首页 > 最新文献

2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)最新文献

英文 中文
ANFIS based kinematic analysis of a 4-DOFs SCARA robot 基于ANFIS的四自由度SCARA机器人运动学分析
Jyotindra Narayan, A. Singla
Robot kinematics plays a crucial role in recent advancements within industrial sectors and numerous medical applications. Finding forward kinematics, using DH convention is an easy task. As compared to forward kinematics, finding the inverse kinematics solution is far more challenging problem, especially when degrees-of-freedom (DOFs) are more. That is why; there is no general solution to the inverse kinematic problem of a given serial manipulator. This led to the development of alternate technique like fuzzy inference system (FIS) and neural network approach (NNA). This paper uses the combination of above two techniques, called as adaptive neuro fuzzy inference system (ANFIS), along with Gaussian membership function, in order to address the kinematic analysis of a 4-DOFs SCARA robot. The inverse kinematic solutions obtained using ANFIS are further utilized for desired path generation by the SCARA robot. Further, the complete analytical solution is developed in MATLAB environment for the validation purpose. It has been demonstrated with simulation runs that ANFIS results are satisfactory and are found in close approximation with analytical solutions.
机器人运动学在工业部门和众多医疗应用的最新进展中起着至关重要的作用。求正运动学,使用DH约定是一个简单的任务。与正运动学相比,寻找逆运动学解是一个更具挑战性的问题,特别是当自由度(dof)更多时。这就是为什么;对于给定的串联机械臂的运动学逆问题,不存在一般解。这导致了模糊推理系统(FIS)和神经网络方法(NNA)等替代技术的发展。本文将上述两种技术相结合,称为自适应神经模糊推理系统(ANFIS),并结合高斯隶属函数,以解决4自由度SCARA机器人的运动学分析问题。利用ANFIS得到的运动学逆解进一步用于SCARA机器人的期望路径生成。并在MATLAB环境下开发了完整的解析解,用于验证。仿真结果表明,ANFIS计算结果令人满意,且与解析解非常接近。
{"title":"ANFIS based kinematic analysis of a 4-DOFs SCARA robot","authors":"Jyotindra Narayan, A. Singla","doi":"10.1109/ISPCC.2017.8269676","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269676","url":null,"abstract":"Robot kinematics plays a crucial role in recent advancements within industrial sectors and numerous medical applications. Finding forward kinematics, using DH convention is an easy task. As compared to forward kinematics, finding the inverse kinematics solution is far more challenging problem, especially when degrees-of-freedom (DOFs) are more. That is why; there is no general solution to the inverse kinematic problem of a given serial manipulator. This led to the development of alternate technique like fuzzy inference system (FIS) and neural network approach (NNA). This paper uses the combination of above two techniques, called as adaptive neuro fuzzy inference system (ANFIS), along with Gaussian membership function, in order to address the kinematic analysis of a 4-DOFs SCARA robot. The inverse kinematic solutions obtained using ANFIS are further utilized for desired path generation by the SCARA robot. Further, the complete analytical solution is developed in MATLAB environment for the validation purpose. It has been demonstrated with simulation runs that ANFIS results are satisfactory and are found in close approximation with analytical solutions.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127695522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Hybrid improved technique for data security and authentication for RFID tags RFID标签数据安全与认证的混合改进技术
Anand Sharma, Amardeep Singh
In the modern era, the internet of things are gaining lot of attention because its provides a connecting of all devices with the internet. The users can access the all devices wirelessly from anywhere. The internet is public available network, anyone access the network. So, to provide the user's security and privacy data security and authentication is required. To provide security cryptography algorithms used but the limitation is that the standard algorithms which are approved by NIST such as AES large block, key size, and memory consumable and their performance not up to mark in resource constraint devices. In this paper, a hybrid lightweight improved technique is proposed for data security and authentication for RFID tags. The performance analysis for the proposed technique is done and compare with the existing algorithm. The result shows that the hybrid technique resolve brute force, linear and differential cryptanalysis attacks.
在现代,物联网越来越受到人们的关注,因为它提供了所有设备与互联网的连接。用户可以从任何地方无线访问所有设备。因特网是公共可用的网络,任何人都可以访问这个网络。因此,为了提供用户的安全性和隐私性,需要数据的安全性和身份验证。为了提供安全性,使用了加密算法,但其局限性是NIST认可的AES等标准算法块大、密钥大小大、内存消耗大,在资源受限的设备上性能达不到要求。本文提出了一种用于RFID标签数据安全和认证的混合轻量级改进技术。对该算法进行了性能分析,并与现有算法进行了比较。结果表明,该混合技术解决了暴力破解、线性和差分密码分析攻击。
{"title":"Hybrid improved technique for data security and authentication for RFID tags","authors":"Anand Sharma, Amardeep Singh","doi":"10.1109/ISPCC.2017.8269737","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269737","url":null,"abstract":"In the modern era, the internet of things are gaining lot of attention because its provides a connecting of all devices with the internet. The users can access the all devices wirelessly from anywhere. The internet is public available network, anyone access the network. So, to provide the user's security and privacy data security and authentication is required. To provide security cryptography algorithms used but the limitation is that the standard algorithms which are approved by NIST such as AES large block, key size, and memory consumable and their performance not up to mark in resource constraint devices. In this paper, a hybrid lightweight improved technique is proposed for data security and authentication for RFID tags. The performance analysis for the proposed technique is done and compare with the existing algorithm. The result shows that the hybrid technique resolve brute force, linear and differential cryptanalysis attacks.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116428758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel localized approach for efficient delivery of software products 有效交付软件产品的一种新颖的本地化方法
Diksha Hooda, Rinkle Rani
Software Delivery accounts a considerable premium to an organization. It provides a definition to the fundamental expertise and the core competitiveness. An efficient approach towards software delivery paves the way to overpower competitive risks. The major challenges faced during the process of software delivery include bandwidth limitation, poor performance, delivery time, and economics of distribution and handling uncertainties at various levels of delivery. The problem is aggravated with increase in the size of the package delivery that is to be delivered. This paper provides a novel approach for efficient software delivery to the requesters which cuts in the chances of poor performance due to bandwidth issues. The approach provides an algorithm that simplifies the delivery for software products that are heavier in terms of size. It is a local tooling process which has an upper hand over the traditional centralized portal where all the software delivery requests are directed. The localized tooling methodology ensures safety of the product by encryption techniques. As a result of the request made by the end user, the tool packages the encrypted form of the product with an installing agent and prepares it to be transferred over the network. At the receiver's end, the package is downloaded and extracted with the help of the environment setup of the launching agent installed at the user's end.
软件交付对组织来说是一笔可观的费用。它提供了一个定义的基本专业知识和核心竞争力。有效的软件交付方法为克服竞争风险铺平了道路。在软件交付过程中面临的主要挑战包括带宽限制、糟糕的性能、交付时间,以及在不同交付级别上分发和处理不确定性的经济性。这个问题随着将要交付的包裹尺寸的增加而加剧。本文提供了一种新颖的方法,可以有效地向请求者交付软件,从而减少由于带宽问题而导致性能低下的机会。该方法提供了一种算法,可以简化在大小方面较重的软件产品的交付。它是一个本地工具过程,比所有软件交付请求都指向的传统集中式门户具有优势。本地化的工具方法通过加密技术确保产品的安全性。根据最终用户的请求,该工具将产品的加密形式与安装代理一起打包,并准备通过网络传输。在接收者端,在用户端安装的启动代理的环境设置的帮助下下载并提取包。
{"title":"A novel localized approach for efficient delivery of software products","authors":"Diksha Hooda, Rinkle Rani","doi":"10.1109/ISPCC.2017.8269672","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269672","url":null,"abstract":"Software Delivery accounts a considerable premium to an organization. It provides a definition to the fundamental expertise and the core competitiveness. An efficient approach towards software delivery paves the way to overpower competitive risks. The major challenges faced during the process of software delivery include bandwidth limitation, poor performance, delivery time, and economics of distribution and handling uncertainties at various levels of delivery. The problem is aggravated with increase in the size of the package delivery that is to be delivered. This paper provides a novel approach for efficient software delivery to the requesters which cuts in the chances of poor performance due to bandwidth issues. The approach provides an algorithm that simplifies the delivery for software products that are heavier in terms of size. It is a local tooling process which has an upper hand over the traditional centralized portal where all the software delivery requests are directed. The localized tooling methodology ensures safety of the product by encryption techniques. As a result of the request made by the end user, the tool packages the encrypted form of the product with an installing agent and prepares it to be transferred over the network. At the receiver's end, the package is downloaded and extracted with the help of the environment setup of the launching agent installed at the user's end.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"384 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124769159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance estimation of junctionless FinFET with graded channel design 梯度通道设计无结FinFET的性能评估
S. Kaundal, Shelja Kaushal, A. Rana
This paper investigates the Junctionless (JL) FinFET with laterally graded channel and differentially graded channel design using TCAD simulation. It is demonstrated that differentially graded-JL FinFET (DG-JL FinFET) provides better subthreshold characteristics as compared to laterally graded-JL FinFET (LG-JL FinFET) and conventional uniformly doped-JL FinFET (UD-JL FinFET). However, the drive current is higher in LD-JL FinFET.
本文利用TCAD仿真研究了具有横向梯度通道和差分梯度通道的无结FinFET设计。结果表明,与横向梯度jl FinFET (LG-JL FinFET)和常规均匀掺杂jl FinFET (UD-JL FinFET)相比,差分梯度jl FinFET (DG-JL FinFET)具有更好的亚阈值特性。然而,在LD-JL FinFET中驱动电流更高。
{"title":"Performance estimation of junctionless FinFET with graded channel design","authors":"S. Kaundal, Shelja Kaushal, A. Rana","doi":"10.1109/ISPCC.2017.8269706","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269706","url":null,"abstract":"This paper investigates the Junctionless (JL) FinFET with laterally graded channel and differentially graded channel design using TCAD simulation. It is demonstrated that differentially graded-JL FinFET (DG-JL FinFET) provides better subthreshold characteristics as compared to laterally graded-JL FinFET (LG-JL FinFET) and conventional uniformly doped-JL FinFET (UD-JL FinFET). However, the drive current is higher in LD-JL FinFET.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"443 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123963903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A new flower pollination based task scheduling algorithm in cloud environment 云环境下基于花授粉的任务调度算法
Jaspinder Kaur, B. Sidhu
Cloud Computing is in demand now a days as it provides reliable, scalable and economical IT operations. As the scale of the cloud computing is increasing the need of an efficient scheduling algorithm for an effecting management of resources is also becoming crucial. Scheduling problem in cloud is NP-hard problem. Meta-heuristic approaches have been very useful in providing near optimal solution to the scheduling problem. In this paper a new approach for Task Scheduling using Flower Pollination Algorithm (TSFPA) has been introduced to allocate resources to task. The objective of this proposed algorithm is to minimize the makespan. The performance of the proposed algorithm has been compared with genetic algorithm (GA), first come first serve (FCFS) and round robin (RR) approach of scheduling using Cloudsim toolkit. Simulation results showed that performance of TSFPA is better than GA, RR and FCFS in terms of makespan.
由于云计算提供了可靠、可扩展和经济的it操作,因此现在对它的需求很大。随着云计算规模的不断扩大,对有效管理资源的高效调度算法的需求也变得至关重要。云计算中的调度问题是np困难问题。元启发式方法在为调度问题提供近似最优解方面非常有用。本文提出了一种利用花授粉算法(TSFPA)为任务分配资源的任务调度方法。该算法的目标是最小化最大完工时间。将该算法的性能与遗传算法(GA)、先到先服务(FCFS)和使用Cloudsim工具包的轮询调度(RR)方法进行了比较。仿真结果表明,TSFPA在makespan方面的性能优于GA、RR和FCFS。
{"title":"A new flower pollination based task scheduling algorithm in cloud environment","authors":"Jaspinder Kaur, B. Sidhu","doi":"10.1109/ISPCC.2017.8269722","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269722","url":null,"abstract":"Cloud Computing is in demand now a days as it provides reliable, scalable and economical IT operations. As the scale of the cloud computing is increasing the need of an efficient scheduling algorithm for an effecting management of resources is also becoming crucial. Scheduling problem in cloud is NP-hard problem. Meta-heuristic approaches have been very useful in providing near optimal solution to the scheduling problem. In this paper a new approach for Task Scheduling using Flower Pollination Algorithm (TSFPA) has been introduced to allocate resources to task. The objective of this proposed algorithm is to minimize the makespan. The performance of the proposed algorithm has been compared with genetic algorithm (GA), first come first serve (FCFS) and round robin (RR) approach of scheduling using Cloudsim toolkit. Simulation results showed that performance of TSFPA is better than GA, RR and FCFS in terms of makespan.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116805412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hybrid artificial neural network for data classification problem 混合人工神经网络的数据分类问题
Jaspreet Kaur, Ashima Kalra
The benchmarking databases for artificial neural network (ANN) include several datasets from several different domains. All datasets exhibit feasible problems which could be called diagnosis jobs and all but one contain genuine world data. Two such standard problems, for categorization are taken in this paper to analyze the capability of intelligent water drop (IWD), particle swarm optimization (PSO) and hybrid IWD-PSO with ANN. In this work, SI algorithm is tested on a set of two benchmark functions. Further a comparison is made between Swarm intelligence algorithm-ANN in terms of sum square error, Elapsed time. The research is chosen for finding primary weights and biases for an artificial neural network. The amalgamation of swarm intelligence (SI) optimization and ANN greatly help in quick convergence of ANN in classification to various benchmark problems. The result shows that utilization of swarm intelligence minimizes the classification error.
人工神经网络(ANN)的基准数据库包括来自不同领域的多个数据集。所有的数据集都显示出可行的问题,这些问题可以被称为诊断工作,除了一个之外,所有的数据集都包含真实的世界数据。本文以这两个分类标准问题为例,分析了智能水滴(IWD)、粒子群优化(PSO)和混合粒子群-粒子群优化(IWD -PSO)与神经网络的分类能力。在这项工作中,SI算法在一组两个基准函数上进行了测试。并从平方和误差、运行时间等方面对群智能算法与人工神经网络进行了比较。该研究被用于寻找人工神经网络的主要权重和偏差。将群智能优化与人工神经网络相结合,极大地促进了人工神经网络在分类中对各种基准问题的快速收敛。结果表明,利用群体智能使分类误差最小化。
{"title":"Hybrid artificial neural network for data classification problem","authors":"Jaspreet Kaur, Ashima Kalra","doi":"10.1109/ISPCC.2017.8269651","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269651","url":null,"abstract":"The benchmarking databases for artificial neural network (ANN) include several datasets from several different domains. All datasets exhibit feasible problems which could be called diagnosis jobs and all but one contain genuine world data. Two such standard problems, for categorization are taken in this paper to analyze the capability of intelligent water drop (IWD), particle swarm optimization (PSO) and hybrid IWD-PSO with ANN. In this work, SI algorithm is tested on a set of two benchmark functions. Further a comparison is made between Swarm intelligence algorithm-ANN in terms of sum square error, Elapsed time. The research is chosen for finding primary weights and biases for an artificial neural network. The amalgamation of swarm intelligence (SI) optimization and ANN greatly help in quick convergence of ANN in classification to various benchmark problems. The result shows that utilization of swarm intelligence minimizes the classification error.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115426418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Prevention of denial of service attack over vehicle ad hoc networks using quick response table 基于快速响应表的车辆自组织网络拒绝服务攻击预防
P. Waraich, N. Batra
Secure routing over VANET is a major issue due to its high mobility environment. Due to dynamic topology, routes are frequently updated and also suffers from link breaks due to the obstacles i.e. buildings, tunnels and bridges etc. Frequent link breaks can cause packet drop and thus result in degradation of network performance. In case of VANETs, it becomes very difficult to identify the reason of the packet drop as it can also occur due to the presence of a security threat. VANET is a type of wireless adhoc network and suffer from common attacks which exist for mobile adhoc network (MANET) i.e. Denial of Services (DoS), Black hole, Gray hole and Sybil attack etc. Researchers have already developed various security mechanisms for secure routing over MANET but these solutions are not fully compatible with unique attributes of VANET i.e. vehicles can communicate with each other (V2V) as well as communication can be initiated with infrastructure based network (V2I). In order to secure the routing for both types of communication, there is need to develop a solution. In this paper, a method for secure routing is introduced which can identify as well as eliminate the existing security threat.
由于VANET的高移动性环境,安全路由是一个主要问题。由于动态拓扑结构,路线经常更新,并且由于建筑物,隧道和桥梁等障碍物而遭受链路中断。频繁的链路中断会导致丢包,从而导致网络性能下降。在vanet的情况下,很难确定数据包丢失的原因,因为它也可能由于存在安全威胁而发生。VANET是一种无线自组网,受到移动自组网(MANET)常见的攻击,即拒绝服务(DoS)、黑洞、灰洞和Sybil攻击等。研究人员已经开发了各种安全机制,用于MANET上的安全路由,但这些解决方案并不完全兼容VANET的独特属性,即车辆可以相互通信(V2V),也可以通过基于基础设施的网络(V2I)发起通信。为了保护这两种通信类型的路由,需要开发一种解决方案。本文介绍了一种能够识别和消除现有安全威胁的安全路由方法。
{"title":"Prevention of denial of service attack over vehicle ad hoc networks using quick response table","authors":"P. Waraich, N. Batra","doi":"10.1109/ISPCC.2017.8269746","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269746","url":null,"abstract":"Secure routing over VANET is a major issue due to its high mobility environment. Due to dynamic topology, routes are frequently updated and also suffers from link breaks due to the obstacles i.e. buildings, tunnels and bridges etc. Frequent link breaks can cause packet drop and thus result in degradation of network performance. In case of VANETs, it becomes very difficult to identify the reason of the packet drop as it can also occur due to the presence of a security threat. VANET is a type of wireless adhoc network and suffer from common attacks which exist for mobile adhoc network (MANET) i.e. Denial of Services (DoS), Black hole, Gray hole and Sybil attack etc. Researchers have already developed various security mechanisms for secure routing over MANET but these solutions are not fully compatible with unique attributes of VANET i.e. vehicles can communicate with each other (V2V) as well as communication can be initiated with infrastructure based network (V2I). In order to secure the routing for both types of communication, there is need to develop a solution. In this paper, a method for secure routing is introduced which can identify as well as eliminate the existing security threat.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115450119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Trust and packet load balancing based secure opportunistic routing protocol for WSN 基于信任和包负载均衡的WSN安全机会路由协议
Nagesh Kumar, Yashwant Singh
Opportunistic routing in wireless networks has grown the popularity because it utilizes the broadcasting abilities of wireless links. Wireless sensor networks (WSN) also adopted opportunistic routing in recent years. In WSN, most important objectives of the researchers are to maintain the data integrity, availability and reliability with minimum energy consumption. If any WSN user have to achieve all of these objectives than, he has to ensure the security of the network first. Existing cryptographic schemes are not efficient for WSN, because of high energy consumption. This paper presents a new trust and packet load balancing based opportunistic routing (TPBOR) protocol. The proposed protocol is energy efficient and secure by utilizing the trusted nodes in the routing process. Also the proposed protocol balance the overall network traffic and distribute the traffic load equally in the network. The simulation results show that proposed OR protocol has significantly improves the network performance and reduces the end-to-end delays as compared to existing packet load balancing trust based routing protocols for WSN.
无线网络中的机会路由越来越受欢迎,因为它利用了无线链路的广播能力。近年来,无线传感器网络(WSN)也采用了机会路由。在无线传感器网络中,以最小的能耗保持数据的完整性、可用性和可靠性是研究人员最重要的目标。如果任何一个WSN用户要实现所有这些目标,那么他必须首先确保网络的安全性。现有的加密方案由于能量消耗大,对无线传感器网络来说效率不高。提出了一种新的基于信任和分组负载均衡的机会路由(TPBOR)协议。该协议通过在路由过程中利用可信节点来实现节能和安全。同时,该协议均衡了整个网络的流量,并将流量负载均匀地分配到网络中。仿真结果表明,与现有的基于分组负载均衡信任的WSN路由协议相比,本文提出的OR协议显著提高了网络性能,降低了端到端时延。
{"title":"Trust and packet load balancing based secure opportunistic routing protocol for WSN","authors":"Nagesh Kumar, Yashwant Singh","doi":"10.1109/ISPCC.2017.8269723","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269723","url":null,"abstract":"Opportunistic routing in wireless networks has grown the popularity because it utilizes the broadcasting abilities of wireless links. Wireless sensor networks (WSN) also adopted opportunistic routing in recent years. In WSN, most important objectives of the researchers are to maintain the data integrity, availability and reliability with minimum energy consumption. If any WSN user have to achieve all of these objectives than, he has to ensure the security of the network first. Existing cryptographic schemes are not efficient for WSN, because of high energy consumption. This paper presents a new trust and packet load balancing based opportunistic routing (TPBOR) protocol. The proposed protocol is energy efficient and secure by utilizing the trusted nodes in the routing process. Also the proposed protocol balance the overall network traffic and distribute the traffic load equally in the network. The simulation results show that proposed OR protocol has significantly improves the network performance and reduces the end-to-end delays as compared to existing packet load balancing trust based routing protocols for WSN.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115518157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
An efficient antilogarithmic converter by using 11-regions error correction scheme 采用11区纠错方案的高效反对数变换器
Durgesh Nandan, Anurag Mahajan, J. Kanungo
An efficient hardware implementation of logarithmic operations is a good choice in place of binary arithmetic operations. In this paper, we suggest an efficient antilogarithmic converter by using 11-region bit-level manipulation scheme by using the error correction scheme. The proposed hardware minimization technique provides a hardware (area, delay & power) efficient implementation at the same error cost. Existing and proposed antilogarithmic converters design is implemented on Xilinx ISE 12.1. Both converters design are evaluated on the Synopsys design compiler by using SAED 65 nm CMOS library and compared the results concerning of Data Arrival Time (DAT), Area, Power, Area Delay Product (ADP), and Energy. The proposed converter involves 52.33 % less ADP and 41.05 % Energy in comparisons of the existing two-bit regions antilogarithmic converter.
对数运算的高效硬件实现是替代二进制算术运算的好选择。在本文中,我们提出了一种有效的反对数转换器,该转换器采用11区位级操作方案,并采用纠错方案。所提出的硬件最小化技术以相同的错误代价提供了硬件(面积、延迟和功耗)效率的实现。现有和拟议的反对数转换器设计是在赛灵思ISE 12.1上实现的。采用SAED 65nm CMOS库在Synopsys设计编译器上对两种转换器设计进行了评估,并比较了数据到达时间(DAT)、面积、功耗、面积延迟积(ADP)和能量等方面的结果。与现有的2位区反对数转换器相比,该转换器的ADP降低52.33%,能量降低41.05%。
{"title":"An efficient antilogarithmic converter by using 11-regions error correction scheme","authors":"Durgesh Nandan, Anurag Mahajan, J. Kanungo","doi":"10.1109/ISPCC.2017.8269661","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269661","url":null,"abstract":"An efficient hardware implementation of logarithmic operations is a good choice in place of binary arithmetic operations. In this paper, we suggest an efficient antilogarithmic converter by using 11-region bit-level manipulation scheme by using the error correction scheme. The proposed hardware minimization technique provides a hardware (area, delay & power) efficient implementation at the same error cost. Existing and proposed antilogarithmic converters design is implemented on Xilinx ISE 12.1. Both converters design are evaluated on the Synopsys design compiler by using SAED 65 nm CMOS library and compared the results concerning of Data Arrival Time (DAT), Area, Power, Area Delay Product (ADP), and Energy. The proposed converter involves 52.33 % less ADP and 41.05 % Energy in comparisons of the existing two-bit regions antilogarithmic converter.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127226466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Modelling and identification of single area power system for load frequency control 负荷频率控制的单区电力系统建模与辨识
M. Gupta, Akshay Walia, S. Gupta, A. Sikander
In a large scale interconnected power system, the frequency and tie line power fluctuates when the sudden changes in load occurs. Therefore, in order to regulate this fluctuation in a desired manner a suitable control scheme namely load frequency control is required. But the model of this interconnected single area power system is very complex therefore it is difficult to develop a required control strategy. Thus, in this paper, modelling and identification of single area power system has been presented via model order reduction. In order to maintain the stability in reduced system a stability preservation method namely stability equation methods has been employed. The obtained results are compared when higher and reduced systems are subjected to unit step and impulse inputs. Furthermore, the performance of the proposed reduced model has also been evaluated in frequency domain.
在大型互联电力系统中,当负荷发生突变时,频率和并线功率都会发生波动。因此,为了以期望的方式调节这种波动,需要一种合适的控制方案,即负载频率控制。但是这种单区域互联电力系统的模型非常复杂,因此很难制定出所需的控制策略。因此,本文采用模型降阶的方法对单区域电力系统进行建模和辨识。为了保持约简系统的稳定性,采用了一种稳定保持方法,即稳定方程法。当高阶和低阶系统受到单位阶跃和脉冲输入时,所得到的结果进行了比较。此外,本文还对该简化模型的频域性能进行了评价。
{"title":"Modelling and identification of single area power system for load frequency control","authors":"M. Gupta, Akshay Walia, S. Gupta, A. Sikander","doi":"10.1109/ISPCC.2017.8269718","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269718","url":null,"abstract":"In a large scale interconnected power system, the frequency and tie line power fluctuates when the sudden changes in load occurs. Therefore, in order to regulate this fluctuation in a desired manner a suitable control scheme namely load frequency control is required. But the model of this interconnected single area power system is very complex therefore it is difficult to develop a required control strategy. Thus, in this paper, modelling and identification of single area power system has been presented via model order reduction. In order to maintain the stability in reduced system a stability preservation method namely stability equation methods has been employed. The obtained results are compared when higher and reduced systems are subjected to unit step and impulse inputs. Furthermore, the performance of the proposed reduced model has also been evaluated in frequency domain.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124719109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1