首页 > 最新文献

2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)最新文献

英文 中文
Expositioning of cryptography techniques in IoT domain 物联网领域加密技术的展示
Priyanka Jangra, Monish Gupta
Internet of Things (IoT) has drawn attention recently as a means of connecting the proliferating embedded devices to the Internet. IoT devices are forecast to grow to 33 billion by 2035. These devices include sensing devices, security cameras, mobile phones, and home automation/control devices. Alike WSN, IoT seems to be developed at much larger scale and ma have much more wider applications. To deploy such architectures there is a sturdy requirement of understanding various techniques being used widely by the proposed schemes. Thus, this paper works over to define and give a new direction to identify the right technique for the IoT architectures in terms of cryptography.
物联网(Internet of Things, IoT)作为一种将激增的嵌入式设备连接到互联网的手段,最近引起了人们的关注。到2035年,物联网设备预计将增长到330亿台。这些设备包括传感设备、安全摄像头、移动电话和家庭自动化/控制设备。与WSN一样,物联网的发展规模更大,应用范围也更广泛。要部署这样的体系结构,就需要理解被提议的方案广泛使用的各种技术。因此,本文致力于定义并给出一个新的方向,以确定在密码学方面适合物联网架构的技术。
{"title":"Expositioning of cryptography techniques in IoT domain","authors":"Priyanka Jangra, Monish Gupta","doi":"10.1109/ISPCC.2017.8269714","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269714","url":null,"abstract":"Internet of Things (IoT) has drawn attention recently as a means of connecting the proliferating embedded devices to the Internet. IoT devices are forecast to grow to 33 billion by 2035. These devices include sensing devices, security cameras, mobile phones, and home automation/control devices. Alike WSN, IoT seems to be developed at much larger scale and ma have much more wider applications. To deploy such architectures there is a sturdy requirement of understanding various techniques being used widely by the proposed schemes. Thus, this paper works over to define and give a new direction to identify the right technique for the IoT architectures in terms of cryptography.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129039480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge detection of Malaria parasites using ant colony optimization 基于蚁群优化的疟疾寄生虫边缘检测
Damandeep Kaur, G. K. Walia
Ant colony optimization (ACO) is algorithm used for optimization motivated by the natural behaviour of species of ants. In this ants retain pheromone for foraging at the ground. ACO has been originated to detect the edges of microscopic images of blood samples which are affected by malaria disease. The edge detection approach of ACO is used to maintain pheromone matrix which determines the information of edges provided at every image pixel position, based on no. of ants movement that are dispatched to be in motion on the image. Thus, changes in the intensity values of images determine the movement of the ants. The results have been taken to study an approach for Ant Colony Edge Detection method.
蚁群优化算法(Ant colony optimization, ACO)是一种基于蚁群自然行为的优化算法。在这种情况下,蚂蚁保留了在地面觅食的信息素。蚁群分析法最初用于检测受疟疾影响的血样显微图像的边缘。采用蚁群算法的边缘检测方法维护信息素矩阵,该信息素矩阵确定在每个图像像素位置提供的边缘信息。蚂蚁的运动,被分配到在图像上的运动。因此,图像强度值的变化决定了蚂蚁的运动。研究了一种蚁群边缘检测方法。
{"title":"Edge detection of Malaria parasites using ant colony optimization","authors":"Damandeep Kaur, G. K. Walia","doi":"10.1109/ISPCC.2017.8269721","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269721","url":null,"abstract":"Ant colony optimization (ACO) is algorithm used for optimization motivated by the natural behaviour of species of ants. In this ants retain pheromone for foraging at the ground. ACO has been originated to detect the edges of microscopic images of blood samples which are affected by malaria disease. The edge detection approach of ACO is used to maintain pheromone matrix which determines the information of edges provided at every image pixel position, based on no. of ants movement that are dispatched to be in motion on the image. Thus, changes in the intensity values of images determine the movement of the ants. The results have been taken to study an approach for Ant Colony Edge Detection method.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"43 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121011696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Boosting anonymity in wireless sensor networks 增强无线传感器网络的匿名性
Vicky Kumar, Ashok Kumar, Manjeet Singh
The base station (BS) is the main device in a wireless sensor network (WSN) and used to collect data from all the sensor nodes. The information of the whole network is stored in the BS and hence it is always targeted by the adversaries who want to interrupt the operation of the network. The nodes transmit their data to the BS using multi-hop technique and hence form an eminent traffic pattern that can be easily observed by a remote adversary. The presented research aims to increase the anonymity of the BS. The proposed scheme uses a mobile BS and ring nodes to complete the above mentioned objective. The simulation results show that the proposed scheme has superior outcomes as compared to the existing techniques.
基站(BS)是无线传感器网络(WSN)中的主要设备,用于从所有传感器节点收集数据。整个网络的信息都存储在BS中,因此它总是成为攻击者想要中断网络运行的目标。节点使用多跳技术将其数据传输到BS,从而形成一个可以被远程对手轻松观察到的杰出流量模式。提出的研究旨在增加BS的匿名性。该方案采用移动基站和环形节点来实现上述目标。仿真结果表明,与现有技术相比,该方案具有更好的效果。
{"title":"Boosting anonymity in wireless sensor networks","authors":"Vicky Kumar, Ashok Kumar, Manjeet Singh","doi":"10.1109/ISPCC.2017.8269701","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269701","url":null,"abstract":"The base station (BS) is the main device in a wireless sensor network (WSN) and used to collect data from all the sensor nodes. The information of the whole network is stored in the BS and hence it is always targeted by the adversaries who want to interrupt the operation of the network. The nodes transmit their data to the BS using multi-hop technique and hence form an eminent traffic pattern that can be easily observed by a remote adversary. The presented research aims to increase the anonymity of the BS. The proposed scheme uses a mobile BS and ring nodes to complete the above mentioned objective. The simulation results show that the proposed scheme has superior outcomes as compared to the existing techniques.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121983439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Model order reduction and approximation analysis for control system design 控制系统设计中的模型降阶与逼近分析
Mohit Garg
Dynamic systems are mostly complex, time-varying and of higher order. This paper presents model order reduction scheme used for the order reduction of complex, higher order dynamic systems. The proposed scheme for reduction of higher order system transfer function is based on modified-pole clustering and coefficient matching technique. The efforts has been made in this paper to decrease the order of the given transfer function and essentially preserving all the useful characteristics of the original transfer function using the proposed scheme. Some other techniques used for the reduction of model dimension are also described and analyzed. An example has been included to illustrate the proposed method of model order reduction for analysis and control of a dynamic system. The present method is compared with other order reduction method and concluding remarks are presented.
动态系统大多是复杂的、时变的、高阶的。本文提出了一种用于复杂高阶动态系统降阶的模型降阶方案。提出了基于修正极点聚类和系数匹配技术的高阶系统传递函数约简方案。本文所做的努力是降低给定传递函数的阶数,并基本上保留原始传递函数的所有有用特征。本文还介绍和分析了用于模型降维的其他一些技术。最后通过一个实例说明了所提出的用于动态系统分析与控制的模型降阶方法。将该方法与其它降阶方法进行了比较,并给出了结论。
{"title":"Model order reduction and approximation analysis for control system design","authors":"Mohit Garg","doi":"10.1109/ISPCC.2017.8269725","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269725","url":null,"abstract":"Dynamic systems are mostly complex, time-varying and of higher order. This paper presents model order reduction scheme used for the order reduction of complex, higher order dynamic systems. The proposed scheme for reduction of higher order system transfer function is based on modified-pole clustering and coefficient matching technique. The efforts has been made in this paper to decrease the order of the given transfer function and essentially preserving all the useful characteristics of the original transfer function using the proposed scheme. Some other techniques used for the reduction of model dimension are also described and analyzed. An example has been included to illustrate the proposed method of model order reduction for analysis and control of a dynamic system. The present method is compared with other order reduction method and concluding remarks are presented.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126401569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Segmentation of magnetic resonance images of brain using thresholding techniques 脑磁共振图像的阈值分割
Jyotsna Dogra, M. Sood, Shruti Jain, Navdeep Parashar
In the recent years, image segmentation has become one of the important technique in several generalpurpose fields where it has been used to extract region of interest from the background. Image segmentation is a classic subject in the field of image processing which has a special focus on image processing techniques. Since, in literature there is no general solution to the image segmentation problem, various techniques have been employed to effectively solve these problems combined with the domain knowledge. A lot of brainstorming has been done to come up with an optimal technique to make images smooth and easy to evaluate. Among various image segmentation techniques, thresholding is one of the simplest techniques that has been used for image segmentation where the region of interest has been extracted from the background by comparing the pixel values with the threshold value. To obtain the threshold value histogram of the image has been calculated. The results shows that any abnormality can be localized easily in horizontal divided MRI brain image rather than in vertical divided MRI image.
近年来,图像分割已成为一些通用领域的重要技术之一,它被用于从背景中提取感兴趣的区域。图像分割是图像处理领域的一门经典学科,是一门以图像处理技术为核心的学科。由于文献中没有针对图像分割问题的通用解决方案,因此结合领域知识,采用了各种技术来有效地解决这些问题。我们进行了大量的头脑风暴,以提出一种使图像平滑和易于评估的最佳技术。在各种图像分割技术中,阈值分割是最简单的用于图像分割的技术之一,它通过比较像素值和阈值从背景中提取感兴趣的区域。得到了直方图的阈值,对图像进行了计算。结果表明,水平分割的MRI图像比垂直分割的MRI图像更容易定位任何异常。
{"title":"Segmentation of magnetic resonance images of brain using thresholding techniques","authors":"Jyotsna Dogra, M. Sood, Shruti Jain, Navdeep Parashar","doi":"10.1109/ISPCC.2017.8269695","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269695","url":null,"abstract":"In the recent years, image segmentation has become one of the important technique in several generalpurpose fields where it has been used to extract region of interest from the background. Image segmentation is a classic subject in the field of image processing which has a special focus on image processing techniques. Since, in literature there is no general solution to the image segmentation problem, various techniques have been employed to effectively solve these problems combined with the domain knowledge. A lot of brainstorming has been done to come up with an optimal technique to make images smooth and easy to evaluate. Among various image segmentation techniques, thresholding is one of the simplest techniques that has been used for image segmentation where the region of interest has been extracted from the background by comparing the pixel values with the threshold value. To obtain the threshold value histogram of the image has been calculated. The results shows that any abnormality can be localized easily in horizontal divided MRI brain image rather than in vertical divided MRI image.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127338229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Arrival based deadline aware job scheduling algorithm in cloud 云环境下基于到达的截止时间感知作业调度算法
R. Kumar, Swati Gupta
This study designed a scheduling algorithm for Cloud Computing Environment by taking values of different parameters from a file provided by a user which gives the details of different cloudlets to be made. The cloudlets are assigned to different hosts according to the Shortest Deadline First combined with First Come First Serve where the Cloudlets are being submitted at different arrival times. The deadline provided by user is used to determine whether the Cloudlet is able to finish execution in the prescribed time interval or not. This implementation increased the number of jobs that finished executing in a particular time interval, thereby minimising the number of cloudlets that missed the deadline as compared to the Datacenter Broker scheduler which implements First Come First Serve. The characteristics remained fixed whether its for DataCenter Broker Scheduler or the Arrival based Deadline First Scheduler except the number of Cloudlets were increased gradually and the results were compared. The results show that the First Come First Serve Scheduler misses more Cloudlets from deadline as compared to ADSF Scheduler. All the cloudlets arrived at different time and were scheduled and submitted according to that time and not simultaneously which resulted in more efficient results. The results show that the Total De-layed Cloudlets have a huge difference for both the algorithms. Although, the waiting time is some what same.
本研究通过从用户提供的文件中获取不同参数的值,设计了一种云计算环境下的调度算法,该文件给出了不同的云计算细节。根据“最短截止日期先到”和“先到先服务”将cloudlets分配给不同的主机,其中cloudlets在不同的到达时间被提交。用户提供的截止日期用于确定Cloudlet是否能够在规定的时间间隔内完成执行。此实现增加了在特定时间间隔内完成执行的作业数量,因此与实现先到先服务的Datacenter Broker调度器相比,可以最大限度地减少错过截止日期的cloudlet数量。无论是DataCenter Broker Scheduler还是基于到达的Deadline First Scheduler,除了cloudlet的数量逐渐增加并比较结果外,特征保持不变。结果表明,与ADSF调度器相比,先到先服务调度器在截止日期前错过了更多的Cloudlets。所有的cloudlets都在不同的时间到达,并根据该时间进行调度和提交,而不是同时进行,从而产生更高效的结果。结果表明,对于两种算法,Total de - layedcloudlets有很大的差异。虽然,等待的时间是有些相同的。
{"title":"Arrival based deadline aware job scheduling algorithm in cloud","authors":"R. Kumar, Swati Gupta","doi":"10.1109/ISPCC.2017.8269671","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269671","url":null,"abstract":"This study designed a scheduling algorithm for Cloud Computing Environment by taking values of different parameters from a file provided by a user which gives the details of different cloudlets to be made. The cloudlets are assigned to different hosts according to the Shortest Deadline First combined with First Come First Serve where the Cloudlets are being submitted at different arrival times. The deadline provided by user is used to determine whether the Cloudlet is able to finish execution in the prescribed time interval or not. This implementation increased the number of jobs that finished executing in a particular time interval, thereby minimising the number of cloudlets that missed the deadline as compared to the Datacenter Broker scheduler which implements First Come First Serve. The characteristics remained fixed whether its for DataCenter Broker Scheduler or the Arrival based Deadline First Scheduler except the number of Cloudlets were increased gradually and the results were compared. The results show that the First Come First Serve Scheduler misses more Cloudlets from deadline as compared to ADSF Scheduler. All the cloudlets arrived at different time and were scheduled and submitted according to that time and not simultaneously which resulted in more efficient results. The results show that the Total De-layed Cloudlets have a huge difference for both the algorithms. Although, the waiting time is some what same.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130643983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
BHARKS: Built-in hardware authentication using random key sequence 使用随机密钥序列的内置硬件身份验证
D. Reddy, K. Akshay, R. Giridhar, S. Karan, N. Mohankumar
In today's world, as the demand for IC production grows exponentially, testing and validation of all the manufactured chips becomes impossible. Therefore, in the proposed method, we have developed a technique for embedding unique signatures with minimalistic hardware or area overhead while preserving the intended functionality. To achieve this, three ‘levels’ of security are provided. First, circuit specific information is derived and used for signature generation. Second, the generated signature is hashed, obfuscating the logic reverse engineering process and finally a bit sequence from a Pseudo-Random Number Generator (PRNG) to make it unfeasibly difficult for the attacker to decode the signature.
在当今世界,随着对集成电路生产的需求呈指数级增长,对所有制造的芯片进行测试和验证变得不可能。因此,在提出的方法中,我们开发了一种技术,可以在保留预期功能的同时,以最小的硬件或面积开销嵌入唯一签名。为了实现这一点,提供了三个“级别”的安全性。首先,推导电路特定信息并将其用于签名生成。其次,对生成的签名进行散列,混淆逻辑逆向工程过程,最后从伪随机数生成器(PRNG)中获得位序列,使攻击者难以解码签名。
{"title":"BHARKS: Built-in hardware authentication using random key sequence","authors":"D. Reddy, K. Akshay, R. Giridhar, S. Karan, N. Mohankumar","doi":"10.1109/ISPCC.2017.8269675","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269675","url":null,"abstract":"In today's world, as the demand for IC production grows exponentially, testing and validation of all the manufactured chips becomes impossible. Therefore, in the proposed method, we have developed a technique for embedding unique signatures with minimalistic hardware or area overhead while preserving the intended functionality. To achieve this, three ‘levels’ of security are provided. First, circuit specific information is derived and used for signature generation. Second, the generated signature is hashed, obfuscating the logic reverse engineering process and finally a bit sequence from a Pseudo-Random Number Generator (PRNG) to make it unfeasibly difficult for the attacker to decode the signature.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"30 41","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131804651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Comparative empirical usability assessment of two HRI input devices for a mobile robot 移动机器人两种HRI输入设备的比较经验可用性评估
Vasudev S. Mallan, Syam Gopi, A. Muir, R. R. Bhavani
It is now possible to control an Unmanned Ground Vehicle (UGV) with a free smartphone app such as ROS Control. Smartphones offer such low cost and easily available human-robot interface (HRI) controlling robots with tilt gestures. However, tilt gestures are not used in the more commonly available UGV control devices, such as joystick and button based gamepads. Tilt gestures have not been studied in terms of their effectiveness for controlling UGVs. If they are effective, then the low cost and high availability of smartphones running apps such as ROS Control can make a huge change in the world of HRI and control devices for UGV for the developing world. They can be ruggedized and are low cost, and more familiar to the general populace — which are factors that can help the adoption of robotics in India. This research explores the ease of use and effectiveness in controlling a UGV by benchmarking a tilt-based HRI (on the ROS Control app) with the more established joystick and button based HRI on a gamepad. A 40-person usability study using both devices in Gazebo, a robotic simulated environment, was conducted. Performance metrics (time on task and lane deviations) were measured, to indicate effectiveness. However, the statistical analysis conducted using Wilcoxon Signed Rank test shows a significant difference in the use of both the input devices in controlling a UGV favoring the gamepad. However, most of the participants report the tilt based app as more controllable and highly usable.
现在可以使用免费的智能手机应用程序(如ROS control)来控制无人地面车辆(UGV)。智能手机提供了这种低成本和易于获得的人机界面(HRI),可以通过倾斜手势控制机器人。然而,倾斜手势并不用于更常见的UGV控制设备,如操纵杆和基于按钮的游戏手柄。倾斜手势在控制ugv方面的有效性尚未得到研究。如果它们是有效的,那么运行ROS Control等应用程序的智能手机的低成本和高可用性可以在发展中国家的HRI和UGV控制设备领域产生巨大变化。它们可以坚固耐用,成本低,更为普通民众所熟悉——这些因素可以帮助印度采用机器人技术。本研究通过对基于倾斜的HRI(在ROS Control应用程序上)与手柄上更成熟的操纵杆和基于按钮的HRI进行基准测试,探索了控制UGV的易用性和有效性。在机器人模拟环境Gazebo中使用这两种设备进行了一项40人的可用性研究。测量了性能指标(完成任务的时间和车道偏差),以表明有效性。然而,使用Wilcoxon Signed Rank测试进行的统计分析显示,在使用这两种输入设备来控制UGV时,偏好手柄的情况有显著差异。然而,大多数参与者表示,基于倾斜的应用程序更容易控制,易用性也更高。
{"title":"Comparative empirical usability assessment of two HRI input devices for a mobile robot","authors":"Vasudev S. Mallan, Syam Gopi, A. Muir, R. R. Bhavani","doi":"10.1109/ISPCC.2017.8269699","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269699","url":null,"abstract":"It is now possible to control an Unmanned Ground Vehicle (UGV) with a free smartphone app such as ROS Control. Smartphones offer such low cost and easily available human-robot interface (HRI) controlling robots with tilt gestures. However, tilt gestures are not used in the more commonly available UGV control devices, such as joystick and button based gamepads. Tilt gestures have not been studied in terms of their effectiveness for controlling UGVs. If they are effective, then the low cost and high availability of smartphones running apps such as ROS Control can make a huge change in the world of HRI and control devices for UGV for the developing world. They can be ruggedized and are low cost, and more familiar to the general populace — which are factors that can help the adoption of robotics in India. This research explores the ease of use and effectiveness in controlling a UGV by benchmarking a tilt-based HRI (on the ROS Control app) with the more established joystick and button based HRI on a gamepad. A 40-person usability study using both devices in Gazebo, a robotic simulated environment, was conducted. Performance metrics (time on task and lane deviations) were measured, to indicate effectiveness. However, the statistical analysis conducted using Wilcoxon Signed Rank test shows a significant difference in the use of both the input devices in controlling a UGV favoring the gamepad. However, most of the participants report the tilt based app as more controllable and highly usable.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133867536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal sizing of standalone small rotor wind and diesel system with energy storage for low speed wind operation 单机小转子风力和柴油系统的最优尺寸,用于低速风力运行的储能
R. Prajapati, V. Garg
In recent years, standalone systems are becoming economic and substantial for the electrification in remote areas, where grid connectivity is difficult. This paper presents an approach for electrification of shadow regions in Himalayan area, where the solar energy is not sufficient. The method presented uses the wind-diesel hybrid system for generation of electricity to meet the electric power requirements for a cluster of villages. The approach is novel as it uses small rotor wind turbines (SRWT) in the wind-diesel system. The advantages of using SRWT are (i) low cost, (ii) small in size, (iii) low-speed operation, and (iv) affordable for rural communities. The paper discusses the sizing of different system components to find out optimal combination of energy for the selected study while minimizing the cost of energy (COE) generation for required reliability values. The sizing is performed for three different seasonal load profiles. The two reliability values are considered for the selection of optimum solution of year round application. The proposed model provides continuous supply of electricity while minimizing the energy.
近年来,对于电网连接困难的偏远地区的电气化来说,独立系统变得越来越经济和重要。本文提出了在喜马拉雅地区太阳能不足的阴影地区实现电气化的方法。该方法利用风力-柴油混合发电系统来满足村庄集群的电力需求。这种方法是新颖的,因为它在风力-柴油系统中使用小转子风力涡轮机(SRWT)。使用SRWT的优点是:(i)成本低,(ii)体积小,(iii)运行速度慢,以及(iv)农村社区负担得起。本文讨论了不同系统组件的尺寸,以找到所选研究的最佳能量组合,同时最小化所需可靠性值的能源成本(COE)。对三种不同的季节性负荷进行分级。考虑了这两个可靠度值,选择了全年应用的最优方案。所提出的模型在最大限度地减少能源消耗的同时提供持续的电力供应。
{"title":"Optimal sizing of standalone small rotor wind and diesel system with energy storage for low speed wind operation","authors":"R. Prajapati, V. Garg","doi":"10.1109/ISPCC.2017.8269719","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269719","url":null,"abstract":"In recent years, standalone systems are becoming economic and substantial for the electrification in remote areas, where grid connectivity is difficult. This paper presents an approach for electrification of shadow regions in Himalayan area, where the solar energy is not sufficient. The method presented uses the wind-diesel hybrid system for generation of electricity to meet the electric power requirements for a cluster of villages. The approach is novel as it uses small rotor wind turbines (SRWT) in the wind-diesel system. The advantages of using SRWT are (i) low cost, (ii) small in size, (iii) low-speed operation, and (iv) affordable for rural communities. The paper discusses the sizing of different system components to find out optimal combination of energy for the selected study while minimizing the cost of energy (COE) generation for required reliability values. The sizing is performed for three different seasonal load profiles. The two reliability values are considered for the selection of optimum solution of year round application. The proposed model provides continuous supply of electricity while minimizing the energy.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"19 1-2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114038267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modified centralized approach for preventing collision at traffic intersection 一种改进的交叉口碰撞集中预防方法
Ruchika Chawla, Prateek Thakral, Akshay Kumar Kaura, Kapil O. Gupta
Traffic control at intersection is a system where conflict resolution between different lanes is required so that vehicles can access the intersection without hitting each other and also which prevents deadlocks. With the emergence of Vehicular Ad Hoc Networks (VANETs), Intelligent Transportation Systems (ITS) has seen emergence of new algorithms for autonomous cars such as collision detection, traffic maneuver & traffic control at intersection. Traffic light based algorithms use complex computational mechanism such as neural network and machine learning which make these algorithms complex to implement and use. The approach which we are going to discuss in this paper is to model the problem as the Vehicle Mutual Exclusion for Intersections (VMEI) which provides centralized solution to this problem. In VMEI approach number of vehicles that can access the intersection in one pass is not at all defined and it is left to the human intervention, we will call it as threshold. In this paper we will provide solution to threshold problem in centralized approach.
交叉口交通控制是一种需要解决不同车道之间的冲突,使车辆在不发生碰撞的情况下进入交叉口,并防止发生死锁的系统。随着车辆自组织网络(VANETs)的出现,智能交通系统(ITS)已经出现了自动驾驶汽车的新算法,如碰撞检测,交通机动和十字路口交通控制。基于交通灯的算法使用复杂的计算机制,如神经网络和机器学习,这使得这些算法的实现和使用变得复杂。本文讨论的方法是将该问题建模为交叉口车辆互斥(VMEI),该方法为该问题提供了集中的解决方案。在VMEI方法中,一次通过可进入交叉口的车辆数量完全没有定义,留给人为干预,我们称之为阈值。本文将提供集中式方法中阈值问题的解决方案。
{"title":"Modified centralized approach for preventing collision at traffic intersection","authors":"Ruchika Chawla, Prateek Thakral, Akshay Kumar Kaura, Kapil O. Gupta","doi":"10.1109/ISPCC.2017.8269646","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269646","url":null,"abstract":"Traffic control at intersection is a system where conflict resolution between different lanes is required so that vehicles can access the intersection without hitting each other and also which prevents deadlocks. With the emergence of Vehicular Ad Hoc Networks (VANETs), Intelligent Transportation Systems (ITS) has seen emergence of new algorithms for autonomous cars such as collision detection, traffic maneuver & traffic control at intersection. Traffic light based algorithms use complex computational mechanism such as neural network and machine learning which make these algorithms complex to implement and use. The approach which we are going to discuss in this paper is to model the problem as the Vehicle Mutual Exclusion for Intersections (VMEI) which provides centralized solution to this problem. In VMEI approach number of vehicles that can access the intersection in one pass is not at all defined and it is left to the human intervention, we will call it as threshold. In this paper we will provide solution to threshold problem in centralized approach.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128318047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1