首页 > 最新文献

2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)最新文献

英文 中文
Enhanced spread spectrum image watermarking with compression-encryption technique 利用压缩加密技术增强扩频图像水印
Pub Date : 2014-01-01 DOI: 10.1109/ISCO.2014.7103956
G. Bhargava, Abhishek Mathur
In this paper we work on the watermarking through which we can improve the security. In this technique the whole watermark image is embed in the original image. The embedding process can improve the security of the image. Security plays an important role during the transmission of message or data from sender to receiver. In this paper we use a combination of compression and encryption technique and then watermarking. In this first of all compression is performed, we use the JPEG2000 compression technique, JPEG2000 use the core compression algorithm Embedded Block Coding with Optimized Truncation (EBCOT), The EBCOT algorithm provide the superior compression performance and on that compressed image encryption is performed, we use the RC4 encryption technique, when encryption is completed then on that encrypted image watermarking is applied. In our proposed work we can divide the watermark image into blocks. In this we can calculate the kernel of the original image through which we can find the area where the watermark image is embed. Here we propose an efficient technique of spread spectrum watermarking which provides less attacks as compared to the other existing technique.
本文主要研究了通过水印技术来提高安全性的方法。该技术将整个水印图像嵌入到原始图像中。嵌入过程可以提高图像的安全性。在消息或数据从发送方到接收方的传输过程中,安全性起着重要的作用。在本文中,我们采用压缩和加密技术相结合,然后再进行水印。在此首先进行压缩,我们使用JPEG2000压缩技术,JPEG2000使用核心压缩算法EBCOT (Embedded Block Coding with Optimized Truncation), EBCOT算法提供了优越的压缩性能,并在压缩图像上进行加密,我们使用RC4加密技术,当加密完成后,在加密图像上应用水印。在我们提出的工作中,我们可以将水印图像分成块。在这种方法中,我们可以计算原始图像的核,通过核可以找到水印图像嵌入的区域。本文提出了一种有效的扩频水印技术,与其他现有技术相比,它提供的攻击更少。
{"title":"Enhanced spread spectrum image watermarking with compression-encryption technique","authors":"G. Bhargava, Abhishek Mathur","doi":"10.1109/ISCO.2014.7103956","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103956","url":null,"abstract":"In this paper we work on the watermarking through which we can improve the security. In this technique the whole watermark image is embed in the original image. The embedding process can improve the security of the image. Security plays an important role during the transmission of message or data from sender to receiver. In this paper we use a combination of compression and encryption technique and then watermarking. In this first of all compression is performed, we use the JPEG2000 compression technique, JPEG2000 use the core compression algorithm Embedded Block Coding with Optimized Truncation (EBCOT), The EBCOT algorithm provide the superior compression performance and on that compressed image encryption is performed, we use the RC4 encryption technique, when encryption is completed then on that encrypted image watermarking is applied. In our proposed work we can divide the watermark image into blocks. In this we can calculate the kernel of the original image through which we can find the area where the watermark image is embed. Here we propose an efficient technique of spread spectrum watermarking which provides less attacks as compared to the other existing technique.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133538003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient classification mechanism for network intrusion detection system based on data mining techniques: A survey 基于数据挖掘技术的网络入侵检测系统高效分类机制综述
Pub Date : 2013-11-13 DOI: 10.1109/ISCO.2014.7103959
Subaira A S, P. Scholar, Mrs Anitha P
In spite of growing information system widely, security has remained one hard-hitting area for computers as well as networks. In information protection, Intrusion Detection System (IDS) is used to safeguard the data confidentiality, integrity and system availability from various types of attacks. Data mining is an efficient artifice applied to intrusion detection to ascertain a new outline from the massive network data as well as it used to reduce the strain of the manual compilations of the normal and abnormal behavior patterns. This piece of writing reviews the present state of data mining techniques and compares various data mining techniques used to implement an intrusion detection system such as, Support Vector Machine, Genetic Algorithm, Neural network, Fuzzy Logic, Bayesian Classifier, K-Nearest Neighbor and decision tree Algorithms by highlighting a advantage and disadvantages of each of the techniques.
尽管信息系统的应用越来越广泛,但对于计算机和网络来说,安全仍然是一个沉重的打击领域。在信息保护中,入侵检测系统(IDS)用于保护数据的机密性、完整性和系统的可用性,使其免受各种类型的攻击。数据挖掘是一种有效的入侵检测技术,可以从海量的网络数据中确定新的轮廓,并减少人工编译正常和异常行为模式的工作量。这篇文章回顾了数据挖掘技术的现状,并比较了用于实现入侵检测系统的各种数据挖掘技术,如支持向量机、遗传算法、神经网络、模糊逻辑、贝叶斯分类器、k近邻和决策树算法,突出了每种技术的优点和缺点。
{"title":"Efficient classification mechanism for network intrusion detection system based on data mining techniques: A survey","authors":"Subaira A S, P. Scholar, Mrs Anitha P","doi":"10.1109/ISCO.2014.7103959","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103959","url":null,"abstract":"In spite of growing information system widely, security has remained one hard-hitting area for computers as well as networks. In information protection, Intrusion Detection System (IDS) is used to safeguard the data confidentiality, integrity and system availability from various types of attacks. Data mining is an efficient artifice applied to intrusion detection to ascertain a new outline from the massive network data as well as it used to reduce the strain of the manual compilations of the normal and abnormal behavior patterns. This piece of writing reviews the present state of data mining techniques and compares various data mining techniques used to implement an intrusion detection system such as, Support Vector Machine, Genetic Algorithm, Neural network, Fuzzy Logic, Bayesian Classifier, K-Nearest Neighbor and decision tree Algorithms by highlighting a advantage and disadvantages of each of the techniques.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122726299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Power aware and topology aware ad-hoc on-demand multipath distance vector routing for MANET 面向MANET的功率感知和拓扑感知自组织按需多径距离矢量路由
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2014.7103929
V. Lalitha, R. Rajesh
Our earlier work [1] [2] shows interesting characteristics of transmission range/power of the MANET nodes on the performance of multipath MANET routing protocol. The objective of this work is to improve the performance of a MANET multi-path routing protocol without increasing or decreasing its default transmission range of the nodes. The proposed work is to control the routing process and only allow hops with maximum possible distances in a route based on the received signal strength at each node. We propose topology aware and power aware ad hoc on-demand multipath distance vector routing protocol based on the maximum transmission range. We call this model as AOMDV_RR Range Routing and implemented it under ns2 by improving the standard AOMDV protocol. We studied the proposed AOMDV_RR and the standard AOMDV under different network densities and measured the performance for suitable metrics. Measurable difference in performance was realized and the proposed AOMDV_RR performed better than normal AOMDV with respect to metrics network overhead, throughput and energy consumption.
我们的早期工作[1][2]显示了MANET节点的传输范围/功率对多路径MANET路由协议性能的有趣特征。这项工作的目的是在不增加或减少节点的默认传输范围的情况下提高MANET多路径路由协议的性能。提出的工作是控制路由过程,并根据每个节点接收到的信号强度,只允许路由中具有最大可能距离的跳数。提出了基于最大传输距离的拓扑感知和功率感知自组织按需多径距离矢量路由协议。我们将该模型称为AOMDV_RR范围路由,并通过改进标准AOMDV协议在ns2下实现。研究了不同网络密度下提出的AOMDV_RR和标准AOMDV,并对其性能进行了测试。实现了可测量的性能差异,并且所提出的AOMDV_RR在网络开销、吞吐量和能耗方面的性能优于普通AOMDV。
{"title":"Power aware and topology aware ad-hoc on-demand multipath distance vector routing for MANET","authors":"V. Lalitha, R. Rajesh","doi":"10.1109/ISCO.2014.7103929","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103929","url":null,"abstract":"Our earlier work [1] [2] shows interesting characteristics of transmission range/power of the MANET nodes on the performance of multipath MANET routing protocol. The objective of this work is to improve the performance of a MANET multi-path routing protocol without increasing or decreasing its default transmission range of the nodes. The proposed work is to control the routing process and only allow hops with maximum possible distances in a route based on the received signal strength at each node. We propose topology aware and power aware ad hoc on-demand multipath distance vector routing protocol based on the maximum transmission range. We call this model as AOMDV_RR Range Routing and implemented it under ns2 by improving the standard AOMDV protocol. We studied the proposed AOMDV_RR and the standard AOMDV under different network densities and measured the performance for suitable metrics. Measurable difference in performance was realized and the proposed AOMDV_RR performed better than normal AOMDV with respect to metrics network overhead, throughput and energy consumption.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114995034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Reduction of energy consumption using SPM and optimal code layout in embedded systems 在嵌入式系统中使用SPM和优化代码布局来降低能耗
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2014.7103961
S. Lavanya, B. Anuradha
In the multiprocessing embedded system the efficient use of the on-chip and off-chip memory code repositioning is done. For the purpose of improvement in the embedded system the SPM and cache is used for the code processing. The code layout is developed to place the code in memory for the preventing the cache conflicts and misses. Even though many researchers have illustrated the use of SPM and cache to improve the efficiency, combining these two was not done. In this study the comparison of energy consumption is done while code processing is done by three models namely 1) ILP model 2) Heuristic model 3) two stage meta-heuristic model. In the above two stage Meta heuristic model is the proposed model in which along with the SPM and Cache code layout is developed to place the code in it. The result reveals that compared to other two models the two stage meta-heuristic model yield more efficiency and consume less energy than other two models. As much as approximately 55% of additional energy can be saved by applying both code repositioning and SPM code selection techniques in this model.
在多处理嵌入式系统中,有效地利用了片内和片外存储器的代码重定位。为了提高嵌入式系统的性能,采用SPM和缓存进行代码处理。开发代码布局是为了将代码放置在内存中,以防止缓存冲突和丢失。尽管许多研究人员已经说明了使用SPM和缓存来提高效率,但并没有将这两者结合起来。本研究采用三种模型(1)ILP模型(2)启发式模型(3)两阶段元启发式模型)对编码处理过程中的能耗进行比较。在上述两个阶段中,元启发式模型是提出的模型,其中开发了SPM和缓存代码布局来放置代码。结果表明,与其他两种模型相比,两阶段元启发式模型的效率更高,能耗更低。通过在该模型中同时应用代码重定位和SPM代码选择技术,可以节省大约55%的额外能量。
{"title":"Reduction of energy consumption using SPM and optimal code layout in embedded systems","authors":"S. Lavanya, B. Anuradha","doi":"10.1109/ISCO.2014.7103961","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103961","url":null,"abstract":"In the multiprocessing embedded system the efficient use of the on-chip and off-chip memory code repositioning is done. For the purpose of improvement in the embedded system the SPM and cache is used for the code processing. The code layout is developed to place the code in memory for the preventing the cache conflicts and misses. Even though many researchers have illustrated the use of SPM and cache to improve the efficiency, combining these two was not done. In this study the comparison of energy consumption is done while code processing is done by three models namely 1) ILP model 2) Heuristic model 3) two stage meta-heuristic model. In the above two stage Meta heuristic model is the proposed model in which along with the SPM and Cache code layout is developed to place the code in it. The result reveals that compared to other two models the two stage meta-heuristic model yield more efficiency and consume less energy than other two models. As much as approximately 55% of additional energy can be saved by applying both code repositioning and SPM code selection techniques in this model.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"15 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116854128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of optimization of composite structures with respect to industrial applications 面向工业应用的复合材料结构优化研究
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2014.7103913
M. V. A. Raju Bahubalendruni, B. B. Biswal
This paper analyses the existing methodology of employing optimization techniques for structuraloptimisation of laminated composites at part level (local optimization) and also the limitations of this part level structural optimisation approach in industrial applications. The deviations observed in optimisation problem definition due to implementation of part level optimized solution at the assembly level (global optimisation) are presented. Multi shell closed structure is considered to carry out the numerical experiments, due to the reason; most of the structures of aircraft wing, wind turbine blade and helicopter rotor blades exhibit this configuration. Part level optimization is carried out on a single plate element of a multi shell closed structure and the optimized plate element is replaced in the multi shell closed structure. The observations made after replacement of optimized plate element through performing the numerical experiments are presented and well discussed.
本文分析了现有的利用优化技术在零件级(局部优化)进行层合复合材料结构优化的方法,以及这种零件级结构优化方法在工业应用中的局限性。提出了由于在装配级(全局优化)实施零件级优化解决方案而导致的优化问题定义中的偏差。考虑多壳封闭结构进行数值实验,由于;飞机机翼、风力涡轮机叶片和直升机旋翼叶片的大部分结构都表现出这种结构。对多壳封闭结构的单板元件进行零件级优化,并将优化后的板元件替换到多壳封闭结构中。通过数值实验,给出了优化板单元替换后的观测结果,并进行了详细的讨论。
{"title":"Study of optimization of composite structures with respect to industrial applications","authors":"M. V. A. Raju Bahubalendruni, B. B. Biswal","doi":"10.1109/ISCO.2014.7103913","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103913","url":null,"abstract":"This paper analyses the existing methodology of employing optimization techniques for structuraloptimisation of laminated composites at part level (local optimization) and also the limitations of this part level structural optimisation approach in industrial applications. The deviations observed in optimisation problem definition due to implementation of part level optimized solution at the assembly level (global optimisation) are presented. Multi shell closed structure is considered to carry out the numerical experiments, due to the reason; most of the structures of aircraft wing, wind turbine blade and helicopter rotor blades exhibit this configuration. Part level optimization is carried out on a single plate element of a multi shell closed structure and the optimized plate element is replaced in the multi shell closed structure. The observations made after replacement of optimized plate element through performing the numerical experiments are presented and well discussed.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124587163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Advisory committee 咨询委员会
Pub Date : 1900-01-01 DOI: 10.1109/iccitechn.2014.7073057
Advisory Committee
Dr.Akhtar Kalam, Victoria University, Melbourne, Australia Dr.Jordan Hristov, University of Chemical Technology and Metallurgy, Bulgaria Dr.Aladin Zayegh, Victoria University, Australia Dr.Subramaniam Ganesan, Oakland University, Rochester, USA Dr.Narottam Das, Curtin University, Australia Dr.Paulraj Murugesa Pandiyan, Universiti Malaysia Perlis. Dr.Kannan Murugesan, Kolej University Linton,Malaysia. Dr.S.Thangaprakash, Bandar Universiti Teknologi Legenda, Malaysia Dr.Chellappan Vijila, Institute of Materials Research and Engineering (IMRE), Singapore Dr.Valentina Emilia Balas, University of Arad, Romania Dr.Marimuthu Palaniswamy, University of Melbourne, Victoria, Australia Dr.Angappa Gunasekaran, Charlton College of Business United States Dr.Immanuel Edinbarough, University of Texas, USA Prof.Jayashri Ravishankar, University of New South Wales, Australia Prof.Kannan J.Krishanan, Victoria University, Australia
Akhtar Kalam 博士,澳大利亚墨尔本维多利亚大学 Jordan Hristov 博士,保加利亚化学技术和冶金大学 Aladin Zayegh 博士,澳大利亚维多利亚大学 Subramaniam Ganesan 博士,美国罗切斯特奥克兰大学 Narottam Das 博士,澳大利亚科廷大学 Paulraj Murugesa Pandiyan 博士,马来西亚 Perlis 大学。马来西亚柯林顿大学 Kannan Murugesan 博士。S.Thangaprakash 博士,马来西亚 Bandar Universiti Teknologi Legenda。 Chellappan Vijila 博士,新加坡材料研究与工程研究所。Immanuel Edinbarough 博士,美国德克萨斯大学 Jayashri Ravishankar 教授,澳大利亚新南威尔士大学 Kannan J. Krishanan 教授,澳大利亚维多利亚大学
{"title":"Advisory committee","authors":"Advisory Committee","doi":"10.1109/iccitechn.2014.7073057","DOIUrl":"https://doi.org/10.1109/iccitechn.2014.7073057","url":null,"abstract":"Dr.Akhtar Kalam, Victoria University, Melbourne, Australia Dr.Jordan Hristov, University of Chemical Technology and Metallurgy, Bulgaria Dr.Aladin Zayegh, Victoria University, Australia Dr.Subramaniam Ganesan, Oakland University, Rochester, USA Dr.Narottam Das, Curtin University, Australia Dr.Paulraj Murugesa Pandiyan, Universiti Malaysia Perlis. Dr.Kannan Murugesan, Kolej University Linton,Malaysia. Dr.S.Thangaprakash, Bandar Universiti Teknologi Legenda, Malaysia Dr.Chellappan Vijila, Institute of Materials Research and Engineering (IMRE), Singapore Dr.Valentina Emilia Balas, University of Arad, Romania Dr.Marimuthu Palaniswamy, University of Melbourne, Victoria, Australia Dr.Angappa Gunasekaran, Charlton College of Business United States Dr.Immanuel Edinbarough, University of Texas, USA Prof.Jayashri Ravishankar, University of New South Wales, Australia Prof.Kannan J.Krishanan, Victoria University, Australia","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130362971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of mechanical properties and experimental comparison of Mig and Friction stir welding processes for aa6082-t6 aluminium alloy aa6082-t6铝合金Mig焊和搅拌摩擦焊力学性能研究及试验比较
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2014.7103922
K. Anganan, J. Murali, M. Krishnan, K. Marimuthu
In this study, the mechanical properties of welded joints of AA-6082-T6 aluminium alloy obtained with friction stir welding (FSW) and conventional metal inert gas welding (MIG) were studied. FSW welds were carried out on a Friction stir welding machine. The performance of FSW and MIG welded joints were identified using tensile, metallographic and hardness tests. The joints obtained with FSW and MIG processes were also assessed for distortion that accompanied the welding processes. Taking into consideration the process conditions and requirements, FSW and MIG processes were also compared with each other to understand the advantages and disadvantages of the processes for welding applications of studied Al alloy. Better tensile strength was obtained with FSW welded joints. The width of the heat affected zone of FSW was narrower than MIG welded joints. The results show that FSW improves the mechanical properties of welded joints.
研究了AA-6082-T6铝合金搅拌摩擦焊(FSW)和传统金属惰性气焊(MIG)焊接接头的力学性能。在搅拌摩擦焊机上进行了搅拌摩擦焊。通过拉伸、金相和硬度测试对FSW和MIG焊接接头的性能进行了鉴定。用FSW和MIG工艺获得的接头也评估了伴随焊接过程的变形。考虑到工艺条件和要求,对FSW和MIG两种工艺进行了比较,了解了两种工艺在铝合金焊接应用中的优缺点。FSW焊接接头具有较好的抗拉强度。FSW的热影响区宽度比MIG焊接接头窄。结果表明:摩擦焊改善了焊接接头的力学性能。
{"title":"Study of mechanical properties and experimental comparison of Mig and Friction stir welding processes for aa6082-t6 aluminium alloy","authors":"K. Anganan, J. Murali, M. Krishnan, K. Marimuthu","doi":"10.1109/ISCO.2014.7103922","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103922","url":null,"abstract":"In this study, the mechanical properties of welded joints of AA-6082-T6 aluminium alloy obtained with friction stir welding (FSW) and conventional metal inert gas welding (MIG) were studied. FSW welds were carried out on a Friction stir welding machine. The performance of FSW and MIG welded joints were identified using tensile, metallographic and hardness tests. The joints obtained with FSW and MIG processes were also assessed for distortion that accompanied the welding processes. Taking into consideration the process conditions and requirements, FSW and MIG processes were also compared with each other to understand the advantages and disadvantages of the processes for welding applications of studied Al alloy. Better tensile strength was obtained with FSW welded joints. The width of the heat affected zone of FSW was narrower than MIG welded joints. The results show that FSW improves the mechanical properties of welded joints.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122269783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An efficient fixed width multiplier for digital filter 一种用于数字滤波器的高效定宽乘法器
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2014.7103926
S. Nithya, M. Nithya
We implement a high speed and low power FIR digital filter design using the fixed width booth multiplier. To reduce the truncation error in fixed width multiplier Adaptive Conditional Probability Estimator is used (ACPE). To achieve higher speed, the modified Booth encoding has been used and also to speed up the addition the carry look ahead adder is used as a carry propagate adder. The multiplier circuit is designed using VERILOG and synthesized using Xilinx ISE9.2i simulator. The area, power and delay of the designed filter is analysed using cadence tool.
我们利用定宽展位乘法器实现了一种高速低功耗FIR数字滤波器的设计。为了减小固定宽度乘法器的截断误差,采用了自适应条件概率估计(ACPE)。为了达到更高的速度,采用了改进的Booth编码,同时为了加快加法速度,采用进位前置加法器作为进位传播加法器。乘法器电路采用VERILOG进行设计,并用Xilinx is9.2 i模拟器进行合成。利用cadence工具对所设计滤波器的面积、功率和时延进行了分析。
{"title":"An efficient fixed width multiplier for digital filter","authors":"S. Nithya, M. Nithya","doi":"10.1109/ISCO.2014.7103926","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103926","url":null,"abstract":"We implement a high speed and low power FIR digital filter design using the fixed width booth multiplier. To reduce the truncation error in fixed width multiplier Adaptive Conditional Probability Estimator is used (ACPE). To achieve higher speed, the modified Booth encoding has been used and also to speed up the addition the carry look ahead adder is used as a carry propagate adder. The multiplier circuit is designed using VERILOG and synthesized using Xilinx ISE9.2i simulator. The area, power and delay of the designed filter is analysed using cadence tool.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130090606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A simple and efficient heuristic algorithm for maximum clique problem 求解最大团问题的一种简单高效的启发式算法
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2014.7103958
K. Singh, L. Govinda
A clique is a sub graph in which all pairs of vertices are mutually adjacent. A maximum clique is a maximum collection of objects which are mutually related in some specified criterion. This paper proposes an efficient heuristic approach for finding maximum clique using minimal independent set in a graph. At each recursive step, the algorithm finds minimal independent vertices for further expansion to get adjacent list, reason is that at the depth, the maximum clique most likely would include either of the vertices of minimal independent set. Further a pruning strategy is used to abort smaller size of clique to be explored.
团是所有顶点对相互相邻的子图。最大团是在某些特定准则下相互关联的对象的最大集合。本文提出了一种利用图中最小独立集求最大团的有效启发式方法。在每一步递归中,算法都要找到最小独立的顶点,以便进一步展开得到相邻列表,因为在深度处,最大团极有可能包含最小独立集的任意一个顶点。此外,使用修剪策略来中止较小规模的团待探索。
{"title":"A simple and efficient heuristic algorithm for maximum clique problem","authors":"K. Singh, L. Govinda","doi":"10.1109/ISCO.2014.7103958","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103958","url":null,"abstract":"A clique is a sub graph in which all pairs of vertices are mutually adjacent. A maximum clique is a maximum collection of objects which are mutually related in some specified criterion. This paper proposes an efficient heuristic approach for finding maximum clique using minimal independent set in a graph. At each recursive step, the algorithm finds minimal independent vertices for further expansion to get adjacent list, reason is that at the depth, the maximum clique most likely would include either of the vertices of minimal independent set. Further a pruning strategy is used to abort smaller size of clique to be explored.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132511526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Real time navigation strategies for webots using fuzzy controller 基于模糊控制器的网络机器人实时导航策略
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2014.7103910
K. K. Pandey, P. K. Mohanty, D. Parhi
Since last decade, designing of an autonomous mobile robot for complex systems involves the interaction between numerous heterogeneous components (software and hardware) and according to its application; they are heavily used in environments where human involvement is restricted, unmanageable, or hazardous. For researchers, the proper movement of robot inside working environment is the challenging tasks; accordingly, day by day research has been made on navigation system of mobile robot. As a result, we design mobile robot controller algorithms that helps mobile robot to navigate in environment according to given task and avoid obstacle. In order to avoid obstacles in efficient manner and to reach the goal position through complicated path (i.e. surrounded by various types of obstacles), we designed sensor integration based fuzzy logic controller that transform the direction of mobile robot according to obstacle position and create collision free path. To create a collision free path certain input parameter, output parameter, fuzzy membership functions and `If-Then rule' fuzzy interface system are executed in algorithm. All these information are combined together to map the environment. To attain the collision free path, obstacle avoidance is done through changing the steering angle at point to point with the help of sensor network. The controller covers the environment at which starting point, goal point and obstacle position is known. Priority is made to avoid the obstacle during goal seeking behavior by the robot. The efficiency of the recommended technique is confirmed by a succession of simulations. To check the simulation result for proposed controller, 3D Physics-based simulation software is used.
近十年来,复杂系统自主移动机器人的设计涉及到众多异构组件(软件和硬件)之间的相互作用,并根据其应用;它们被大量用于人类参与受限、无法管理或危险的环境中。机器人在工作环境下的合理运动是研究人员面临的一个具有挑战性的课题;因此,移动机器人导航系统的研究日益深入。因此,我们设计了移动机器人控制器算法,帮助移动机器人根据给定的任务在环境中导航并避开障碍物。为了有效地避开障碍物,通过复杂的路径(即被各种类型的障碍物包围)到达目标位置,我们设计了基于传感器集成的模糊逻辑控制器,根据障碍物位置变换移动机器人的方向,形成无碰撞路径。在算法中执行一定的输入参数、输出参数、模糊隶属函数和“If-Then规则”模糊接口系统来创建无碰撞路径。所有这些信息被组合在一起以绘制环境图。为了实现无碰撞路径,借助传感器网络,通过点对点改变转向角度来实现避障。控制器覆盖已知起点、目标点和障碍物位置的环境。机器人在目标寻找过程中优先考虑障碍物的规避。通过一系列的仿真验证了所推荐技术的有效性。为了验证所提出控制器的仿真结果,使用了基于3D物理的仿真软件。
{"title":"Real time navigation strategies for webots using fuzzy controller","authors":"K. K. Pandey, P. K. Mohanty, D. Parhi","doi":"10.1109/ISCO.2014.7103910","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103910","url":null,"abstract":"Since last decade, designing of an autonomous mobile robot for complex systems involves the interaction between numerous heterogeneous components (software and hardware) and according to its application; they are heavily used in environments where human involvement is restricted, unmanageable, or hazardous. For researchers, the proper movement of robot inside working environment is the challenging tasks; accordingly, day by day research has been made on navigation system of mobile robot. As a result, we design mobile robot controller algorithms that helps mobile robot to navigate in environment according to given task and avoid obstacle. In order to avoid obstacles in efficient manner and to reach the goal position through complicated path (i.e. surrounded by various types of obstacles), we designed sensor integration based fuzzy logic controller that transform the direction of mobile robot according to obstacle position and create collision free path. To create a collision free path certain input parameter, output parameter, fuzzy membership functions and `If-Then rule' fuzzy interface system are executed in algorithm. All these information are combined together to map the environment. To attain the collision free path, obstacle avoidance is done through changing the steering angle at point to point with the help of sensor network. The controller covers the environment at which starting point, goal point and obstacle position is known. Priority is made to avoid the obstacle during goal seeking behavior by the robot. The efficiency of the recommended technique is confirmed by a succession of simulations. To check the simulation result for proposed controller, 3D Physics-based simulation software is used.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115137652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1