2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)最新文献

筛选
英文 中文
A high-gain Source degenerative Cascode LNA for Wi-MAX and W-CDMA applications at 3.5GHz 一种用于3.5GHz Wi-MAX和W-CDMA应用的高增益源退化级联码LNA
Naveen Motamarri, Munshi Nurul Islam, P. Apurbaranjan, S. Deepu, S. Prasantakumar
{"title":"A high-gain Source degenerative Cascode LNA for Wi-MAX and W-CDMA applications at 3.5GHz","authors":"Naveen Motamarri, Munshi Nurul Islam, P. Apurbaranjan, S. Deepu, S. Prasantakumar","doi":"10.1109/ICCICCT.2014.6993143","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993143","url":null,"abstract":"This paper presents the design and simulation of High gain Source degenerated Cascode LNA for Wi-max and W-CDMA applications at 3.5GHz. The design uses an enhanced cascade topology to attain improved forward gain and noise figure. Th is design includes lumped elements like inductor, capacitor and resistors to design input and output matching networks. The targeted narrow-band gain, impedance matching and noise figure are achieved at the 3.5GHz. Circuit has been designed Using standard UMC 0.18μm CMOS technology and simulated in the Cadence Spectre RF tool. Targeted narrowband gain, noise figure, are 25dB and 2dB respectively. The designed circuit exhibits narrow-band gain of 27.18 dB and noise figure of 1.7 dB with Input and output return loss of -17.57 dB and -29.21 dB respectively. Circuit operates from the supply voltage of 1.8V and draws a current of 6.39mA.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"95 1","pages":"1200-1204"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83402111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Recital scrutiny of multimodal biometric endorsement System 多模态生物识别背书系统的回顾审查
R. Manju, A. S. Nargunam, A. Rajendran
{"title":"Recital scrutiny of multimodal biometric endorsement System","authors":"R. Manju, A. S. Nargunam, A. Rajendran","doi":"10.1109/ICCICCT.2014.6993176","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993176","url":null,"abstract":"In real time applications, single modal biometric system have the limitations, due to noise sensitivity, intra class variability, non universality, data quality etc. These difficulties can be rectified by Multibiometric system. This paper presents effective fusion methodologies by multiple traits. The proposed multimodal biometric authenticated system have a number of incomparable merits, starts from Borda count method, principle component analysis(PCA) and Fisher's linear Discriminant methods for entity matchers (face, iris, and fingerprint). For traits authentication from the different fusion method, to fuse different biometric results obtained from matches. This result shows that fusion of entity can the growth of biometric system performance.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"4 1","pages":"1372-1376"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82164897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of various ARP poisoning mitigation techniques: A comparison 各种ARP中毒缓解技术分析:比较
Nikhil Tripathi, B. Mehtre
{"title":"Analysis of various ARP poisoning mitigation techniques: A comparison","authors":"Nikhil Tripathi, B. Mehtre","doi":"10.1109/ICCICCT.2014.6992942","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992942","url":null,"abstract":"Address Resolution Protocol (ARP) is the fundamental and one of the most frequently used protocol involved in computer communications. Within a LAN, ARP messages are used to resolve IP addresses into corresponding MAC addresses. Nevertheless, some of the limitations within this protocol make it rather vulnerable. The two most prominent limitations are - unauthenticated and stateless nature of ARP. The attackers can easily exploit these loopholes for their personal gain. ARP poisoning is considered as unitary of the basic attacks which is utilized to launch higher level attacks. Several solutions have been proposed in the literature to detect and prevent these attacks. However, all of the proposed solutions are limited to a certain extent. Some solutions are effective in a special set of scenarios while others are rather suited for scenarios belonging to a different band. As new techniques of ARP poisoning have evolved with time, researchers are getting motivated to propose new solutions. In this paper, we have presented a comparative analysis of different proposed solutions which are rather popular in the literature. We have compared different mitigation techniques based on some of the important factors that are considered as limitations to the proposed solutions. These factors are derived from the scenarios which are possible within a LAN when an ARP Poisoning attack is launched. A brief tabular format is likewise introduced in this paper which offers a fast overview of comparison between different proposed schemes. This comparative study can further be used to offer and build up a more efficient and effective scheme which, on one hand, enjoys the combined advantage of different mitigation techniques and on the other hand, does not hold the old limitations.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"69 1","pages":"125-132"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73435204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A retrospective study based on the soft computing approach in Electro Chemical discharge machining 基于软计算方法的电化学放电加工回顾研究
J. Joe, Jeba Rajan, M. Dev Anand, P. Gopu
{"title":"A retrospective study based on the soft computing approach in Electro Chemical discharge machining","authors":"J. Joe, Jeba Rajan, M. Dev Anand, P. Gopu","doi":"10.1109/ICCICCT.2014.6993194","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993194","url":null,"abstract":"The improvement in materials strength as days goes and goes, hybrid type of unconventional machining process has been developed and continuous. In that case researchers developed the combined process of Electro Chemical Machining (ECM) and Electrical Discharge Machining (EDM) for increase the quality of the components. In this current review work, the setting of different levels of parameters in Electro Chemical Discharge Machining (ECDM) and their corresponding effect in the various responses has been studied. The different prediction and optimization approaches used for control the parameters in different work also reviewed.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"4 1","pages":"1482-1486"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90636073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on PID controller design and performance based on tuning techniques 基于整定技术的PID控制器设计与性能研究
P. Gopi Krishna Rao, M. Subramanyam, K. Satyaprasad
{"title":"Study on PID controller design and performance based on tuning techniques","authors":"P. Gopi Krishna Rao, M. Subramanyam, K. Satyaprasad","doi":"10.1109/ICCICCT.2014.6993183","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993183","url":null,"abstract":"The simplicity, ease of implementation and robustness has attracted the use of Proportional, Integral and Derivative (PID) controllers in the chemical process industries. Numerous tuning techniques are available for tuning of PID controllers, each one of it has its pros and cons. Majority of the tuning techniques are proposed for First Order System with Time Delay (FOPDT). This paper presents the technique for obtaining the FOPDT model using Sundaresan and Krishnaswamy method and performance comparison of PID controller based on open loop, closed loop tuning techniques and PID controller tuned with Internal Model Control (IMC) technique for setpoint tracking and disturbance rejection. Analysis is carried out in terms of Integral error criteria's, Integral Absolute Error (IAE) and Integral Squared Error (ISE) and time response information viz. rise time, settling time, % peak overshoot and maximum sensitivity. Superheated steam temperature system of 500 MW boiler and Mean arterial blood pressure system are considered for the simulation study. The results indicate that the ratio of time delay and time constant have influence on the performance of the tuning techniques. IMC - PID provides the flexibility of adjustment for desired performance in comparison to other tuning techniques.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"23 1","pages":"1411-1417"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78229963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Mining relationships from text in social networking sites 从社交网站的文本中挖掘关系
Munish Bhargav, A. Bhargav
{"title":"Mining relationships from text in social networking sites","authors":"Munish Bhargav, A. Bhargav","doi":"10.1109/ICCICCT.2014.6992925","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992925","url":null,"abstract":"Majority of an individual's social interaction takes place through social networking site like Facebook. But one thing to focus is that the way we interact with different people through these social networking sites are different. If we are interacting with our close friends we use more informal language whereas with our relatives or elders and with our seniors at job interaction is little less informal or some time formal also as compared to the interaction with close friends. This difference in interaction can be a good measure of guessing relationship of the persons interacting with each other through these social networking sites. In this research paper we collected data through one of the very famous and very fast growing social networking site, Facebook. We considered comments, wall posts and messages exchanged through chat boxes of some people. From this data we have extracted some very interesting features like difference in number of emoticons, type of emoticons, degree of informal language, degree of intentional spelling mistakes, frequency of social acronyms and degree and type of interjections used in interaction of different people. We have used these features for mining relationships of the people involved in online social interaction.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"69 1","pages":"31-35"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78703650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FPGA partitioning and synthesis of reconfigurable video compression module 可重构视频压缩模块的FPGA划分与合成
Neena Baby, C. Pradeep
{"title":"FPGA partitioning and synthesis of reconfigurable video compression module","authors":"Neena Baby, C. Pradeep","doi":"10.1109/ICCICCT.2014.6992987","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992987","url":null,"abstract":"Nowadays Field Programmable Gate Arrays (FPGAs) are increasingly considered in space applications as they are flexible and reprogrammable. They play an important role in geographical and weather forecasting processes. However, these devices are sensitive to the effects of radiation especially in modern de signs that deal with smaller CMOS structures. This paper discusses the various steps involved in designing a video compression system that can be used for space applications. A brief idea of a self-repairing algorithm is also proposed that can help in sustaining the compression system for a longer duration. The algorithm is based on modern reconfigurable architectures. The different steps involved in compression are designed using Verilog HDL. The design is simulated and synthesized using Xilinx IS E 14.2.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"32 1","pages":"360-364"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78889940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
American Sign Language interpreter system for deaf and dumb individuals 美国手语翻译系统为聋哑人
S. Upendran, A. Thamizharasi
{"title":"American Sign Language interpreter system for deaf and dumb individuals","authors":"S. Upendran, A. Thamizharasi","doi":"10.1109/ICCICCT.2014.6993193","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993193","url":null,"abstract":"The proposed scheme recognizes and interprets American Sign Language symbols that have static gestures. The system provides an opportunity for deaf and dumb individuals to communicate and learn using computers. American Sign Language is a widely used and accepted standard for communication by people with hearing and speaking impairments. The proposed system recognizes and translates static hand gesture of alphabets in AS L into textual output. This text can further be converted into speech. The user of the system is free from data acquisition devices. The concepts of Principal Component Analysis (PCA) are used on the static gesture images of the AS L alphabet. The PCA features extracted from the image are used to classify the image into one of the AS L alphabet. The recognition of AS L gestures results in a textual output and is then can be converted into speech. Thus, the scheme helps the hearing and speech impaired to talk using computers.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"1 1","pages":"1477-1481"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76765331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Robot for the physically challenged 残疾人专用机器人
C. Hasitha, N. S. Chinmayi, B. Sravya, V. K. Mittal
{"title":"Robot for the physically challenged","authors":"C. Hasitha, N. S. Chinmayi, B. Sravya, V. K. Mittal","doi":"10.1109/ICCICCT.2014.6993172","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993172","url":null,"abstract":"In the past decade, robotic applications in human life have made significant progress. However, mobility of robots and user convenience of their control is still a challenge. Utility of robots for a physically challenged person, with practicality and ease of operation, is another issue. In this paper, a robotic solution is proposed for utilization by the physically challenged. A prototype robot is developed using RF signals, with voice control or remote control options. The human voice/remote controlled robot, has obstacle avoidance and edge avoidance features as well. The prototype is useful for applications in diverse fields.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"86 1","pages":"1349-1354"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76975241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An examination of next generation IP migration techniques: Constraints and evaluation 下一代知识产权迁移技术的检验:约束和评估
Junaid Latief Shah, J. Parvez
{"title":"An examination of next generation IP migration techniques: Constraints and evaluation","authors":"Junaid Latief Shah, J. Parvez","doi":"10.1109/ICCICCT.2014.6993064","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993064","url":null,"abstract":"IP Next Generation (IPng) or IPv6 engineered by IETF is the successor of IPv4, the contemporary version of Internet Protocol. IPv6 is designed to solve the long term performance, reliability and scalability problems of IPv4. Although IPv6 implementation is yet to attain a maturity level, its success will ultimately depend on its implementation in a broader perspective. The IPv6 network migration is seen as an intricate daunting task impeding its evolution. Nevertheless with emergence of new IPv6 migration techniques, its complete integration with current IP networks seems to be achievable in near future. This paper attempts to examine current IP transitioning techniques and outlines the key deployment issues, challenges and migration paths. The paper also makes an empirical evaluation of three most commonly used transition mechanisms namely Dual Stack, Automatic 6to4 Tunneling and Manual 6in4 Tunneling and makes a comparison of performance metrics with native IPv6 environment. The simulation results are significant and give an insight about choosing best transition technique and an idea about network migration and capacity planning. The simulation-based comparison has been carried using OPNET (ver. 14.5) simulation framework.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"348 1","pages":"776-781"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77322345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信