首页 > 最新文献

2015 Communication, Control and Intelligent Systems (CCIS)最新文献

英文 中文
An application of SVM in character recognition with chain code 支持向量机在链码字符识别中的应用
Pub Date : 2015-11-01 DOI: 10.1109/CCINTELS.2015.7437901
Dipti Singh, Mohd. Aamir Khan, A. Bansal, Neha Bansal
Artificial intelligence, pattern recognition and computer vision has a significant importance in the field of electronics and image processing. Optical character recognition (OCR) is one of the main aspects of pattern recognition and has evolved greatly since its beginning. OCR is a system which recognized the readable characters from optical data and converts it into digital form. Various methodologies have been developed for this purpose using different approaches. In this paper, general architecture of modern OCR system with details of each module is discussed. We applied Moore neighborhood tracing for extracting boundary of characters and then chain rule for feature extraction. In the classification stage for character recognition, SVM is trained and is applied on suitable example.
人工智能、模式识别和计算机视觉在电子和图像处理领域具有重要意义。光学字符识别(OCR)是模式识别的主要方面之一,自诞生以来发展迅速。OCR是一种从光学数据中识别可读字符并将其转换为数字形式的系统。为此目的,使用不同的方法开发了各种方法。本文讨论了现代OCR系统的总体结构,并对各个模块进行了详细的讨论。采用摩尔邻域跟踪提取字符边界,然后采用链式法则提取特征。在字符识别的分类阶段,对支持向量机进行训练并应用于合适的实例。
{"title":"An application of SVM in character recognition with chain code","authors":"Dipti Singh, Mohd. Aamir Khan, A. Bansal, Neha Bansal","doi":"10.1109/CCINTELS.2015.7437901","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437901","url":null,"abstract":"Artificial intelligence, pattern recognition and computer vision has a significant importance in the field of electronics and image processing. Optical character recognition (OCR) is one of the main aspects of pattern recognition and has evolved greatly since its beginning. OCR is a system which recognized the readable characters from optical data and converts it into digital form. Various methodologies have been developed for this purpose using different approaches. In this paper, general architecture of modern OCR system with details of each module is discussed. We applied Moore neighborhood tracing for extracting boundary of characters and then chain rule for feature extraction. In the classification stage for character recognition, SVM is trained and is applied on suitable example.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124479011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
A low power high gain low noise amplifier for wireless applications 用于无线应用的低功率、高增益、低噪声放大器
Pub Date : 2015-11-01 DOI: 10.1109/CCINTELS.2015.7437941
P. K. Verma, P. Jain
This paper presents the design and simulation of low noise amplifier (LNA) for wireless applications operating in the 2.4-2.5 GHz band. In this paper inductive source degeneration topology has been used to provide low noise figure, high forward gain and low power consumption. The simulation was made using Advance Design System (ADS) software. Proposed work emphasis on reduction in noise figure with increase in power gain at low power consumption as compared to previous results at 1.2V power supply.
介绍了一种用于2.4-2.5 GHz频段无线应用的低噪声放大器(LNA)的设计与仿真。本文采用感应源退化拓扑结构,具有低噪声系数、高正向增益和低功耗的特点。采用先进设计系统(ADS)软件进行仿真。与之前在1.2V电源下的结果相比,建议的工作重点是在低功耗下降低噪声系数并增加功率增益。
{"title":"A low power high gain low noise amplifier for wireless applications","authors":"P. K. Verma, P. Jain","doi":"10.1109/CCINTELS.2015.7437941","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437941","url":null,"abstract":"This paper presents the design and simulation of low noise amplifier (LNA) for wireless applications operating in the 2.4-2.5 GHz band. In this paper inductive source degeneration topology has been used to provide low noise figure, high forward gain and low power consumption. The simulation was made using Advance Design System (ADS) software. Proposed work emphasis on reduction in noise figure with increase in power gain at low power consumption as compared to previous results at 1.2V power supply.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134250345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distributed Trust based Intrusion Detection approach in wireless sensor network 基于分布式信任的无线传感器网络入侵检测方法
Pub Date : 2015-11-01 DOI: 10.1109/CCINTELS.2015.7437886
A. Dhakne, P. Chatur
Security of wireless sensor network is always a major thing as it has widespread application in most of the major domains such as battlefield surveillance, healthcare, etc. Basically there are three main components that deal with security of wireless sensor network, prevention, detection and mitigation. But it is very difficult to prevent wireless sensor network always from malicious attacks so it is always important to detect them as early as possible so that we can react to the attack not harm to wireless sensor network., This paper proposes Distributed Trust based Intrusion Detection (DTBID) approach which considers several factors for establishing trust of sensor node. Most of the research work only considers the communication behavior to derive the trust. Our intrusion detection system will consider trust which is distributed among some other factors such as energy, reliability, data etc. We derive and formulate trust such as direct trust, recommendation trust, and indirect trust from these factors. We provide an approach to decide whether particular node is malicious node or not by comparing subjective trust derived from our intrusion detection technique to that of objective trust which is calculated based on the actual information of each node without considering any network dynamics such as node mobility, trust decay over time, and any malicious attacks. If there is a lot of difference between subjective trust derived from our model to that of objective trust then we consider sensor node as malicious node.
无线传感器网络在战场监视、医疗卫生等主要领域有着广泛的应用,其安全性一直是一个重要的问题。基本上,处理无线传感器网络的安全主要有三个组成部分:预防、检测和缓解。但是要防止无线传感器网络经常受到恶意攻击是非常困难的,因此及早发现恶意攻击,对无线传感器网络做出反应,不造成损害是非常重要的。提出了基于分布式信任的入侵检测(DTBID)方法,该方法考虑了多个因素来建立传感器节点的信任。大多数研究工作只考虑沟通行为来获得信任。我们的入侵检测系统将考虑分布在能量、可靠性、数据等因素中的信任。我们从这些因素中推导并形成了直接信任、推荐信任和间接信任。我们提供了一种判断特定节点是否为恶意节点的方法,该方法通过比较我们的入侵检测技术得出的主观信任与基于每个节点实际信息计算的客观信任,而不考虑任何网络动态(如节点移动、信任随时间衰减和任何恶意攻击)。如果从我们的模型中得到的主观信任与客观信任之间存在很大的差异,那么我们将传感器节点视为恶意节点。
{"title":"Distributed Trust based Intrusion Detection approach in wireless sensor network","authors":"A. Dhakne, P. Chatur","doi":"10.1109/CCINTELS.2015.7437886","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437886","url":null,"abstract":"Security of wireless sensor network is always a major thing as it has widespread application in most of the major domains such as battlefield surveillance, healthcare, etc. Basically there are three main components that deal with security of wireless sensor network, prevention, detection and mitigation. But it is very difficult to prevent wireless sensor network always from malicious attacks so it is always important to detect them as early as possible so that we can react to the attack not harm to wireless sensor network., This paper proposes Distributed Trust based Intrusion Detection (DTBID) approach which considers several factors for establishing trust of sensor node. Most of the research work only considers the communication behavior to derive the trust. Our intrusion detection system will consider trust which is distributed among some other factors such as energy, reliability, data etc. We derive and formulate trust such as direct trust, recommendation trust, and indirect trust from these factors. We provide an approach to decide whether particular node is malicious node or not by comparing subjective trust derived from our intrusion detection technique to that of objective trust which is calculated based on the actual information of each node without considering any network dynamics such as node mobility, trust decay over time, and any malicious attacks. If there is a lot of difference between subjective trust derived from our model to that of objective trust then we consider sensor node as malicious node.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130532483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Data transfer with the help of USB host controller without PC 数据传输与USB主机控制器的帮助下,无需PC机
Pub Date : 2015-11-01 DOI: 10.1109/CCINTELS.2015.7437955
Lalit, Anurag Sharma, A. Agarwal, V. Sharma, Amit Srivastava, Varun Maheshwari
USB data transfer is widely used in present scenario. But PC (Personal Computer)/Laptop is required to transfer USB data. It is not possible to carry PC/LAPTOP everywhere. In this paper we propose USB to USB data transfer without involving PC/LAPTOP. VDIP2 module with ATMEGA16 microcontroller is used for data transfer. The system is also capable for sending data on HyperTerminal for debugging. LCD (Liquid Crystal Display) is configured for displaying the result.
USB数据传输在目前的场景中被广泛使用。但需要PC(个人电脑)/笔记本电脑传输USB数据。随身携带个人电脑/手提电脑是不可能的。在本文中,我们提出USB到USB的数据传输不涉及PC/笔记本电脑。采用ATMEGA16微控制器的VDIP2模块进行数据传输。系统还支持在超级终端上发送数据,以便调试。LCD(液晶显示器)配置显示结果。
{"title":"Data transfer with the help of USB host controller without PC","authors":"Lalit, Anurag Sharma, A. Agarwal, V. Sharma, Amit Srivastava, Varun Maheshwari","doi":"10.1109/CCINTELS.2015.7437955","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437955","url":null,"abstract":"USB data transfer is widely used in present scenario. But PC (Personal Computer)/Laptop is required to transfer USB data. It is not possible to carry PC/LAPTOP everywhere. In this paper we propose USB to USB data transfer without involving PC/LAPTOP. VDIP2 module with ATMEGA16 microcontroller is used for data transfer. The system is also capable for sending data on HyperTerminal for debugging. LCD (Liquid Crystal Display) is configured for displaying the result.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131267480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intelligent cooling system for three level inverter 三电平逆变器智能冷却系统
Pub Date : 2015-11-01 DOI: 10.1109/CCINTELS.2015.7437925
A. Deep, Jyoti Singh, Y. Narayan, S. Chatterji, L. Mathew
Three level inverter system produce voltage which consists of three different possible values. Inverter can be used to interface renewable energy sources with the grid. Temperature has significant effect on performance of power MOSFETs. Typically, MOSFET is used as power switch in such applications as it produce heat during operation, and the heat energy dissipated by these components must be carefully controlled if operating temperatures are to be maintained. So for the system to work efficiently, an intelligent cooling of MOSFET is required. This paper proposes an intelligent cooling for three level H-bridge inverter. The system consists of MOSFETs, LM 35 temperature sensor, Opto-couplers. Arduino is used to give trigger pulses to MOSFETs and control the on-off operation of fan. When temperature goes above the predefined level, fan turns on to cool the MOSFETs.
三电平逆变器系统产生的电压由三个不同的可能值组成。逆变器可用于连接可再生能源与电网。温度对功率mosfet的性能有重要影响。通常,MOSFET在这样的应用中用作电源开关,因为它在工作过程中产生热量,如果要保持工作温度,必须仔细控制这些组件散发的热能。因此,为了使系统高效工作,需要对MOSFET进行智能冷却。提出了一种三电平h桥逆变器的智能冷却方案。该系统由mosfet、lm35温度传感器、光耦合器组成。利用Arduino为mosfet提供触发脉冲,控制风扇的通断操作。当温度高于预定义水平时,风扇打开以冷却mosfet。
{"title":"Intelligent cooling system for three level inverter","authors":"A. Deep, Jyoti Singh, Y. Narayan, S. Chatterji, L. Mathew","doi":"10.1109/CCINTELS.2015.7437925","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437925","url":null,"abstract":"Three level inverter system produce voltage which consists of three different possible values. Inverter can be used to interface renewable energy sources with the grid. Temperature has significant effect on performance of power MOSFETs. Typically, MOSFET is used as power switch in such applications as it produce heat during operation, and the heat energy dissipated by these components must be carefully controlled if operating temperatures are to be maintained. So for the system to work efficiently, an intelligent cooling of MOSFET is required. This paper proposes an intelligent cooling for three level H-bridge inverter. The system consists of MOSFETs, LM 35 temperature sensor, Opto-couplers. Arduino is used to give trigger pulses to MOSFETs and control the on-off operation of fan. When temperature goes above the predefined level, fan turns on to cool the MOSFETs.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124539847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy efficient protocol for mobile Wireless Sensor Networks 移动无线传感器网络的节能协议
Pub Date : 2015-11-01 DOI: 10.1109/CCINTELS.2015.7437883
Mritunjay Kumar Chourasia, Manish Panchal, Anurag Shrivastav
In Wireless Sensor Network (WSN) energy is the main concern while designing a WSN protocol. Clustering is one of the process to minimize the energy consumption in WSN. Local election of clustering head (CH) requires many communications such as hello message, advertising their chances and fuzzy logic process requires many CPU cycles, high power microcontrollers, high capacity of memories which increase the cost and reduces amount of energy of the sensor nodes. To conserve the energy in WSN when node is near to the base station, direct communication is far better than clustering technique and when node is far away from the base station, clustering is better choice than direct communication. In this paper, both direct communication and clustering techniques are considered and fuzzy logic is used at base station to elect cluster head directly. Direct communication along with cluster head election using fuzzy logic technique have been adopted in this paper in order to amount of energy consumption. Proposed algorithm has been compared with LEACH and SEP protocol. Simulation results shows that this proposed algorithm performs better than LEACH and SEP in terms of energy saving as well as network lifetime for wireless sensor networks as well as for mobile communication.
在无线传感器网络(WSN)中,能量是设计WSN协议时主要考虑的问题。聚类是无线传感器网络中能量消耗最小的过程之一。簇头的局部选择(CH)需要大量的通信,如hello消息,通告它们的机会,模糊逻辑处理需要大量的CPU周期,高功率微控制器,高容量存储器,这增加了传感器节点的成本和减少了能量。当节点离基站较近时,直接通信技术远优于聚类技术;当节点离基站较远时,聚类技术优于直接通信技术。本文综合考虑了直接通信技术和聚类技术,在基站上采用模糊逻辑直接选举簇首。为了减少能耗,本文采用了直接通信和模糊逻辑簇头选举技术。将该算法与LEACH协议和SEP协议进行了比较。仿真结果表明,该算法在无线传感器网络和移动通信中,在节能和网络寿命方面都优于LEACH和SEP算法。
{"title":"Energy efficient protocol for mobile Wireless Sensor Networks","authors":"Mritunjay Kumar Chourasia, Manish Panchal, Anurag Shrivastav","doi":"10.1109/CCINTELS.2015.7437883","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437883","url":null,"abstract":"In Wireless Sensor Network (WSN) energy is the main concern while designing a WSN protocol. Clustering is one of the process to minimize the energy consumption in WSN. Local election of clustering head (CH) requires many communications such as hello message, advertising their chances and fuzzy logic process requires many CPU cycles, high power microcontrollers, high capacity of memories which increase the cost and reduces amount of energy of the sensor nodes. To conserve the energy in WSN when node is near to the base station, direct communication is far better than clustering technique and when node is far away from the base station, clustering is better choice than direct communication. In this paper, both direct communication and clustering techniques are considered and fuzzy logic is used at base station to elect cluster head directly. Direct communication along with cluster head election using fuzzy logic technique have been adopted in this paper in order to amount of energy consumption. Proposed algorithm has been compared with LEACH and SEP protocol. Simulation results shows that this proposed algorithm performs better than LEACH and SEP in terms of energy saving as well as network lifetime for wireless sensor networks as well as for mobile communication.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124747939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Implementation of solar based PWM fed two phase interleaved boost converter 基于太阳能PWM馈电的两相交错升压变换器的实现
Pub Date : 2015-11-01 DOI: 10.1109/CCINTELS.2015.7437962
Ritu, Nitin Verma, Shilpa Mishra, S. Shukla
Renewable energy plays a dominant role in electricity production with the increase in global warning. Advantages like ENVIRONMENTAL friendliness, expandability and flexibility have made its wider application. Nowadays, step up power conversion is widely used in many applications and power capability demands. The applications of step up power conversion may be seen in electric vehicles, photovoltaic (PV) system, uninterruptable power supplies (UPS), and fuel cell power system. Boost converter is one type of DC-DC step up power converter. Step up power converters is quite popular because it can produce higher DC voltage output from low voltage input. In this paper, the analysis of interleaved boost converter is done by controlling with interleaved switching signals, which are having same switching frequency but shifted in phase. By utilizing the parallel operation of converters, the input current can be shared among the inductors so that high reliability and efficiency in power electronic systems can be obtained. Simulation study for PWM fed two phases IBC for solar cell has been implemented using MATLAB/ SIMULINK. The simulation results show the reduction in ripple quantity up to zero, which makes the operation of IBC to be more reliable and stable when it is utilized with solar cell.
随着全球变暖的加剧,可再生能源在电力生产中占据主导地位。环境友好、可扩展性和灵活性等优点使其得到了更广泛的应用。目前,升压功率转换被广泛应用于许多应用和功率容量需求中。升压电源转换在电动汽车、光伏(PV)系统、不间断电源(UPS)和燃料电池电源系统中都有应用。升压变换器是DC-DC升压变换器的一种。升压电源变换器是相当受欢迎的,因为它可以从低电压输入产生更高的直流电压输出。本文采用具有相同开关频率但相移的交错开关信号进行控制,对交错升压变换器进行分析。利用变流器并联工作,可以使输入电流在各电感之间共享,从而提高电力电子系统的可靠性和效率。利用MATLAB/ SIMULINK对太阳能电池PWM馈电两相IBC进行了仿真研究。仿真结果表明,该系统的纹波量减小至零,使IBC与太阳能电池配合使用时运行更加可靠和稳定。
{"title":"Implementation of solar based PWM fed two phase interleaved boost converter","authors":"Ritu, Nitin Verma, Shilpa Mishra, S. Shukla","doi":"10.1109/CCINTELS.2015.7437962","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437962","url":null,"abstract":"Renewable energy plays a dominant role in electricity production with the increase in global warning. Advantages like ENVIRONMENTAL friendliness, expandability and flexibility have made its wider application. Nowadays, step up power conversion is widely used in many applications and power capability demands. The applications of step up power conversion may be seen in electric vehicles, photovoltaic (PV) system, uninterruptable power supplies (UPS), and fuel cell power system. Boost converter is one type of DC-DC step up power converter. Step up power converters is quite popular because it can produce higher DC voltage output from low voltage input. In this paper, the analysis of interleaved boost converter is done by controlling with interleaved switching signals, which are having same switching frequency but shifted in phase. By utilizing the parallel operation of converters, the input current can be shared among the inductors so that high reliability and efficiency in power electronic systems can be obtained. Simulation study for PWM fed two phases IBC for solar cell has been implemented using MATLAB/ SIMULINK. The simulation results show the reduction in ripple quantity up to zero, which makes the operation of IBC to be more reliable and stable when it is utilized with solar cell.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125443995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Triple band U-slot microstrip patch antenna for WLAN and wireless sensor applications 三波段u槽微带贴片天线,用于WLAN和无线传感器应用
Pub Date : 2015-11-01 DOI: 10.1109/CCINTELS.2015.7437866
D. Meena, R. Meena
A novel Triple band U-slot microstrip patch antenna is presented in this paper. U-slot technique is used to get the wide band width at three selected frequencies. The structure proposed antenna is different from conventional microstrip patch antenna. In this paper the structure is designed on FR-4 substrate, using CST Microwave studio, simulated return loss is greater than 10 dB at center frequencies 5.59 GHz, 6.1 GHz and 6.8 GHz. The return loss is achieved 30dB, 15dB and 36.8 dB at center frequencies 5.59 GHz, 6.1 GHz and 6.8 GHz respectively. The substrate height is 1.99mm and dielectric constant is 4.4. Good enough for WLAN at 5.59GHz and second & third band used for wireless sensor applications.
提出了一种新型的三波段u型槽微带贴片天线。u型槽技术用于在三个选定的频率上获得宽带宽度。该天线的结构不同于传统的微带贴片天线。本文在FR-4衬底上设计了该结构,利用CST微波工作室,在中心频率5.59 GHz、6.1 GHz和6.8 GHz处模拟回波损耗均大于10 dB。在5.59 GHz、6.1 GHz和6.8 GHz中心频率下,回波损耗分别达到30dB、15dB和36.8 dB。衬底高度为1.99mm,介电常数为4.4。足以适用于5.59GHz的WLAN和用于无线传感器应用的第二和第三频段。
{"title":"Triple band U-slot microstrip patch antenna for WLAN and wireless sensor applications","authors":"D. Meena, R. Meena","doi":"10.1109/CCINTELS.2015.7437866","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437866","url":null,"abstract":"A novel Triple band U-slot microstrip patch antenna is presented in this paper. U-slot technique is used to get the wide band width at three selected frequencies. The structure proposed antenna is different from conventional microstrip patch antenna. In this paper the structure is designed on FR-4 substrate, using CST Microwave studio, simulated return loss is greater than 10 dB at center frequencies 5.59 GHz, 6.1 GHz and 6.8 GHz. The return loss is achieved 30dB, 15dB and 36.8 dB at center frequencies 5.59 GHz, 6.1 GHz and 6.8 GHz respectively. The substrate height is 1.99mm and dielectric constant is 4.4. Good enough for WLAN at 5.59GHz and second & third band used for wireless sensor applications.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115685078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Phase-based reconfiguration of level one cache for single-core processors without affecting second level cache 在不影响二级缓存的情况下,对单核处理器的一级缓存进行基于阶段的重新配置
Pub Date : 2015-11-01 DOI: 10.1109/CCINTELS.2015.7437953
Avinash Kumar
Caches are configured at design time in such a way so as to produce a low average memory access time across a wide range of applications. This may result in a poor performance, because effectively, no single specific cache architecture can complement with the application's innate requirements over a wide range of applications. Also an application follows a unique sequence of patterns during its execution. These patterns called phases repeats themselves periodically. Some phases are stable and extend for billions of instructions. These stable phases constitute the majority of the applications' execution. In this paper, a novel reconfigurable architecture is designed for caches which dynamically discerns these phases and configures the caches based on the throughput. For the reconfiguration of the caches, we have proposed the change in its associativity while keeping the size constant. This change in associativity is made for the first level cache and is concluded that a decrease in associativity at the first level cache does not result in any increase in the cache misses at the second level cache. For this, we delineate the behavior of the level one cache misses which occurs because of the change in the associativity and confine these misses well within the second level cache. As a consequence we have successfully come up with a simple equation which arbitrates the threshold value for the cache reconfiguration decision. This decision for the threshold value is a contingent on the actual running time of the application and hence does not need to be trained for each application separately.
在设计时以这样一种方式配置缓存,以便在广泛的应用程序中产生较低的平均内存访问时间。这可能导致较差的性能,因为实际上,没有一个特定的缓存体系结构可以在广泛的应用程序中补充应用程序的固有需求。此外,应用程序在执行过程中遵循唯一的模式序列。这些被称为阶段的模式周期性地重复自己。有些阶段是稳定的,可以延续数十亿条指令。这些稳定阶段构成了应用程序执行的大部分。本文设计了一种新的可重构缓存架构,可以动态识别这些阶段,并根据吞吐量对缓存进行配置。对于缓存的重新配置,我们建议在保持大小不变的情况下改变其结合性。这种关联性的变化是针对第一级缓存进行的,并且得出的结论是,第一级缓存的关联性降低不会导致第二级缓存的缓存缺失增加。为此,我们描述了由于结合性变化而发生的第一级缓存缺失的行为,并将这些缺失很好地限制在第二级缓存中。因此,我们成功地提出了一个简单的方程,它可以仲裁缓存重新配置决策的阈值。阈值的决定取决于应用程序的实际运行时间,因此不需要为每个应用程序单独训练。
{"title":"Phase-based reconfiguration of level one cache for single-core processors without affecting second level cache","authors":"Avinash Kumar","doi":"10.1109/CCINTELS.2015.7437953","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437953","url":null,"abstract":"Caches are configured at design time in such a way so as to produce a low average memory access time across a wide range of applications. This may result in a poor performance, because effectively, no single specific cache architecture can complement with the application's innate requirements over a wide range of applications. Also an application follows a unique sequence of patterns during its execution. These patterns called phases repeats themselves periodically. Some phases are stable and extend for billions of instructions. These stable phases constitute the majority of the applications' execution. In this paper, a novel reconfigurable architecture is designed for caches which dynamically discerns these phases and configures the caches based on the throughput. For the reconfiguration of the caches, we have proposed the change in its associativity while keeping the size constant. This change in associativity is made for the first level cache and is concluded that a decrease in associativity at the first level cache does not result in any increase in the cache misses at the second level cache. For this, we delineate the behavior of the level one cache misses which occurs because of the change in the associativity and confine these misses well within the second level cache. As a consequence we have successfully come up with a simple equation which arbitrates the threshold value for the cache reconfiguration decision. This decision for the threshold value is a contingent on the actual running time of the application and hence does not need to be trained for each application separately.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126037391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prefetching web pages for improving user access latency using integrated Web Usage Mining 使用集成的web Usage Mining预取网页以改善用户访问延迟
Pub Date : 2015-11-01 DOI: 10.1109/CCINTELS.2015.7437949
Praveen Kumar, Sanchita Kadambari, S. Rawat
The tremendous growth of web has resulted in overloaded servers and network congestion. Millions of users access the internet simultaneously and limited bandwidth causes a bottleneck to improved service. Fast response time is essential to keep the users at bay and thus techniques need to be improvised to reduce the latency of accessing web pages. Web caching, in this regard, offers an effective solution by temporarily storing files nearby, thereby reducing the access time, but limits the system to an extent. A more powerful solution, web prefetching, has been devised, that fetches pages in advance, further reducing the access latency. Numerous solutions to web prefetching have been proposed in the past, integrating various web and data mining techniques. In this paper, the techniques of Web Usage Mining have been integrated for analyzing the proxy server logs, to get an insight into the user access patterns and generate rules. Link analysis method has been proposed to be integrated with these rules in order to rank the pages to be prefetched.
web的飞速发展导致了服务器过载和网络拥塞。数以百万计的用户同时访问互联网,有限的带宽成为改进服务的瓶颈。快速响应时间对于保持用户的安全至关重要,因此需要临时制定技术来减少访问网页的延迟。在这方面,Web缓存提供了一种有效的解决方案,它将文件临时存储在附近,从而减少了访问时间,但在一定程度上限制了系统。一个更强大的解决方案,网页预取,已经被设计出来,提前获取页面,进一步减少访问延迟。过去已经提出了许多web预取的解决方案,这些解决方案集成了各种web和数据挖掘技术。本文结合Web Usage Mining技术对代理服务器日志进行分析,了解用户访问模式并生成规则。为了对需要预取的页面进行排序,提出了一种与这些规则相结合的链接分析方法。
{"title":"Prefetching web pages for improving user access latency using integrated Web Usage Mining","authors":"Praveen Kumar, Sanchita Kadambari, S. Rawat","doi":"10.1109/CCINTELS.2015.7437949","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437949","url":null,"abstract":"The tremendous growth of web has resulted in overloaded servers and network congestion. Millions of users access the internet simultaneously and limited bandwidth causes a bottleneck to improved service. Fast response time is essential to keep the users at bay and thus techniques need to be improvised to reduce the latency of accessing web pages. Web caching, in this regard, offers an effective solution by temporarily storing files nearby, thereby reducing the access time, but limits the system to an extent. A more powerful solution, web prefetching, has been devised, that fetches pages in advance, further reducing the access latency. Numerous solutions to web prefetching have been proposed in the past, integrating various web and data mining techniques. In this paper, the techniques of Web Usage Mining have been integrated for analyzing the proxy server logs, to get an insight into the user access patterns and generate rules. Link analysis method has been proposed to be integrated with these rules in order to rank the pages to be prefetched.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128416670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2015 Communication, Control and Intelligent Systems (CCIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1