{"title":"Experimental evaluation of PID and ESO controller for instrument landing system","authors":"Rahul Jain, P. Shetty, Satyanarayan Shenoy","doi":"10.1109/ICCICCT.2014.6993059","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993059","url":null,"abstract":"This paper presents methodologies for design and experimental evaluation of both Proportional Integral and Derivative (PID) and Extended State Observer (ESO) controller for auto landing system. The process of auto landing can be experimentally described as second-order model for ESO controller. A PID controller and ESO controller is proposed to achieve the desired response for the autoland system. Computer simulations are performed to illustrate the performance of PID and ESO controller in comparison to each other. The applicability and usefulness of the proposed control scheme are well exemplified by conducting experiments on an aircraft model. Both simulations and experimental results reveal that the proposed PID and ESO scheme performs equally.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"24 1","pages":"751-757"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81867914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bommepalli Madhava Reddy, T. Subbareddy, Saureddy Omkar Reddy, V. Elamaran
{"title":"A tutorial review on data compression with detection of fetal heart beat from noisy ECG","authors":"Bommepalli Madhava Reddy, T. Subbareddy, Saureddy Omkar Reddy, V. Elamaran","doi":"10.1109/ICCICCT.2014.6993163","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993163","url":null,"abstract":"FECG (Fetal Electrocardiogram) signal convey information in making timely decisions during pregnancy. It is very important to extract and detect the FECG signal from a composite maternal abdominal signals for task of fetal monitoring. We implement adaptive filters for the task of separation of FECG signal from the abdominal ECG signal and understand its nature. A Least Mean Square (LMS) algorithm is implemented for the purpose of detection adaptively. Data compression techniques are implemented foe the filtered ECG signal for the purpose of easy storage and transmission. Since the data is more important and sensitive, it is necessary to implement lossless compression with high compression ratio by reducing the redundancy involved in the ECG signal with low noise. A Fast Fourier Transform, Discrete Cosine Transform (DCT), DCT-II and Discrete Sine Transform (DST) methods are used here for the purpose of compression. The performance metrics like compression ratio, low percent mean square (PRD) are compared and the results are tabulated by using Matlab software tool.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"7 1","pages":"1310-1314"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82363753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OFDM baseband receiver performance analysis for various received signal impairments","authors":"Rini Maria James, I. Mahalakshmi, M. Rangachar","doi":"10.1109/ICCICCT.2014.6992991","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992991","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) is a digital transmission technique used both in wired and wireless communication systems to achieve higher data rates. The idea of OFDM is to split the total transmission bandwidth into a number of orthogonal subcarriers which are transmitted in parallel. In this paper the performance of OFDM baseband receiver is analyzed for various received signal impairments. The impairments considered includes phase offset, frequency offset and synchronization mismatches. Finally the quantization of these observations are carried out.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"22 1","pages":"382-387"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80387498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA synthesis of area efficient data path for reconfigurable FIR filter","authors":"R. Saranya, C. Pradeep","doi":"10.1109/ICCICCT.2014.6992985","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992985","url":null,"abstract":"Reconfigurable computing for DSP remains an active area of research as the need for integration with more traditional DSP technologies become apparent. Traditionally, most of the work in the field of reconfigurable computing was focused on fine-grained FPGA devices. Over the years, the focus was shifted from bit level granularity to a more coarse grained composition. In this paper, we present the synthesis of high-throughput and area efficient data path for reconfigurable Finite Impulse Response (FIR) filter. FIR filters have been and continue to be important building blocks in many DSP systems. It computes the output by multiplying a set of input samples with a set of coefficients followed by addition. Here, the multiplication and addition processess are based on the concept of Divide and Conquer approach. Separate multiplier and adder blocks are designed to model the FIR filter. The design was modeled using Verilog HDL and simulated and synthesized using Xilinx IS E 14.2. The design was also synthesized in Leonardo Spectrum. A comparison was made by implementing the design on different FPGA devices. The result shows that the proposed system has better device utilization in Virtex-5 FPGA.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"11 1","pages":"349-354"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81668400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach for sequential pattern mining by using genetic algorithm","authors":"M. Saravanan, V. Jyothi","doi":"10.1109/ICCICCT.2014.6992971","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992971","url":null,"abstract":"Web Usage Mining can be described as the discovery and analysis of user access pattern through mining of log files and associated data from a particular websites. Huge Number of visitors interact daily with web sites around the world. Huge amount of data are being produced and these in order could be very helpful to the company in the field of compliant customer's behaviors'. The world wide web contains increasing amount of websites which in turn contain increasing number of web pages. When a user visits a new website, it has to go through large number of web pages to meet their necessities. Web usage mining is the procedure of removing useful information from server logs. Hence, this work discovers sequential patterns of web files using genetic algorithm. This approach can be used to analyze the recent visitor's trend and lead to the creation of repeated and most visited pages. The purpose of using genetic algorithm is to find optimal sequential web pages.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"30 1","pages":"284-288"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82776544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review on hyperspectral image compression","authors":"Sanjith S, Ganesan R","doi":"10.1109/ICCICCT.2014.6993136","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993136","url":null,"abstract":"The growth of small satellite communication technologies, demands for data transmission and storage is rapidly increased. The advancements in computer technology and digital data processing techniques improves the efficiency of transmission and storage of data. Recently hyperspectral image compression has got considerable attention and so many researches had been made in this field and got positive results in compression ratio. In this paper we have made a state-of-the-art investigation about hyperspectral image compression which can be used in satellites onboard compression. Mainly this investigation is focused on lossy, lossless and near lossless compression methods and methodologies used to perform the compression. Topics covered includes Distributed Source Coding (DSC), Slepian-Wolf theory, M-CALIC, LAIS-LUT, FIVQ, DCT, JPEG2000 Multidimensional lattice vector quantization. As a final point the merits and demerits are discussed.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"76 3 1","pages":"1159-1163"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87856029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile agent based security in MANETS against Sybil attack","authors":"A. Aranganathan, C. Suriyakala","doi":"10.1109/ICCICCT.2014.6993170","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993170","url":null,"abstract":"In this paper, we deal with mobile ad-hoc networks have emerged as a major next generation wireless technology. An attack in MANET is very vulnerable for all the layers. An attack acts as a malicious node which affects the network performance. Sybil attack is one of the severe attacks in network layer which creates confusion in the routing which can be detected and prevented by an Agent. Agent can able to update the routing information throughout the network and also to reduce the network load. In this research, we propose a mobile agent based scheme to detect the new identities of Sybil attackers without using centralized trusted third party or any extra hardware such as directional antenna or a geographical positioning system and also can be prevented by cryptographic system. The improved in the packet delivery ratio, reduced network overload and the improved bandwidth efficiency are performed using ns2 tool.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"39 1","pages":"1338-1342"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86730977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance comparison of an error correction technique in memory","authors":"Linz Elizabeth Kurian, B. Mathew","doi":"10.1109/ICCICCT.2014.6992986","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992986","url":null,"abstract":"Memories are always sensitive to soft errors which affect memory reliability. A common method for protecting memories from soft errors is the use of Error Correcting Codes (ECC). As technology shrinks, Multiple Cell Upsets (MCU) pose a major issue in the reliability of memories exposed to radiation environments. Here a Decimal Matrix Code (DMC) based on divide-symbol is used to enhance memory reliability. Large number of redundant bits are used in this approach. A comparison was made by implementing the design by using different adder structures such as Ripple carry, Carry lookahead and Kogge Stone adder. The design was modeled using VHDL, simulated and synthesized using Xilinx IS E 14.2. The results show that the design implemented by using Kogge stone adder has higher performance.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"39 1","pages":"355-359"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86983611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An integrated system for tracking and recognition using Kalman filter","authors":"A. Vijay, Anoop K. Johnson","doi":"10.1109/ICCICCT.2014.6993118","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993118","url":null,"abstract":"Tracking of any object from a video scene becomes more critical not only for security applications but also for analyzing traffic. This system integrates low level image processing as well as high level image processing through online data model and offline data model for more efficiency and robustness. Also this makes the system to handle occlusion conditions and abrupt color intensity variation conditions. This system uses median filtering and blob extraction for moving object detection. The offline model employs high level image processing recognize the moving objects. Here the Kalman filter is used for effective tracking under complex situations.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"10 1","pages":"1065-1069"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85204647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forensic investigation framework for P2P protocol","authors":"T. Manesh, M. Sha, K. Vivekanandan","doi":"10.1109/ICCICCT.2014.6992966","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992966","url":null,"abstract":"Online sharing of digital assents have now become common in the internet by its increased number of users over a decade drastically. There are many online sharing resources which offer huge storage. These facilities tend the internet users to upload and download pirated softwares, movies and other similar digital assets which violates all copyrights. The P2P protocol is working behind such online sharing websites and resources. The cyber cell is very active now in various parts of the country to trace and fraudulent sharing of files when reported. So it is necessary to have an efficient mechanism to find the actual content which is being uploaded or downloaded from a particular machine as part of network forensic investigation. Usually P2P websites and services are blocked in enterprises and educational institutions to avoid sharing of unwanted digital assets and also to increase internet bandwidth. The proposed novel technique is based on network forensics which can be used for content level observation of P2P Bit Torrent protocol and regenerate original malicious content or session between malicious users for their prosecution in the court.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"26 1","pages":"256-264"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89266524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}