Pub Date : 2014-01-01DOI: 10.1109/ISCO.2014.7103956
G. Bhargava, Abhishek Mathur
In this paper we work on the watermarking through which we can improve the security. In this technique the whole watermark image is embed in the original image. The embedding process can improve the security of the image. Security plays an important role during the transmission of message or data from sender to receiver. In this paper we use a combination of compression and encryption technique and then watermarking. In this first of all compression is performed, we use the JPEG2000 compression technique, JPEG2000 use the core compression algorithm Embedded Block Coding with Optimized Truncation (EBCOT), The EBCOT algorithm provide the superior compression performance and on that compressed image encryption is performed, we use the RC4 encryption technique, when encryption is completed then on that encrypted image watermarking is applied. In our proposed work we can divide the watermark image into blocks. In this we can calculate the kernel of the original image through which we can find the area where the watermark image is embed. Here we propose an efficient technique of spread spectrum watermarking which provides less attacks as compared to the other existing technique.
本文主要研究了通过水印技术来提高安全性的方法。该技术将整个水印图像嵌入到原始图像中。嵌入过程可以提高图像的安全性。在消息或数据从发送方到接收方的传输过程中,安全性起着重要的作用。在本文中,我们采用压缩和加密技术相结合,然后再进行水印。在此首先进行压缩,我们使用JPEG2000压缩技术,JPEG2000使用核心压缩算法EBCOT (Embedded Block Coding with Optimized Truncation), EBCOT算法提供了优越的压缩性能,并在压缩图像上进行加密,我们使用RC4加密技术,当加密完成后,在加密图像上应用水印。在我们提出的工作中,我们可以将水印图像分成块。在这种方法中,我们可以计算原始图像的核,通过核可以找到水印图像嵌入的区域。本文提出了一种有效的扩频水印技术,与其他现有技术相比,它提供的攻击更少。
{"title":"Enhanced spread spectrum image watermarking with compression-encryption technique","authors":"G. Bhargava, Abhishek Mathur","doi":"10.1109/ISCO.2014.7103956","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103956","url":null,"abstract":"In this paper we work on the watermarking through which we can improve the security. In this technique the whole watermark image is embed in the original image. The embedding process can improve the security of the image. Security plays an important role during the transmission of message or data from sender to receiver. In this paper we use a combination of compression and encryption technique and then watermarking. In this first of all compression is performed, we use the JPEG2000 compression technique, JPEG2000 use the core compression algorithm Embedded Block Coding with Optimized Truncation (EBCOT), The EBCOT algorithm provide the superior compression performance and on that compressed image encryption is performed, we use the RC4 encryption technique, when encryption is completed then on that encrypted image watermarking is applied. In our proposed work we can divide the watermark image into blocks. In this we can calculate the kernel of the original image through which we can find the area where the watermark image is embed. Here we propose an efficient technique of spread spectrum watermarking which provides less attacks as compared to the other existing technique.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133538003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-13DOI: 10.1109/ISCO.2014.7103959
Subaira A S, P. Scholar, Mrs Anitha P
In spite of growing information system widely, security has remained one hard-hitting area for computers as well as networks. In information protection, Intrusion Detection System (IDS) is used to safeguard the data confidentiality, integrity and system availability from various types of attacks. Data mining is an efficient artifice applied to intrusion detection to ascertain a new outline from the massive network data as well as it used to reduce the strain of the manual compilations of the normal and abnormal behavior patterns. This piece of writing reviews the present state of data mining techniques and compares various data mining techniques used to implement an intrusion detection system such as, Support Vector Machine, Genetic Algorithm, Neural network, Fuzzy Logic, Bayesian Classifier, K-Nearest Neighbor and decision tree Algorithms by highlighting a advantage and disadvantages of each of the techniques.
{"title":"Efficient classification mechanism for network intrusion detection system based on data mining techniques: A survey","authors":"Subaira A S, P. Scholar, Mrs Anitha P","doi":"10.1109/ISCO.2014.7103959","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103959","url":null,"abstract":"In spite of growing information system widely, security has remained one hard-hitting area for computers as well as networks. In information protection, Intrusion Detection System (IDS) is used to safeguard the data confidentiality, integrity and system availability from various types of attacks. Data mining is an efficient artifice applied to intrusion detection to ascertain a new outline from the massive network data as well as it used to reduce the strain of the manual compilations of the normal and abnormal behavior patterns. This piece of writing reviews the present state of data mining techniques and compares various data mining techniques used to implement an intrusion detection system such as, Support Vector Machine, Genetic Algorithm, Neural network, Fuzzy Logic, Bayesian Classifier, K-Nearest Neighbor and decision tree Algorithms by highlighting a advantage and disadvantages of each of the techniques.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122726299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2014.7103929
V. Lalitha, R. Rajesh
Our earlier work [1] [2] shows interesting characteristics of transmission range/power of the MANET nodes on the performance of multipath MANET routing protocol. The objective of this work is to improve the performance of a MANET multi-path routing protocol without increasing or decreasing its default transmission range of the nodes. The proposed work is to control the routing process and only allow hops with maximum possible distances in a route based on the received signal strength at each node. We propose topology aware and power aware ad hoc on-demand multipath distance vector routing protocol based on the maximum transmission range. We call this model as AOMDV_RR Range Routing and implemented it under ns2 by improving the standard AOMDV protocol. We studied the proposed AOMDV_RR and the standard AOMDV under different network densities and measured the performance for suitable metrics. Measurable difference in performance was realized and the proposed AOMDV_RR performed better than normal AOMDV with respect to metrics network overhead, throughput and energy consumption.
{"title":"Power aware and topology aware ad-hoc on-demand multipath distance vector routing for MANET","authors":"V. Lalitha, R. Rajesh","doi":"10.1109/ISCO.2014.7103929","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103929","url":null,"abstract":"Our earlier work [1] [2] shows interesting characteristics of transmission range/power of the MANET nodes on the performance of multipath MANET routing protocol. The objective of this work is to improve the performance of a MANET multi-path routing protocol without increasing or decreasing its default transmission range of the nodes. The proposed work is to control the routing process and only allow hops with maximum possible distances in a route based on the received signal strength at each node. We propose topology aware and power aware ad hoc on-demand multipath distance vector routing protocol based on the maximum transmission range. We call this model as AOMDV_RR Range Routing and implemented it under ns2 by improving the standard AOMDV protocol. We studied the proposed AOMDV_RR and the standard AOMDV under different network densities and measured the performance for suitable metrics. Measurable difference in performance was realized and the proposed AOMDV_RR performed better than normal AOMDV with respect to metrics network overhead, throughput and energy consumption.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114995034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2014.7103961
S. Lavanya, B. Anuradha
In the multiprocessing embedded system the efficient use of the on-chip and off-chip memory code repositioning is done. For the purpose of improvement in the embedded system the SPM and cache is used for the code processing. The code layout is developed to place the code in memory for the preventing the cache conflicts and misses. Even though many researchers have illustrated the use of SPM and cache to improve the efficiency, combining these two was not done. In this study the comparison of energy consumption is done while code processing is done by three models namely 1) ILP model 2) Heuristic model 3) two stage meta-heuristic model. In the above two stage Meta heuristic model is the proposed model in which along with the SPM and Cache code layout is developed to place the code in it. The result reveals that compared to other two models the two stage meta-heuristic model yield more efficiency and consume less energy than other two models. As much as approximately 55% of additional energy can be saved by applying both code repositioning and SPM code selection techniques in this model.
{"title":"Reduction of energy consumption using SPM and optimal code layout in embedded systems","authors":"S. Lavanya, B. Anuradha","doi":"10.1109/ISCO.2014.7103961","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103961","url":null,"abstract":"In the multiprocessing embedded system the efficient use of the on-chip and off-chip memory code repositioning is done. For the purpose of improvement in the embedded system the SPM and cache is used for the code processing. The code layout is developed to place the code in memory for the preventing the cache conflicts and misses. Even though many researchers have illustrated the use of SPM and cache to improve the efficiency, combining these two was not done. In this study the comparison of energy consumption is done while code processing is done by three models namely 1) ILP model 2) Heuristic model 3) two stage meta-heuristic model. In the above two stage Meta heuristic model is the proposed model in which along with the SPM and Cache code layout is developed to place the code in it. The result reveals that compared to other two models the two stage meta-heuristic model yield more efficiency and consume less energy than other two models. As much as approximately 55% of additional energy can be saved by applying both code repositioning and SPM code selection techniques in this model.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"15 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116854128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2014.7103913
M. V. A. Raju Bahubalendruni, B. B. Biswal
This paper analyses the existing methodology of employing optimization techniques for structuraloptimisation of laminated composites at part level (local optimization) and also the limitations of this part level structural optimisation approach in industrial applications. The deviations observed in optimisation problem definition due to implementation of part level optimized solution at the assembly level (global optimisation) are presented. Multi shell closed structure is considered to carry out the numerical experiments, due to the reason; most of the structures of aircraft wing, wind turbine blade and helicopter rotor blades exhibit this configuration. Part level optimization is carried out on a single plate element of a multi shell closed structure and the optimized plate element is replaced in the multi shell closed structure. The observations made after replacement of optimized plate element through performing the numerical experiments are presented and well discussed.
{"title":"Study of optimization of composite structures with respect to industrial applications","authors":"M. V. A. Raju Bahubalendruni, B. B. Biswal","doi":"10.1109/ISCO.2014.7103913","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103913","url":null,"abstract":"This paper analyses the existing methodology of employing optimization techniques for structuraloptimisation of laminated composites at part level (local optimization) and also the limitations of this part level structural optimisation approach in industrial applications. The deviations observed in optimisation problem definition due to implementation of part level optimized solution at the assembly level (global optimisation) are presented. Multi shell closed structure is considered to carry out the numerical experiments, due to the reason; most of the structures of aircraft wing, wind turbine blade and helicopter rotor blades exhibit this configuration. Part level optimization is carried out on a single plate element of a multi shell closed structure and the optimized plate element is replaced in the multi shell closed structure. The observations made after replacement of optimized plate element through performing the numerical experiments are presented and well discussed.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124587163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/iccitechn.2014.7073057
Advisory Committee
Dr.Akhtar Kalam, Victoria University, Melbourne, Australia Dr.Jordan Hristov, University of Chemical Technology and Metallurgy, Bulgaria Dr.Aladin Zayegh, Victoria University, Australia Dr.Subramaniam Ganesan, Oakland University, Rochester, USA Dr.Narottam Das, Curtin University, Australia Dr.Paulraj Murugesa Pandiyan, Universiti Malaysia Perlis. Dr.Kannan Murugesan, Kolej University Linton,Malaysia. Dr.S.Thangaprakash, Bandar Universiti Teknologi Legenda, Malaysia Dr.Chellappan Vijila, Institute of Materials Research and Engineering (IMRE), Singapore Dr.Valentina Emilia Balas, University of Arad, Romania Dr.Marimuthu Palaniswamy, University of Melbourne, Victoria, Australia Dr.Angappa Gunasekaran, Charlton College of Business United States Dr.Immanuel Edinbarough, University of Texas, USA Prof.Jayashri Ravishankar, University of New South Wales, Australia Prof.Kannan J.Krishanan, Victoria University, Australia
Akhtar Kalam 博士,澳大利亚墨尔本维多利亚大学 Jordan Hristov 博士,保加利亚化学技术和冶金大学 Aladin Zayegh 博士,澳大利亚维多利亚大学 Subramaniam Ganesan 博士,美国罗切斯特奥克兰大学 Narottam Das 博士,澳大利亚科廷大学 Paulraj Murugesa Pandiyan 博士,马来西亚 Perlis 大学。马来西亚柯林顿大学 Kannan Murugesan 博士。S.Thangaprakash 博士,马来西亚 Bandar Universiti Teknologi Legenda。 Chellappan Vijila 博士,新加坡材料研究与工程研究所。Immanuel Edinbarough 博士,美国德克萨斯大学 Jayashri Ravishankar 教授,澳大利亚新南威尔士大学 Kannan J. Krishanan 教授,澳大利亚维多利亚大学
{"title":"Advisory committee","authors":"Advisory Committee","doi":"10.1109/iccitechn.2014.7073057","DOIUrl":"https://doi.org/10.1109/iccitechn.2014.7073057","url":null,"abstract":"Dr.Akhtar Kalam, Victoria University, Melbourne, Australia Dr.Jordan Hristov, University of Chemical Technology and Metallurgy, Bulgaria Dr.Aladin Zayegh, Victoria University, Australia Dr.Subramaniam Ganesan, Oakland University, Rochester, USA Dr.Narottam Das, Curtin University, Australia Dr.Paulraj Murugesa Pandiyan, Universiti Malaysia Perlis. Dr.Kannan Murugesan, Kolej University Linton,Malaysia. Dr.S.Thangaprakash, Bandar Universiti Teknologi Legenda, Malaysia Dr.Chellappan Vijila, Institute of Materials Research and Engineering (IMRE), Singapore Dr.Valentina Emilia Balas, University of Arad, Romania Dr.Marimuthu Palaniswamy, University of Melbourne, Victoria, Australia Dr.Angappa Gunasekaran, Charlton College of Business United States Dr.Immanuel Edinbarough, University of Texas, USA Prof.Jayashri Ravishankar, University of New South Wales, Australia Prof.Kannan J.Krishanan, Victoria University, Australia","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130362971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2014.7103922
K. Anganan, J. Murali, M. Krishnan, K. Marimuthu
In this study, the mechanical properties of welded joints of AA-6082-T6 aluminium alloy obtained with friction stir welding (FSW) and conventional metal inert gas welding (MIG) were studied. FSW welds were carried out on a Friction stir welding machine. The performance of FSW and MIG welded joints were identified using tensile, metallographic and hardness tests. The joints obtained with FSW and MIG processes were also assessed for distortion that accompanied the welding processes. Taking into consideration the process conditions and requirements, FSW and MIG processes were also compared with each other to understand the advantages and disadvantages of the processes for welding applications of studied Al alloy. Better tensile strength was obtained with FSW welded joints. The width of the heat affected zone of FSW was narrower than MIG welded joints. The results show that FSW improves the mechanical properties of welded joints.
{"title":"Study of mechanical properties and experimental comparison of Mig and Friction stir welding processes for aa6082-t6 aluminium alloy","authors":"K. Anganan, J. Murali, M. Krishnan, K. Marimuthu","doi":"10.1109/ISCO.2014.7103922","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103922","url":null,"abstract":"In this study, the mechanical properties of welded joints of AA-6082-T6 aluminium alloy obtained with friction stir welding (FSW) and conventional metal inert gas welding (MIG) were studied. FSW welds were carried out on a Friction stir welding machine. The performance of FSW and MIG welded joints were identified using tensile, metallographic and hardness tests. The joints obtained with FSW and MIG processes were also assessed for distortion that accompanied the welding processes. Taking into consideration the process conditions and requirements, FSW and MIG processes were also compared with each other to understand the advantages and disadvantages of the processes for welding applications of studied Al alloy. Better tensile strength was obtained with FSW welded joints. The width of the heat affected zone of FSW was narrower than MIG welded joints. The results show that FSW improves the mechanical properties of welded joints.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122269783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2014.7103926
S. Nithya, M. Nithya
We implement a high speed and low power FIR digital filter design using the fixed width booth multiplier. To reduce the truncation error in fixed width multiplier Adaptive Conditional Probability Estimator is used (ACPE). To achieve higher speed, the modified Booth encoding has been used and also to speed up the addition the carry look ahead adder is used as a carry propagate adder. The multiplier circuit is designed using VERILOG and synthesized using Xilinx ISE9.2i simulator. The area, power and delay of the designed filter is analysed using cadence tool.
{"title":"An efficient fixed width multiplier for digital filter","authors":"S. Nithya, M. Nithya","doi":"10.1109/ISCO.2014.7103926","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103926","url":null,"abstract":"We implement a high speed and low power FIR digital filter design using the fixed width booth multiplier. To reduce the truncation error in fixed width multiplier Adaptive Conditional Probability Estimator is used (ACPE). To achieve higher speed, the modified Booth encoding has been used and also to speed up the addition the carry look ahead adder is used as a carry propagate adder. The multiplier circuit is designed using VERILOG and synthesized using Xilinx ISE9.2i simulator. The area, power and delay of the designed filter is analysed using cadence tool.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130090606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2014.7103958
K. Singh, L. Govinda
A clique is a sub graph in which all pairs of vertices are mutually adjacent. A maximum clique is a maximum collection of objects which are mutually related in some specified criterion. This paper proposes an efficient heuristic approach for finding maximum clique using minimal independent set in a graph. At each recursive step, the algorithm finds minimal independent vertices for further expansion to get adjacent list, reason is that at the depth, the maximum clique most likely would include either of the vertices of minimal independent set. Further a pruning strategy is used to abort smaller size of clique to be explored.
{"title":"A simple and efficient heuristic algorithm for maximum clique problem","authors":"K. Singh, L. Govinda","doi":"10.1109/ISCO.2014.7103958","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103958","url":null,"abstract":"A clique is a sub graph in which all pairs of vertices are mutually adjacent. A maximum clique is a maximum collection of objects which are mutually related in some specified criterion. This paper proposes an efficient heuristic approach for finding maximum clique using minimal independent set in a graph. At each recursive step, the algorithm finds minimal independent vertices for further expansion to get adjacent list, reason is that at the depth, the maximum clique most likely would include either of the vertices of minimal independent set. Further a pruning strategy is used to abort smaller size of clique to be explored.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132511526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2014.7103910
K. K. Pandey, P. K. Mohanty, D. Parhi
Since last decade, designing of an autonomous mobile robot for complex systems involves the interaction between numerous heterogeneous components (software and hardware) and according to its application; they are heavily used in environments where human involvement is restricted, unmanageable, or hazardous. For researchers, the proper movement of robot inside working environment is the challenging tasks; accordingly, day by day research has been made on navigation system of mobile robot. As a result, we design mobile robot controller algorithms that helps mobile robot to navigate in environment according to given task and avoid obstacle. In order to avoid obstacles in efficient manner and to reach the goal position through complicated path (i.e. surrounded by various types of obstacles), we designed sensor integration based fuzzy logic controller that transform the direction of mobile robot according to obstacle position and create collision free path. To create a collision free path certain input parameter, output parameter, fuzzy membership functions and `If-Then rule' fuzzy interface system are executed in algorithm. All these information are combined together to map the environment. To attain the collision free path, obstacle avoidance is done through changing the steering angle at point to point with the help of sensor network. The controller covers the environment at which starting point, goal point and obstacle position is known. Priority is made to avoid the obstacle during goal seeking behavior by the robot. The efficiency of the recommended technique is confirmed by a succession of simulations. To check the simulation result for proposed controller, 3D Physics-based simulation software is used.
{"title":"Real time navigation strategies for webots using fuzzy controller","authors":"K. K. Pandey, P. K. Mohanty, D. Parhi","doi":"10.1109/ISCO.2014.7103910","DOIUrl":"https://doi.org/10.1109/ISCO.2014.7103910","url":null,"abstract":"Since last decade, designing of an autonomous mobile robot for complex systems involves the interaction between numerous heterogeneous components (software and hardware) and according to its application; they are heavily used in environments where human involvement is restricted, unmanageable, or hazardous. For researchers, the proper movement of robot inside working environment is the challenging tasks; accordingly, day by day research has been made on navigation system of mobile robot. As a result, we design mobile robot controller algorithms that helps mobile robot to navigate in environment according to given task and avoid obstacle. In order to avoid obstacles in efficient manner and to reach the goal position through complicated path (i.e. surrounded by various types of obstacles), we designed sensor integration based fuzzy logic controller that transform the direction of mobile robot according to obstacle position and create collision free path. To create a collision free path certain input parameter, output parameter, fuzzy membership functions and `If-Then rule' fuzzy interface system are executed in algorithm. All these information are combined together to map the environment. To attain the collision free path, obstacle avoidance is done through changing the steering angle at point to point with the help of sensor network. The controller covers the environment at which starting point, goal point and obstacle position is known. Priority is made to avoid the obstacle during goal seeking behavior by the robot. The efficiency of the recommended technique is confirmed by a succession of simulations. To check the simulation result for proposed controller, 3D Physics-based simulation software is used.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115137652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}