首页 > 最新文献

2013 International Conference on Green High Performance Computing (ICGHPC)最新文献

英文 中文
Fault diagnosis in diode clamped multilevel inverter drive using wavelet transforms 基于小波变换的二极管箝位多电平变频器故障诊断
Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533925
V. Vinothkumar, C. Muniraj
Induction motors are normally used in the industrial environments. Industry has begun to use energy efficient high power rating electrical drives. Multilevel inverter drives have become a solution for energy efficient drives in recent years. There may be probability for occurring of many faults in the multi-level inverter fed induction motor drive due to its complex switching patterns. So it is necessary to identify types of fault and its location in order to improve the reliability of the drives. In this paper presents a new fault diagnosis technique based on discrete wavelet transforms for diode clamped multilevel inverter fed induction motor drives. For demonstrating the proposed method the gate pulse failure fault are considered in the diode clamped multilevel inverter. The complete system is modeled using MATLAB/Simulink. The simulated results are shown to illustrate the effectiveness of the proposed method.
感应电动机通常用于工业环境中。工业上已开始采用高能效、高额定功率的电气驱动。近年来,多电平变频器已成为节能变频器的一种解决方案。多电平变频调速异步电动机由于其开关方式复杂,有可能发生多种故障。因此,为了提高变频器的可靠性,有必要对变频器的故障类型和位置进行识别。提出了一种基于离散小波变换的二极管箝位多电平变频感应电动机故障诊断方法。为了说明所提出的方法,考虑了二极管箝位型多电平逆变器中的栅极脉冲失效故障。利用MATLAB/Simulink对整个系统进行了建模。仿真结果表明了该方法的有效性。
{"title":"Fault diagnosis in diode clamped multilevel inverter drive using wavelet transforms","authors":"V. Vinothkumar, C. Muniraj","doi":"10.1109/ICGHPC.2013.6533925","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533925","url":null,"abstract":"Induction motors are normally used in the industrial environments. Industry has begun to use energy efficient high power rating electrical drives. Multilevel inverter drives have become a solution for energy efficient drives in recent years. There may be probability for occurring of many faults in the multi-level inverter fed induction motor drive due to its complex switching patterns. So it is necessary to identify types of fault and its location in order to improve the reliability of the drives. In this paper presents a new fault diagnosis technique based on discrete wavelet transforms for diode clamped multilevel inverter fed induction motor drives. For demonstrating the proposed method the gate pulse failure fault are considered in the diode clamped multilevel inverter. The complete system is modeled using MATLAB/Simulink. The simulated results are shown to illustrate the effectiveness of the proposed method.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123838224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
PCA-LDA based face recognition system & results comparison by various classification techniques 基于PCA-LDA的人脸识别系统及各种分类技术的结果比较
Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533913
Tomesh Verma, Raj Kumar Sahu
Face recognition has a major impact in security measures which makes it one of the most appealing areas to explore. To perform face recognition, researchers adopt mathematical calculations to develop automatic recognition systems. As a face recognition system has to perform over wide range of database, dimension reduction techniques become a prime requirement to reduce time and increase accuracy. In this paper, face recognition is performed using Principal Component Analysis followed by Linear Discriminant Analysis based dimension reduction techniques. Sequencing of this paper is preprocessing, dimension reduction of training database set by PCA, extraction of features for class separability by LDA and finally testing by nearest mean classification techniques. The proposed method is tested over ORL face database. It is found that recognition rate on this database is 96.35% and hence showing efficiency of the proposed method than previously adopted methods of face recognition systems.
人脸识别对安全措施有重大影响,这使其成为最值得探索的领域之一。为了进行人脸识别,研究人员采用数学计算来开发自动识别系统。由于人脸识别系统需要在大范围的数据库中进行操作,降维技术成为减少时间和提高准确率的主要要求。本文采用主成分分析和基于线性判别分析的降维技术进行人脸识别。本文的顺序是预处理,用PCA对训练数据库集进行降维,用LDA提取类可分性特征,最后用最接近均值分类技术进行测试。在ORL人脸数据库上进行了测试。结果表明,该方法在该数据库上的识别率为96.35%,比以往采用的人脸识别方法效率更高。
{"title":"PCA-LDA based face recognition system & results comparison by various classification techniques","authors":"Tomesh Verma, Raj Kumar Sahu","doi":"10.1109/ICGHPC.2013.6533913","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533913","url":null,"abstract":"Face recognition has a major impact in security measures which makes it one of the most appealing areas to explore. To perform face recognition, researchers adopt mathematical calculations to develop automatic recognition systems. As a face recognition system has to perform over wide range of database, dimension reduction techniques become a prime requirement to reduce time and increase accuracy. In this paper, face recognition is performed using Principal Component Analysis followed by Linear Discriminant Analysis based dimension reduction techniques. Sequencing of this paper is preprocessing, dimension reduction of training database set by PCA, extraction of features for class separability by LDA and finally testing by nearest mean classification techniques. The proposed method is tested over ORL face database. It is found that recognition rate on this database is 96.35% and hence showing efficiency of the proposed method than previously adopted methods of face recognition systems.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"432 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131579487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Hybrid authentication technique to preserve user privacy and protection as an end point lock for the cloud service digital information 混合身份验证技术用于保护用户隐私和保护云服务数字信息的端点锁定
Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533904
D. Chandramohan, T. Vengattaraman, D. Rajaguru, R. Baskaran, P. Dhavachelvan
This paper presents a new approach for privacy preserving of user data and publishing in cloud storage area. Hybrid authentication technique overcomes the limitations of attackers and general intruders and preserves better utilization of user's confidential data by providing access only to authorized persons. In this proposed technique it is illustrated how this technique used to prevent user secret data attributes kept in digital cloud storage environment. Moreover the proposed system shows a better data privacy preserving utility by users and handling sensitive data during vulnerable attempts and attacks to the cloud storage area.
提出了一种用户数据隐私保护和云存储发布的新方法。混合身份验证技术克服了攻击者和一般入侵者的限制,并通过仅向授权人员提供访问权限来更好地利用用户的机密数据。在该技术中,说明了如何使用该技术防止用户秘密数据属性保存在数字云存储环境中。此外,该系统显示了用户更好的数据隐私保护效用,并在易受攻击的云存储区域处理敏感数据。
{"title":"Hybrid authentication technique to preserve user privacy and protection as an end point lock for the cloud service digital information","authors":"D. Chandramohan, T. Vengattaraman, D. Rajaguru, R. Baskaran, P. Dhavachelvan","doi":"10.1109/ICGHPC.2013.6533904","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533904","url":null,"abstract":"This paper presents a new approach for privacy preserving of user data and publishing in cloud storage area. Hybrid authentication technique overcomes the limitations of attackers and general intruders and preserves better utilization of user's confidential data by providing access only to authorized persons. In this proposed technique it is illustrated how this technique used to prevent user secret data attributes kept in digital cloud storage environment. Moreover the proposed system shows a better data privacy preserving utility by users and handling sensitive data during vulnerable attempts and attacks to the cloud storage area.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125503277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A novel framework to prevent privacy breach in cloud data storage area service 一种防止云数据存储区域服务中隐私泄露的新框架
Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533903
D. Chandramohan, T. Vengattaraman, D. Rajaguru, R. Baskaran, P. Dhavachelvan
The present paper focuses on user data privacy invasion and it is more important in cloud data storage. Numerous approaches and techniques have proposed so for, to preserve the cloud user privacy. This paper introduces a layered framework for preserving secrecy of cloud user and preventing digital data loss, using onion privacy layer, garlic privacy layer. This layered framework prevents the confidential information by multiple encryption of onion and garlic privacy preserving layered approach.
本文主要研究用户数据隐私侵犯问题,这在云数据存储中尤为重要。为了保护云用户的隐私,已经提出了许多方法和技术。本文介绍了一种利用洋葱隐私层和大蒜隐私层实现云用户保密和防止数字数据丢失的分层框架。该分层框架通过洋葱和大蒜的多重加密保护隐私的分层方法来防止机密信息的泄露。
{"title":"A novel framework to prevent privacy breach in cloud data storage area service","authors":"D. Chandramohan, T. Vengattaraman, D. Rajaguru, R. Baskaran, P. Dhavachelvan","doi":"10.1109/ICGHPC.2013.6533903","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533903","url":null,"abstract":"The present paper focuses on user data privacy invasion and it is more important in cloud data storage. Numerous approaches and techniques have proposed so for, to preserve the cloud user privacy. This paper introduces a layered framework for preserving secrecy of cloud user and preventing digital data loss, using onion privacy layer, garlic privacy layer. This layered framework prevents the confidential information by multiple encryption of onion and garlic privacy preserving layered approach.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134568765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Efficacious applicability of foolproof security and reliable storage services in cloud computing 万无一失的安全可靠的存储服务在云计算中的有效应用
Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533905
A. Mary, J. S. Bersiya
Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks toward the correctness of the data in cloud. we propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. Also an third party auditor for the auditing mechanism.
云存储使用户可以远程存储数据,享受按需高质量的云应用,而无需承担本地硬件和软件管理的负担。虽然好处很明显,但这种服务也放弃了用户对其外包数据的物理所有权,这不可避免地会给云中的数据的正确性带来新的安全风险。本文利用同态令牌和分布式擦除编码数据,提出了一种灵活的分布式存储完整性审计机制。也是审计机制的第三方审计员。
{"title":"Efficacious applicability of foolproof security and reliable storage services in cloud computing","authors":"A. Mary, J. S. Bersiya","doi":"10.1109/ICGHPC.2013.6533905","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533905","url":null,"abstract":"Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks toward the correctness of the data in cloud. we propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. Also an third party auditor for the auditing mechanism.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122324597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy preservation and enhanced utility in search log publishing using improved zealous algorithm 使用改进的热心算法在搜索日志发布中保护隐私和增强效用
Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533936
S. Belinsha, A. Raghavendra
Search log records can enhance the quality and delivery of internet information services to the end user. Analysing and exploring the search log can explore the user's behaviour. When these search logs are published it must ensure privacy of the users at the same time it should exhibit better utility. The existing ZEALOUS algorithm uses a two threshold framework to provide probabilistic differential privacy. In the course of providing this level of privacy the search log looses it's utility, as it publishes only frequent items. So an algorithm is proposed to enhance the utility of search log by qualifying the infrequent items while publishing at the same time preserving the stronger level of privacy.
搜索日志记录可以提高向最终用户提供互联网信息服务的质量和交付。分析和探索搜索日志可以探索用户的行为。当这些搜索日志发布时,它必须在保证用户隐私的同时表现出更好的实用性。现有的算法采用双阈值框架来提供概率差分隐私。在提供这种级别的隐私的过程中,搜索日志失去了它的效用,因为它只发布频繁的条目。为此,提出了一种算法,通过对搜索日志中不常见的条目进行限定,在发布的同时保证更强的隐私性,从而提高搜索日志的实用性。
{"title":"Privacy preservation and enhanced utility in search log publishing using improved zealous algorithm","authors":"S. Belinsha, A. Raghavendra","doi":"10.1109/ICGHPC.2013.6533936","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533936","url":null,"abstract":"Search log records can enhance the quality and delivery of internet information services to the end user. Analysing and exploring the search log can explore the user's behaviour. When these search logs are published it must ensure privacy of the users at the same time it should exhibit better utility. The existing ZEALOUS algorithm uses a two threshold framework to provide probabilistic differential privacy. In the course of providing this level of privacy the search log looses it's utility, as it publishes only frequent items. So an algorithm is proposed to enhance the utility of search log by qualifying the infrequent items while publishing at the same time preserving the stronger level of privacy.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129885800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EFBV: En-Route Filtering Based Batch Verification scheme for false data injection attack in wireless sensor networks EFBV:基于路由过滤的无线传感器网络中假数据注入攻击的批验证方案
Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533935
P. Joyce, Beryl Princess
Formal specifications have a variety of applications, including testing, maintenance, optimization, refactoring, documentation, and program repair. However, such specifications are difficult for human programmers to produce and verify manually, and existing automatic specification miners that discover two-state temporal properties have prohibitively high false positive rates, Wireless Sensor Networks are usually deployed at unattended or hostile environments. So they are very vulnerable to injecting false data attack. An adversary could compromise a sensor node accesses all stored keying materials and inject false data causing energy wasted in en-route nodes. In this paper, we propose En-Route Filtering Based Batch Verification (EFBV) scheme to find gang injecting false data attack and filter the false data. By batch verification of reports the false data can be identified and filtered easily. With the proposed mechanism, injected bogus data can be early detected and filtered by En-Route sensor nodes. Thus, it can be discover the intruder before it reaches the sink. The proposed EFBV scheme could be effectively saving energy and avoid sink overhead. It also makes possible to thwart the false data even if network contains at least one uncompromised neighboring node. The proposed scheme achieves most energy efficient, the high filtering probability, scalability and reliability, reduce traffic overhead.
正式规范有各种各样的应用,包括测试、维护、优化、重构、文档和程序修复。然而,这些规范对于人类程序员来说很难手工生成和验证,并且现有的自动规范挖掘器发现两状态时间属性具有过高的误报率,无线传感器网络通常部署在无人值守或敌对环境中。因此,它们非常容易受到虚假数据注入攻击。攻击者可以破坏传感器节点,访问所有存储的密钥材料,并注入虚假数据,导致途中节点的能量浪费。本文提出了基于路由过滤的批量验证(EFBV)方案,用于发现团伙注入假数据攻击并过滤假数据。通过对报告的批量验证,可以很容易地识别和过滤虚假数据。利用该机制,可以在路由传感器节点早期检测和过滤注入的虚假数据。因此,它可以在入侵者到达接收器之前发现它。所提出的EFBV方案可以有效地节约能源并避免汇开销。它还可以阻止虚假数据,即使网络包含至少一个未妥协的相邻节点。该方案实现了最节能、高滤波概率、可扩展性和可靠性,减少了流量开销。
{"title":"EFBV: En-Route Filtering Based Batch Verification scheme for false data injection attack in wireless sensor networks","authors":"P. Joyce, Beryl Princess","doi":"10.1109/ICGHPC.2013.6533935","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533935","url":null,"abstract":"Formal specifications have a variety of applications, including testing, maintenance, optimization, refactoring, documentation, and program repair. However, such specifications are difficult for human programmers to produce and verify manually, and existing automatic specification miners that discover two-state temporal properties have prohibitively high false positive rates, Wireless Sensor Networks are usually deployed at unattended or hostile environments. So they are very vulnerable to injecting false data attack. An adversary could compromise a sensor node accesses all stored keying materials and inject false data causing energy wasted in en-route nodes. In this paper, we propose En-Route Filtering Based Batch Verification (EFBV) scheme to find gang injecting false data attack and filter the false data. By batch verification of reports the false data can be identified and filtered easily. With the proposed mechanism, injected bogus data can be early detected and filtered by En-Route sensor nodes. Thus, it can be discover the intruder before it reaches the sink. The proposed EFBV scheme could be effectively saving energy and avoid sink overhead. It also makes possible to thwart the false data even if network contains at least one uncompromised neighboring node. The proposed scheme achieves most energy efficient, the high filtering probability, scalability and reliability, reduce traffic overhead.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131204107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Preserving national animal using wireless sensor network based hotspot algorithm 基于无线传感器网络的热点算法保护国家动物
Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533937
J. Anand, A. Jones, T. Sandhya, K. Besna
In recent years, ecological monitoring is given more importance to preserve the various species in the environment. Wildlife monitoring gradually progressed with the developments in Global Positioning System (GPS) and wireless sensor communication. In this paper, a study on our national animal reserves is made and reviewed papers related to animal tracking. Also the paper proposed an efficient monitoring approach for tigers using wireless sensor network based on hotspot algorithm to preserve the wild species. This system can be used by the ecologists to track and monitor various parameter of the wild species to preserve the habitats.
近年来,生态监测对保护环境中的各种物种越来越受到重视。随着全球定位系统(GPS)和无线传感器通信技术的发展,野生动物监测逐渐得到发展。本文对我国国家动物保护区进行了研究,并对动物追踪相关文献进行了综述。提出了一种基于热点算法的无线传感器网络对野生老虎进行有效监测的方法。该系统可用于生态学家跟踪和监测野生物种的各种参数,以保护栖息地。
{"title":"Preserving national animal using wireless sensor network based hotspot algorithm","authors":"J. Anand, A. Jones, T. Sandhya, K. Besna","doi":"10.1109/ICGHPC.2013.6533937","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533937","url":null,"abstract":"In recent years, ecological monitoring is given more importance to preserve the various species in the environment. Wildlife monitoring gradually progressed with the developments in Global Positioning System (GPS) and wireless sensor communication. In this paper, a study on our national animal reserves is made and reviewed papers related to animal tracking. Also the paper proposed an efficient monitoring approach for tigers using wireless sensor network based on hotspot algorithm to preserve the wild species. This system can be used by the ecologists to track and monitor various parameter of the wild species to preserve the habitats.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115209067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Performance analysis of OSPF and EIGRP routing protocols for greener internetworking 面向绿色互联的OSPF和EIGRP路由协议性能分析
Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533929
Y. Krishnan, G. Shobha
Routing protocol is taking a vital role in the modern internet era. A routing protocol determines how the routers communicate with each other to forward the packets by taking the optimal path to travel from a source node to a destination node. In this paper we have explored two eminent protocols namely, Enhanced Interior Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF) protocols. Evaluation of these routing protocols is performed based on the quantitative metrics such as Convergence Time, Jitter, End-to-End delay, Throughput and Packet Loss through the simulated network models. The evaluation results show that EIGRP routing protocol provides a better performance than OSPF routing protocol for real time applications. Through network simulations we have proved that EIGRP is more CPU intensive than OSPF and hence uses a lot of system power. Therefore EIGRP is a greener routing protocol and provides for greener internetworking.
路由协议在现代互联网时代起着至关重要的作用。路由协议决定了路由器之间的通信方式,通过从源节点到目的节点的最优路径来转发数据包。在本文中我们探讨了两个著名的协议,即增强型内部网关路由协议(EIGRP)和开放最短路径优先(OSPF)协议。通过模拟网络模型,基于收敛时间、抖动、端到端延迟、吞吐量和丢包等定量指标对这些路由协议进行了评估。评价结果表明,在实时应用中,EIGRP路由协议的性能优于OSPF路由协议。通过网络仿真,我们证明了EIGRP比OSPF占用更多的CPU资源,因此占用了大量的系统功率。因此,EIGRP是一种更环保的路由协议,并提供更环保的互连网络。
{"title":"Performance analysis of OSPF and EIGRP routing protocols for greener internetworking","authors":"Y. Krishnan, G. Shobha","doi":"10.1109/ICGHPC.2013.6533929","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533929","url":null,"abstract":"Routing protocol is taking a vital role in the modern internet era. A routing protocol determines how the routers communicate with each other to forward the packets by taking the optimal path to travel from a source node to a destination node. In this paper we have explored two eminent protocols namely, Enhanced Interior Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF) protocols. Evaluation of these routing protocols is performed based on the quantitative metrics such as Convergence Time, Jitter, End-to-End delay, Throughput and Packet Loss through the simulated network models. The evaluation results show that EIGRP routing protocol provides a better performance than OSPF routing protocol for real time applications. Through network simulations we have proved that EIGRP is more CPU intensive than OSPF and hence uses a lot of system power. Therefore EIGRP is a greener routing protocol and provides for greener internetworking.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115511261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Novel cascaded H-bridge multilevel inverter with harmonics elimination 新型级联h桥多电平消谐波逆变器
Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533923
K. Gobinath, S. Mahendran, I. Gnanambal
Multilevel inverter is one of the most recent and popular type of advances in power electronics. It synthesizes desired output voltage waveform from several dc sources used as input for the multilevel inverter. This paper presents the two techniques for improving the quality of the output voltage and efficiency. First, new novel topology for multilevel inverter is introduced which reduces the number of switches compared to other for the same level of output voltage. Second, Selective Harmonics Elimination Stepped Waveform (SHESW) method is implemented to eliminate the lower order harmonics. Fundamental switching scheme is used to control the power electronics switches in the inverter. The proposed topology is suitable for any number of levels. When the levels are increased the number of switches used is reduced compared to the conventional cascaded H-bridge multilevel inverter. This paper is particularly focuses on seven level inverter. In the proposed topology only 7 switches were used. The harmonic reduction is achieved by selecting appropriate switching angles. It shows hope to reduce initial cost and complexity hence it is apt for industrial applications. In this paper third and fifth level harmonics have been eliminated. Simulation work is done using the MATLAB software which validates the proposed method and finally THD comparison is presented for analysis.
多电平逆变器是电力电子领域最新和最流行的一种进步。它综合了多个直流源作为多电平逆变器输入的所需输出电压波形。本文介绍了提高输出电压质量和提高输出效率的两种技术。首先,介绍了一种新的多电平逆变器拓扑结构,在相同的输出电压水平下,与其他逆变器相比,该拓扑结构减少了开关数量。其次,采用选择性谐波消除阶跃波形(SHESW)方法消除低阶谐波;基本开关方案用于控制逆变器中的电力电子开关。所建议的拓扑结构适用于任意数量的级别。当电平增加时,与传统的级联h桥多电平逆变器相比,使用的开关数量减少。本文重点研究了七电平逆变器。在提出的拓扑中,只使用了7个交换机。通过选择合适的开关角来实现谐波抑制。它显示了降低初始成本和复杂性的希望,因此适合工业应用。本文消除了三阶和五阶谐波。利用MATLAB软件进行了仿真工作,验证了所提方法的有效性,最后进行了THD对比分析。
{"title":"Novel cascaded H-bridge multilevel inverter with harmonics elimination","authors":"K. Gobinath, S. Mahendran, I. Gnanambal","doi":"10.1109/ICGHPC.2013.6533923","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533923","url":null,"abstract":"Multilevel inverter is one of the most recent and popular type of advances in power electronics. It synthesizes desired output voltage waveform from several dc sources used as input for the multilevel inverter. This paper presents the two techniques for improving the quality of the output voltage and efficiency. First, new novel topology for multilevel inverter is introduced which reduces the number of switches compared to other for the same level of output voltage. Second, Selective Harmonics Elimination Stepped Waveform (SHESW) method is implemented to eliminate the lower order harmonics. Fundamental switching scheme is used to control the power electronics switches in the inverter. The proposed topology is suitable for any number of levels. When the levels are increased the number of switches used is reduced compared to the conventional cascaded H-bridge multilevel inverter. This paper is particularly focuses on seven level inverter. In the proposed topology only 7 switches were used. The harmonic reduction is achieved by selecting appropriate switching angles. It shows hope to reduce initial cost and complexity hence it is apt for industrial applications. In this paper third and fifth level harmonics have been eliminated. Simulation work is done using the MATLAB software which validates the proposed method and finally THD comparison is presented for analysis.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125248910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2013 International Conference on Green High Performance Computing (ICGHPC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1