{"title":"Design of low dropout regulator using artificial bee colony evolutionary algorithm","authors":"Jitendra B. Chinchore, R. Thakker","doi":"10.1109/ICCPCT.2015.7159280","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159280","url":null,"abstract":"In this paper, a low voltage low dropout (LDO) regulator is designed and simulated in 0.13 μm CMOS technology, which converts an input voltage of 1.2V into a stable regulated output voltage of 1.1 V using Ng-Spice circuit simulator. The two stage operational amplifier (Op-Amp) is used as an error amplifier (EA). Here, the Artificial Bee Colony (ABC) evolutionary algorithm based optimizer is demonstrated for solving the problem of the device sizing and other parameters of Op-Amp and optimization. This approach for designing two stage Op-Amp circuit does not require any analytical calculations and handles non-linear effects of sub-micron devices very effectively. The designed LDO is tested for a change in load current for 0-100 mA and it is found that the power supply rejection ratio (PSRR) is found to be 78.5 dB at 1 KHz and 28.7 dB at 10 MHz. The settling time of less than 1 μsec observed during testing of line and load regulations.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"124 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76135083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Closed loop control of full bridge converter with asymmetric PWM","authors":"S. Athira, Aswathy Rajan","doi":"10.1109/ICCPCT.2015.7159424","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159424","url":null,"abstract":"This paper introduces a full bridge converter with high step-up voltage gain, which is achieved by using asymmetric pulse width modulation. The soft switching is obtained for the converter with zero-voltage switching across the active switches and the zero-current switching across the output diodes. The zero-voltage switching of the active switches are obtained during turn-on and the zero-current switching of the output diodes are obtained during turn-off. The converter is able to achieve high step-up voltage gain by using relatively less transformer turns ratio. Various simulation results using MATLAB SIMULINK is provided to understand the effectiveness of the circuit.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"19 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78911481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficency and power packing density improvement for DC-DC boost converter by soft switching techniques","authors":"R. Sivakumar, S. Ramprasath, P. R. Babu","doi":"10.1109/ICCPCT.2015.7159504","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159504","url":null,"abstract":"This paper focuses on power loss analysis of non-isolated hard switching boost converter and quasi resonant ZVS (zero voltage switching) soft switching boost converter for various switching frequency in Power Conditioning System (PCS). Efficiency comparison and power losses of passive components are calculated for various switching frequency. The design and performance of the system is verified through simulation using PSPICE software.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"281 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76796480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying secure authentication scheme to protect DNS from rebinding attack using proxy","authors":"P. Pandiaraja, S. Parasuraman","doi":"10.1109/ICCPCT.2015.7159255","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159255","url":null,"abstract":"Internet is critical to both the economy and society in today's world. Domain Name System (DNS) is a key building block of the internet and the DNS hides all technical infrastructures, software and hardware required for the domain name system to function correctly. It allows users to access websites and exchange emails. It runs a strong mechanism to provide the IP address of the internet host name. An attacker can launch rebinding attack when the DNS server sends a query to any particular server on the network. Different types of techniques have been proposed to prevent this attack that all have some pros and also cones. A new technique is proposed in this paper by using security proxy with a hash function. Rebinding attack can be avoided by using this technique. It provides a secured environment for the DNS to communicate with other DNS. While the source DNS are receiving response from any DNS it will authenticate of all the receiving packets and then sends the data to the client. It gives a secure environment for DNS communication. For this purpose 2 different algorithms are used, namely SHA-2 and AES algorithms. First a random ID will be given to the query and then the query is sent to the DNS server.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"161 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78073283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tracking of bio medical waste using global positioning system","authors":"Lakshmi, J. Refonaa, J. Vivek","doi":"10.1109/ICCPCT.2015.7159516","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159516","url":null,"abstract":"Bio medical wastes are waste generated from hospitals at various wards. There are different kinds of biomedical waste such as Anatomical waste, Animal waste, biology and biotechnology discarded medicine and cytotoxic drugs, Incineration Ash, Waste sharps, Soiled waste, Solid waste, Liquid waste, Chemical waste. This waste must be transported from hospitals to common treatment facility where these wastes are recycled using treatment equipments in order to avoid pollution. In this project we are developing an android application for tracking the biomedical waste from hospital to CTF (common treatment facility). Bio medical waste tracking system is to keep track the bio medical waste generated at hospitals. System mandates the hospital staffs to record the wastage generated at the point of generation(ward level) by scanning the bar coded bags and it is transported to Common Treatment Facility (CTF). Application will detect the availability of internet and synchronize the data with the main server periodically. Hospitals and CTF need not require active internet for using the system. The main purpose of this application is, it will be capable of capturing data offline (absence of Internet) and the movement of waste disposal will be tracked using GPS from the hospital to common treatment facility.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"5 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76989767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative study of multiple-output series resonant inverters for IH applications","authors":"V. Kumari, D. Bhaskar, Nibedita Parida, T. Maity","doi":"10.1109/ICCPCT.2015.7159296","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159296","url":null,"abstract":"This paper presents the comparative study of multiple output inverter topologies in terms of their circuit operation, control techniques, output power, number of switches required and their efficiency. It includes the concept of multi-output inverter for IH applications. Two multi-output topologies are explained for high power and low power applications. These topologies allow higher efficiency, low cost and less switching losses as compared to other multiple output techniques such as paralleled power converters and load-multiplexation technique. The control strategy includes asymmetrical voltage cancellation (AVC), Variable frequency duty cycle (VFDC) and Pulse density modulation (PDM) control techniques. The performance of multiple-output inverter topologies is verified using MATLAB Simulink.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"31 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74059021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methodological study of opinion retrieval techniques for Twitter social network","authors":"Y. Sandeep, V. Sindhura","doi":"10.1109/ICCPCT.2015.7159426","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159426","url":null,"abstract":"Twitter has turned into an important source for individuals to collect opinions for making decisions. The expansion of social networks and blogs discloses a set of opportunities in the way data is looked and recovered. Opinion retrieval is the formalization for studying and construing opinions. They are used for data evocation which classifies the people opinions or views related as decisive, pessimistic and pacifistic words. Opinion retrieval exemplifies the techniques and approaches that promise to precisely facilitate the opinion-oriented information seeking techniques that involved computational regimen of opinion or subjectivity in the text. Additionally the best ranking model which covers all features and with high adequacy with a state-of-art for Twitter opinion retrieval technique and it outperforms existing methods significantly.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"15 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75817828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network lifetime augmentation by EASR method in wireless sensor networks","authors":"S. Anitha, N. Janakiraman","doi":"10.1109/ICCPCT.2015.7159497","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159497","url":null,"abstract":"A wireless sensor network (WSN) with spatially distributed autonomous sensors, to monitor physical and other environmental conditions such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. In wireless sensor networks, most important problem is to extend the lifetime of the networks as long as possible. Network lifetime can be increased by conserving the limited power resources of sensors while accomplishment of the sensing and sensed data reporting its tasks. In WSN, each sensor node delivers the sensed data to sink by multi-hopping technique. Generally, sensor nodes nearer to the sink will consume more battery power than further nodes. So these nodes will drain out their battery power rapidly and reduce the network lifetime. In this paper, we propose a method called Energy - Aware Sink Relocation (EASR) for mobile sinks in WSNs which is an efficient method to increase the network lifetime. This mechanism uses information of both transmission range of sensor nodes and scheme for sink relocation. Thereby, we included numerical methods to extend network lifetime and further the results are plotted in NS2 platform.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"2 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73110101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Content based image retrieval: A past, present and new feature descriptor","authors":"Manish K. Shriwas, V. Raut","doi":"10.1109/ICCPCT.2015.7159404","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159404","url":null,"abstract":"A Technique used for automatic retrieval of images in a large database that perfectly matches the query image is called as Content Based Image Retrieval (CBIR) system. Image querying refers to the predicament of finding objects that are pertinent to a user inquiry within image databases. The paper discusses the fundamental concept of image retrieval on the basis of features like color, texture, and shape. The system retrieves an image when the similarity between the query image and database images is observed. In the concluding section, we propose a new approach based on texture classification which helps to improve the accuracy and efficiency of CBIR system. The CBIR technology has been used in various applications such as military, industrial area, crime prevention, medical diagnosis, education system etc.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"33 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83724467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of six degrees of separation in Facebook using Ant colony optimization","authors":"E. E. Lawrence, R. Latha","doi":"10.1109/ICCPCT.2015.7159171","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159171","url":null,"abstract":"Six degrees of separation is a popular theory that is widely accepted by many people, which states any two people on this world can be connected through an average number of six steps. Though there is no solid scientific evidence that the six degrees of separation theory is true, it remains as an area of interest to social researches. With the advent of digital mapping, the theory can now be tested with social networks, but will the theory of six degrees of separation hold for the virtual world? The link between any two people in a graph with number of hops needs to be identified and that can be done efficiently with the help of Ant colony optimization technique (ACO). As ACO algorithms are proved to be efficient with a broad range of NP hard problems such as the traveling salesman problem (TSP) or the quadratic assignment problem (QAP), and is increasingly gaining interest for solving real life engineering and scientific problems, an attempt has been made in this paper to analyze the six degrees of separation in the popular social network Facebook which has over 1.3 billion active users as of June 2014.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"152 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83432931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}