2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]最新文献

筛选
英文 中文
Hybrid solar inverter for grid synchronization 用于电网同步的混合太阳能逆变器
M. Monisha, S. Jebaseelan, G. Nagarajan
{"title":"Hybrid solar inverter for grid synchronization","authors":"M. Monisha, S. Jebaseelan, G. Nagarajan","doi":"10.1109/ICCPCT.2015.7159275","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159275","url":null,"abstract":"The aim of this work is to provide security of supply by delivering uninterrupted power to critical loads and to grid. Two input sources are used in the proposed system. One of them is solar cell and another one is fuel cell. This paper presents simulation circuit for proposed system and simulation results.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"22 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83251857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A new gate for low cost design of all-optical reversible logic circuit 一种用于全光可逆逻辑电路低成本设计的新型栅极
Mukut Bihari Malav, Shubham Gupta, S. Jain
{"title":"A new gate for low cost design of all-optical reversible logic circuit","authors":"Mukut Bihari Malav, Shubham Gupta, S. Jain","doi":"10.1109/ICCPCT.2015.7159381","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159381","url":null,"abstract":"Reversible computing offers a possible solution for high performance computing and low power consumption. For hardware implementation of reversible logic, optical computers are emerging as one of the promising alternative. Recently, in the literature, reversible logic gates and combinational circuits have been proposed in optical domain using Semiconductor Optical Amplifier (SOA) based Mach Zehnder interferometer (MZI) switches due to its significant advantages such as high speed, low power, fast switching and ease of fabrication. Optical reversible designs have used ad-hoc approaches and require high cost in terms of MZI switches, Beam Splitters (BS), and Beam Combiners (BC) as well as optical delay. In this work, an optical reversible MNOT gate and all-optical realization of 4×4 Toffoli Gate have been proposed which is used in all-optical realization of optimized reversible combinational circuits. A general design approach to realize all-optical reversible circuits based on MZI switches has been proposed first time in the literature. Optimized all-optical reversible 2×1 multiplexer and full adder circuits have been designed using these proposed gates and design approach. All-optical reversible designs of 4×1 multiplexer, 1×4 Demultiplexer and 3to8 Decoder circuits have also been presented in this work first time in the literature. Our results have shown significant improvements over existing designs in terms of MZI switches, BS, BC and optical delay.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"109 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80578541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Game-theoretic approach towards network security: A review 网络安全的博弈论研究综述
Litti Tom
{"title":"Game-theoretic approach towards network security: A review","authors":"Litti Tom","doi":"10.1109/ICCPCT.2015.7159364","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159364","url":null,"abstract":"Advancements in information technology has increased the use of internet. With the pervasiveness of internet, network security has become critical issue in every organization. Network attacks results in massive amount of loss in terms of money, reputation and data confidentiality. Reducing or eliminating the negative effects of any intrusion is a fundamental issue of network security. The network security problem can be represented as a game between the attacker or intruder and the network administrator where both the players try to attain maximum outcome. The network administrator tries to defend the attack and the attacker tries to overcome it and attack the system. Thus network security can be enforced using game theoretic approach. This paper presents a review of game theoretic solutions developed for network security.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"12 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83792499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Effective intrusion detection method for Manets using EAACK 基于EAACK的网络入侵检测方法
M. Sherine
{"title":"Effective intrusion detection method for Manets using EAACK","authors":"M. Sherine","doi":"10.1109/ICCPCT.2015.7159354","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159354","url":null,"abstract":"The movement to remote system from wired system has been a worldwide pattern in the recent decades. The versatility what's more adaptability brought by remote system made it conceivable in numerous applications. Among all the contemporary remote systems, Mobile Ad hoc Network (MANET) is a standout amongst the most imperative and special applications. On the in spite of conventional system structural engineering, MANET does not oblige an altered system base; each and every hub functions as both a transmitter and a collector. Hubs correspond specifically with one another when they are both inside the same correspondence range. Else, they depend on their neighbors to transfer messages. The planning toward oneself capacity of hubs in MANET made it prominent among basic mission applications like military utilization or crisis recuperation. On the other hand, the open medium and wide dissemination of hubs make MANET defenseless against malignant assailants. For this situation, it is essential to create proficient interruption identification instruments to ensure MANET from assaults. With the changes of the innovation furthermore cut in equipment costs, we are seeing a current pattern of growing Manets into mechanical applications. To acclimate to such pattern, we unequivocally accept that it is crucial to address its potential security issues. In this paper, we propose and actualize another interruption recognition framework named Enhanced Adaptive Acknowledgment (EAACK) uniquely intended for Manets using JAVA programming platform. Analyzed to contemporary methodologies, EAACK shows higher malevolent conduct location rates in specific circumstances while does not significantly influence the system exhibitions.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"127 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79212006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Control of a large scale single stage grid connected PV system using fuzzy controller with capacitor assisted extended boost quasi Z source inverter (CAEB qZSI) 电容辅助扩展升压准Z源逆变器(CAEB qZSI)模糊控制器控制大型单级并网光伏系统
Sruthi S. Nair, N. Hemalatha, N. Ramesh
{"title":"Control of a large scale single stage grid connected PV system using fuzzy controller with capacitor assisted extended boost quasi Z source inverter (CAEB qZSI)","authors":"Sruthi S. Nair, N. Hemalatha, N. Ramesh","doi":"10.1109/ICCPCT.2015.7159273","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159273","url":null,"abstract":"This projects describes about a grid connected three-phase, single-stage photovoltaic (PV) system using fuzzy controller with Capacitor assisted extended boost qZSI topologies (CAEB qZSI). This new scheme has higher efficiency and simple power electronic converter topology compared to two-stage PV system. The control objectives such as maximum power point tracking (MPPT), synchronization with grid, current control, and harmonic reduction in output current are realized in only one stage. A grid connected PV system with MPPT and reactive power injection capability into the utility grid is achieved using grid synchronisation. Park's d-q transformation technique is used by using filtered three-phase grid voltage for current controlling. To regulate the DC-link voltage a modified voltage controller using feedback linearization scheme with feed forward PV current signal is proposed. Reactive power feeding into the grid is also realized. To perform several simulations, MATLAB R2013b software environment is used.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"22 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83182098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An implementation of mobile control room environment in android platform for industrial applications 在android平台上实现工业应用的移动控制室环境
T. Jerry Alexander
{"title":"An implementation of mobile control room environment in android platform for industrial applications","authors":"T. Jerry Alexander","doi":"10.1109/ICCPCT.2015.7159269","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159269","url":null,"abstract":"In recent years there is a vast technology improvements in industrial control rooms for monitoring the entire field of Industrial plants. High end PLC's are being implemented for controlling the entire process of fields. But a problem is that even though automation takes the complete control of total plants few authentication and manual actions are needed from user side for completing the control action. Hence there is a must situation for users presence at all times in the control room for taking some timely needed control actions. Due to the static nature of control room environment, the user should always be static to monitor the process. The proposed system approach provides a good solution to this problem. The whole control room environment is additionally implemented in the arduino-android platform and the same is communicated to the process through Wi-Fi / Bluetooth / GPRS. Now the user in control room can be mobile at anytime, anywhere to monitor and control the whole plant. An arduino uno board is used here for acquiring process control parameters from the sensors and transmitting it via a Bluetooth module to an android device. Hence the parameter values can be monitored and stored simultaneously.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"20 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86957313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Enhancement of output voltage quality of multi level inverter using series active filter 采用串联有源滤波器提高多电平逆变器输出电压质量
S. Parthasarathy, S. Karthickkumar, Pg Scholar, S. Rahini
{"title":"Enhancement of output voltage quality of multi level inverter using series active filter","authors":"S. Parthasarathy, S. Karthickkumar, Pg Scholar, S. Rahini","doi":"10.1109/ICCPCT.2015.7159333","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159333","url":null,"abstract":"In modern power electronic world, inverter is widely used to satisfy industrial needs, such as Adjustable Speed Drives (ASD), arc furnaces, UPS and used in renewable energy sector in order to integrate solar panel into grid. During this conversion process, waveform distortion induced in the output side of inverter. The waveform distortion occurs due to harmonics created by those devices, which results in devastation effects in industry and in power grid. In order to avoid those problems, Seven Level Inverter is proposed and controlled by Phase Shift Carrier Pulse Width Modulation (PSC-PWM) technique. The output voltage quality of this Multi Level Inverter is to be enhanced with help of Series Active Filter (SeAF), which injects compensation voltage generated by control theory of instantaneous real and reactive power theory by means of series injection transformer. In this paper, the effectiveness of Series Active Filter has to be analyzed in terms of voltage harmonic performance under different modulation indexes and switching frequencies the help of MATLAB/Simulink 2010.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"7 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86985708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A survey of equalization techniques for an effective equalizer design in MIMO-OFDM systems MIMO-OFDM系统中有效均衡器设计的均衡技术综述
N. S. Randhawa, Shally Sharma, R. Dubey
{"title":"A survey of equalization techniques for an effective equalizer design in MIMO-OFDM systems","authors":"N. S. Randhawa, Shally Sharma, R. Dubey","doi":"10.1109/ICCPCT.2015.7159297","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159297","url":null,"abstract":"The wireless MIMO-OFDM technology with its innovative features has improved the data rates to a very high extent. A collective set of parameters decides the performance of a system. The paper addresses the problem of ISI in MIMO-OFDM system which degrades its error performance and occurs due to the varying nature of wireless communication channels. The estimation is one of the way the channel behavior is examined and the equalization process would equalize those effects by altering the channel response according to the estimated behavior. Numbers of equalization techniques are there in the literature which works on removing the ISI and improving the BER (Bit Error Rate). The paper has provided an in depth understanding of the various equalizers and the comprehensive survey of all these equalizers.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"4 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89461317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Comparison of DTW score and warping path for text dependent speaker verification system 基于文本的说话人验证系统中DTW分数与扭曲路径的比较
T. Das, Songhita Misra, S. P. Choudhury, D. K. Sah, U. Baruah, R. Laskar
{"title":"Comparison of DTW score and warping path for text dependent speaker verification system","authors":"T. Das, Songhita Misra, S. P. Choudhury, D. K. Sah, U. Baruah, R. Laskar","doi":"10.1109/ICCPCT.2015.7159305","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159305","url":null,"abstract":"Dynamic Time Warping has always been a popular technique for pattern matching of two speech samples for Automatic Speaker Recognition. DTW score evaluated from the minimum distance matrix is generally used to identify the similarity between two speech samples and thereby giving a decision for the Text Dependent Speaker Verification system. This paper discusses a system based on DTW trace back path for the alignment of two speech samples for the decisions are thereby compared with the performance of the system with the system based on DTW Score. The result shows a significant improvement in the performance of the system suggesting that the trace back path provides a better similarity measure as compared to that of the DTW Score.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"4 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91346239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A security framework for brokerless publish subscribe system using identity based signcryption 使用基于身份的签名加密的无代理发布订阅系统的安全框架
P. Anusree, S. Sreedhar
{"title":"A security framework for brokerless publish subscribe system using identity based signcryption","authors":"P. Anusree, S. Sreedhar","doi":"10.1109/ICCPCT.2015.7159270","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159270","url":null,"abstract":"Publish subscribe communication paradigm has been recognized as the most promising communication paradigms for information dissemination in large scale distributed environment. It has been used in a variety of applications ranging from personalized information dissemination to a wide range of group communications. So publish subscribe system needs to fulfill the basic security demands of these information dissemination applications. Confidentiality, authentication, data integrity and non repudiation are the most important security services in security environment. Encryption and signature are the basic cryptographic tools for achieving these security services in communication system. This paper presents a novel approach to provide all the basic aspects of security such as confidentiality, authentication, integrity and Non-repudiation in broker-less content based publish subscribe system along with forward secrecy and unforgeability. The scheme use identity based signcryption technique and that can effectively reduces the computational cost and communication overhead.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"28 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90417842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信