent the datacenters, end user computers and web services. On the same note cloud storage refers to storing the data on a remote storage located at other organization's infrastructure. The data storage is maintained and managed by the organization; the user will pay for the storage space which is used. Outsourcing data ultimately relinquishes the control of data from user and the fate of data is in control of the cloud server. As the data is stored on cloud server, the storage correctness of data is put on risk. The cloud server is managed by cloud service provider which is a different administrative entity, so ensuring the data integrity is of prime importance. This article studies the problems of ensuring data storage correctness and proposes an efficient and secure method to address these issues. A third party auditor is introduced securely, who will on behalf of users request will periodically verify the data integrity of the data stored on cloud server. There will not be any online burden on user and security of data will be maintained as the data will not be shared directly with the third party auditor. A homomorphic encryption scheme is used to encrypt the data which will be shared with the TPA. The results can be further extended to enable the third party auditor to do multiple auditing.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"52 1","pages":"695-699"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79127852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Smile detection from still images using KNN algorithm 基于KNN算法的静态图像微笑检测
T. George, Sumi P. Potty, Sneha Jose
{"title":"Smile detection from still images using KNN algorithm","authors":"T. George, Sumi P. Potty, Sneha Jose","doi":"10.1109/ICCICCT.2014.6993006","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993006","url":null,"abstract":"Reliable detection and recognition of facial expression from still images in the unconstrained real world situations has many potential applications. Smile detection can be used in many applications include modeling systems for psychological studies on human emotional responses, expression recognition technologies, extending image search capabilities etc. This paper proposes an experimental study of smile detection in embedded environment using Raspberry Pi board, by extracting mouth and eye pair from images using Haar-cascade classifier and train these images using KNN matching algorithm. The relatively simple K- Nearest Neighbor is used because of its lazy learning efficiency. OpenCV- 2.3.1(Open Source Computer Vision) library is used as the imaging library. The experiments explored that the proposed approach has an accuracy of 66.6%.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"1 1","pages":"461-465"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76459096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Area efficient fully parallel distributed arithmetic architecture for one-dimensional discrete cosine transform 一维离散余弦变换的面积高效全并行分布式算法结构
Teena Susan Elias, P. Dhanusha
{"title":"Area efficient fully parallel distributed arithmetic architecture for one-dimensional discrete cosine transform","authors":"Teena Susan Elias, P. Dhanusha","doi":"10.1109/ICCICCT.2014.6992973","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992973","url":null,"abstract":"The paper describes the design of one-dimensional discrete cosine transform (DCT) which is widely used in image and video compression systems. The objective of this paper is to design an area efficient fully parallel distributed arithmetic (DA) architecture for one-dimensional DCT to be implemented on field programmable gate array (FPGA). DCT requires large amount of mathematical computations including multiplications and accumulations. The multipliers consume increased power and area; hence multipliers are completely discarded in the proposed design. Distributed arithmetic is a method of modification at bit stream for sum of product or vector dot product to hide the multiplications. DA is very much suitable for FPGA designs as it reduces the size of a multiply and accumulate hardware. The speed is increased in the proposed design with the fully parallel approach. In this work, existing DA architecture for 1D-DCT and the proposed area efficient fully parallel DA architecture for 1D-DCT are realized. The simulation is performed using Modelsim6.2b and synthesized with Xilinx IS E Simulator. The 1D-DCT can be extended to 2D-DCT by using row column decomposition technique.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"29 1","pages":"294-299"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90665341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A retrospective study based on the soft computing approach in combined Ultrasonic Assisted Electrical Discharge Machining 基于软计算方法的超声辅助电火花复合加工的回顾性研究
D. Sudhakar, M. D. Anand, P. Gopu, Yang Wang, Mohammadreza Shabgard, Hamed Kakolvand, Mirsadegh Seyedzavvar
{"title":"A retrospective study based on the soft computing approach in combined Ultrasonic Assisted Electrical Discharge Machining","authors":"D. Sudhakar, M. D. Anand, P. Gopu, Yang Wang, Mohammadreza Shabgard, Hamed Kakolvand, Mirsadegh Seyedzavvar","doi":"10.1109/ICCICCT.2014.6993195","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993195","url":null,"abstract":"Machining of super alloys, composite materials and some high strength hard to machine materials by using Electrical Discharge Machining (EDM) produces poor quality surface finish. Ultrasonic Assisted Electrical Discharge Machining (USEDM) is one of the advanced hybrid type unconventional machining processes is developed to overcome the above quality problems. The ultimate aim of this paper is to conduct a literature survey in USEDM operations used by researchers among different applications using various materials. Also took a deep review in different prediction and optimization techniques used by researchers to obtain the optimal input parameters setting for getting an optimal solution in machining area.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"480 1","pages":"1487-1494"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75178852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of non-volatile 4×4 4T1D DRAM cell in 0.18μm technology 采用0.18μm技术实现非易失性4×4 4T1D DRAM单元
T. Joseph, Ajith Ravindran
{"title":"Implementation of non-volatile 4×4 4T1D DRAM cell in 0.18μm technology","authors":"T. Joseph, Ajith Ravindran","doi":"10.1109/ICCICCT.2014.6993001","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993001","url":null,"abstract":"This paper deals with the design and evolution of different 4×4 bit DRAM cells. Performances of different volatile 4×4 DRAM cells are compared. The comparison is done on the basis of power, area and delay. The 4×4 Non-Volatile (NVDRAM 4T1D) cell is proposed. The performance of the NVDRAM is then examined. The schematic entry was done using Mentor Graphics Design architect and simulations are done using Mentor Graphics Eldo. The simulation results obtained with TSMC 0.18μm process technology at 1.8V.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"507 1","pages":"435-439"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77348695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A survey on Z-source inverter z源逆变器研究进展
N. R. Sreeprathab, X. F. Joseph
{"title":"A survey on Z-source inverter","authors":"N. R. Sreeprathab, X. F. Joseph","doi":"10.1109/ICCICCT.2014.6993182","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993182","url":null,"abstract":"In the established Voltage source inverter (VSI) and Current source inverter (CSI), are customized to get a new technology called as Z Source inverter. This highly developed Z Source technology has a set of connections of LC with revision, and traditional pulse width modulated signal which is used with modifications. In order to interconnect the main circuit to the power source, the Z Source inverter is being employed, which holds the distinctive impedance system. So as to overcome the concept and hypothetical obstacles and boundaries present in VSI and CSI, gives a fresh power conversion model. In this paper various topologies of Z Source inverters are reviewed and discussed.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"110 1","pages":"1406-1410"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78104541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信