2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)最新文献

筛选
英文 中文
Experimental evaluation of PID and ESO controller for instrument landing system 仪表着陆系统PID和ESO控制器的实验评价
Rahul Jain, P. Shetty, Satyanarayan Shenoy
{"title":"Experimental evaluation of PID and ESO controller for instrument landing system","authors":"Rahul Jain, P. Shetty, Satyanarayan Shenoy","doi":"10.1109/ICCICCT.2014.6993059","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993059","url":null,"abstract":"This paper presents methodologies for design and experimental evaluation of both Proportional Integral and Derivative (PID) and Extended State Observer (ESO) controller for auto landing system. The process of auto landing can be experimentally described as second-order model for ESO controller. A PID controller and ESO controller is proposed to achieve the desired response for the autoland system. Computer simulations are performed to illustrate the performance of PID and ESO controller in comparison to each other. The applicability and usefulness of the proposed control scheme are well exemplified by conducting experiments on an aircraft model. Both simulations and experimental results reveal that the proposed PID and ESO scheme performs equally.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"24 1","pages":"751-757"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81867914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A tutorial review on data compression with detection of fetal heart beat from noisy ECG 基于噪声心电检测胎儿心跳的数据压缩技术综述
Bommepalli Madhava Reddy, T. Subbareddy, Saureddy Omkar Reddy, V. Elamaran
{"title":"A tutorial review on data compression with detection of fetal heart beat from noisy ECG","authors":"Bommepalli Madhava Reddy, T. Subbareddy, Saureddy Omkar Reddy, V. Elamaran","doi":"10.1109/ICCICCT.2014.6993163","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993163","url":null,"abstract":"FECG (Fetal Electrocardiogram) signal convey information in making timely decisions during pregnancy. It is very important to extract and detect the FECG signal from a composite maternal abdominal signals for task of fetal monitoring. We implement adaptive filters for the task of separation of FECG signal from the abdominal ECG signal and understand its nature. A Least Mean Square (LMS) algorithm is implemented for the purpose of detection adaptively. Data compression techniques are implemented foe the filtered ECG signal for the purpose of easy storage and transmission. Since the data is more important and sensitive, it is necessary to implement lossless compression with high compression ratio by reducing the redundancy involved in the ECG signal with low noise. A Fast Fourier Transform, Discrete Cosine Transform (DCT), DCT-II and Discrete Sine Transform (DST) methods are used here for the purpose of compression. The performance metrics like compression ratio, low percent mean square (PRD) are compared and the results are tabulated by using Matlab software tool.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"7 1","pages":"1310-1314"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82363753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
OFDM baseband receiver performance analysis for various received signal impairments OFDM基带接收机的各种接收信号损伤性能分析
Rini Maria James, I. Mahalakshmi, M. Rangachar
{"title":"OFDM baseband receiver performance analysis for various received signal impairments","authors":"Rini Maria James, I. Mahalakshmi, M. Rangachar","doi":"10.1109/ICCICCT.2014.6992991","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992991","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) is a digital transmission technique used both in wired and wireless communication systems to achieve higher data rates. The idea of OFDM is to split the total transmission bandwidth into a number of orthogonal subcarriers which are transmitted in parallel. In this paper the performance of OFDM baseband receiver is analyzed for various received signal impairments. The impairments considered includes phase offset, frequency offset and synchronization mismatches. Finally the quantization of these observations are carried out.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"22 1","pages":"382-387"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80387498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FPGA synthesis of area efficient data path for reconfigurable FIR filter 可重构FIR滤波器区域高效数据路径的FPGA合成
R. Saranya, C. Pradeep
{"title":"FPGA synthesis of area efficient data path for reconfigurable FIR filter","authors":"R. Saranya, C. Pradeep","doi":"10.1109/ICCICCT.2014.6992985","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992985","url":null,"abstract":"Reconfigurable computing for DSP remains an active area of research as the need for integration with more traditional DSP technologies become apparent. Traditionally, most of the work in the field of reconfigurable computing was focused on fine-grained FPGA devices. Over the years, the focus was shifted from bit level granularity to a more coarse grained composition. In this paper, we present the synthesis of high-throughput and area efficient data path for reconfigurable Finite Impulse Response (FIR) filter. FIR filters have been and continue to be important building blocks in many DSP systems. It computes the output by multiplying a set of input samples with a set of coefficients followed by addition. Here, the multiplication and addition processess are based on the concept of Divide and Conquer approach. Separate multiplier and adder blocks are designed to model the FIR filter. The design was modeled using Verilog HDL and simulated and synthesized using Xilinx IS E 14.2. The design was also synthesized in Leonardo Spectrum. A comparison was made by implementing the design on different FPGA devices. The result shows that the proposed system has better device utilization in Virtex-5 FPGA.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"11 1","pages":"349-354"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81668400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel approach for sequential pattern mining by using genetic algorithm 一种基于遗传算法的序列模式挖掘新方法
M. Saravanan, V. Jyothi
{"title":"A novel approach for sequential pattern mining by using genetic algorithm","authors":"M. Saravanan, V. Jyothi","doi":"10.1109/ICCICCT.2014.6992971","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992971","url":null,"abstract":"Web Usage Mining can be described as the discovery and analysis of user access pattern through mining of log files and associated data from a particular websites. Huge Number of visitors interact daily with web sites around the world. Huge amount of data are being produced and these in order could be very helpful to the company in the field of compliant customer's behaviors'. The world wide web contains increasing amount of websites which in turn contain increasing number of web pages. When a user visits a new website, it has to go through large number of web pages to meet their necessities. Web usage mining is the procedure of removing useful information from server logs. Hence, this work discovers sequential patterns of web files using genetic algorithm. This approach can be used to analyze the recent visitor's trend and lead to the creation of repeated and most visited pages. The purpose of using genetic algorithm is to find optimal sequential web pages.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"30 1","pages":"284-288"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82776544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A review on hyperspectral image compression 高光谱图像压缩研究进展
Sanjith S, Ganesan R
{"title":"A review on hyperspectral image compression","authors":"Sanjith S, Ganesan R","doi":"10.1109/ICCICCT.2014.6993136","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993136","url":null,"abstract":"The growth of small satellite communication technologies, demands for data transmission and storage is rapidly increased. The advancements in computer technology and digital data processing techniques improves the efficiency of transmission and storage of data. Recently hyperspectral image compression has got considerable attention and so many researches had been made in this field and got positive results in compression ratio. In this paper we have made a state-of-the-art investigation about hyperspectral image compression which can be used in satellites onboard compression. Mainly this investigation is focused on lossy, lossless and near lossless compression methods and methodologies used to perform the compression. Topics covered includes Distributed Source Coding (DSC), Slepian-Wolf theory, M-CALIC, LAIS-LUT, FIVQ, DCT, JPEG2000 Multidimensional lattice vector quantization. As a final point the merits and demerits are discussed.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"76 3 1","pages":"1159-1163"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87856029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Mobile agent based security in MANETS against Sybil attack 基于移动代理的MANETS安全防御Sybil攻击
A. Aranganathan, C. Suriyakala
{"title":"Mobile agent based security in MANETS against Sybil attack","authors":"A. Aranganathan, C. Suriyakala","doi":"10.1109/ICCICCT.2014.6993170","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993170","url":null,"abstract":"In this paper, we deal with mobile ad-hoc networks have emerged as a major next generation wireless technology. An attack in MANET is very vulnerable for all the layers. An attack acts as a malicious node which affects the network performance. Sybil attack is one of the severe attacks in network layer which creates confusion in the routing which can be detected and prevented by an Agent. Agent can able to update the routing information throughout the network and also to reduce the network load. In this research, we propose a mobile agent based scheme to detect the new identities of Sybil attackers without using centralized trusted third party or any extra hardware such as directional antenna or a geographical positioning system and also can be prevented by cryptographic system. The improved in the packet delivery ratio, reduced network overload and the improved bandwidth efficiency are performed using ns2 tool.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"39 1","pages":"1338-1342"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86730977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance comparison of an error correction technique in memory 一种内存纠错技术的性能比较
Linz Elizabeth Kurian, B. Mathew
{"title":"Performance comparison of an error correction technique in memory","authors":"Linz Elizabeth Kurian, B. Mathew","doi":"10.1109/ICCICCT.2014.6992986","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992986","url":null,"abstract":"Memories are always sensitive to soft errors which affect memory reliability. A common method for protecting memories from soft errors is the use of Error Correcting Codes (ECC). As technology shrinks, Multiple Cell Upsets (MCU) pose a major issue in the reliability of memories exposed to radiation environments. Here a Decimal Matrix Code (DMC) based on divide-symbol is used to enhance memory reliability. Large number of redundant bits are used in this approach. A comparison was made by implementing the design by using different adder structures such as Ripple carry, Carry lookahead and Kogge Stone adder. The design was modeled using VHDL, simulated and synthesized using Xilinx IS E 14.2. The results show that the design implemented by using Kogge stone adder has higher performance.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"39 1","pages":"355-359"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86983611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An integrated system for tracking and recognition using Kalman filter 基于卡尔曼滤波的跟踪与识别集成系统
A. Vijay, Anoop K. Johnson
{"title":"An integrated system for tracking and recognition using Kalman filter","authors":"A. Vijay, Anoop K. Johnson","doi":"10.1109/ICCICCT.2014.6993118","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993118","url":null,"abstract":"Tracking of any object from a video scene becomes more critical not only for security applications but also for analyzing traffic. This system integrates low level image processing as well as high level image processing through online data model and offline data model for more efficiency and robustness. Also this makes the system to handle occlusion conditions and abrupt color intensity variation conditions. This system uses median filtering and blob extraction for moving object detection. The offline model employs high level image processing recognize the moving objects. Here the Kalman filter is used for effective tracking under complex situations.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"10 1","pages":"1065-1069"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85204647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Forensic investigation framework for P2P protocol P2P协议的取证调查框架
T. Manesh, M. Sha, K. Vivekanandan
{"title":"Forensic investigation framework for P2P protocol","authors":"T. Manesh, M. Sha, K. Vivekanandan","doi":"10.1109/ICCICCT.2014.6992966","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992966","url":null,"abstract":"Online sharing of digital assents have now become common in the internet by its increased number of users over a decade drastically. There are many online sharing resources which offer huge storage. These facilities tend the internet users to upload and download pirated softwares, movies and other similar digital assets which violates all copyrights. The P2P protocol is working behind such online sharing websites and resources. The cyber cell is very active now in various parts of the country to trace and fraudulent sharing of files when reported. So it is necessary to have an efficient mechanism to find the actual content which is being uploaded or downloaded from a particular machine as part of network forensic investigation. Usually P2P websites and services are blocked in enterprises and educational institutions to avoid sharing of unwanted digital assets and also to increase internet bandwidth. The proposed novel technique is based on network forensics which can be used for content level observation of P2P Bit Torrent protocol and regenerate original malicious content or session between malicious users for their prosecution in the court.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"26 1","pages":"256-264"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89266524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信