Pub Date : 2014-11-01DOI: 10.1109/CIPECH.2014.7019102
Pratiksha Saxena, N. Khanna
This paper presents mathematical models for multi-criteria objectives for animal diet formulation using LINGO and TORA. It represents formulation and computation techniques with the help of these software. Multi-objectives of this paper are; minimization of cost for cattle diet, better shelf life for feed mix and minimization of adverse effect of nutrient ingredients crude protein and phosphorus. Minimization of adverse effect of nutrient ingredients is done by using goal programming which gives a new dimension to this work.
{"title":"Formulation and computation of cattle feed mix by using TORA and LINGO: Minimization of adverse effect of nutrient ingredient","authors":"Pratiksha Saxena, N. Khanna","doi":"10.1109/CIPECH.2014.7019102","DOIUrl":"https://doi.org/10.1109/CIPECH.2014.7019102","url":null,"abstract":"This paper presents mathematical models for multi-criteria objectives for animal diet formulation using LINGO and TORA. It represents formulation and computation techniques with the help of these software. Multi-objectives of this paper are; minimization of cost for cattle diet, better shelf life for feed mix and minimization of adverse effect of nutrient ingredients crude protein and phosphorus. Minimization of adverse effect of nutrient ingredients is done by using goal programming which gives a new dimension to this work.","PeriodicalId":170027,"journal":{"name":"2014 Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132322850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/CIPECH.2014.7019104
K. Yadav, Harshavardhan Singh
In this paper, the detection of faulty elements in a linear antenna array with different combination of faulty element; is presented. The task of finding faulty element position and its level of fault in antenna arrays has been solved by using Iterative Fast Fourier Transform (IFFT) technique. A Chebyshev antenna array of 30 elements with specific sidelobe level (SLL) is considered as the basic antenna array and the developed formulation is tested on it. Various combinations of failure have been considered in this work and successfully detected using the developed methodology. All the Simulated results has been explained, tabulated and presented with different figures successfully.
{"title":"Application of iterative fast Fourier transform for fault finding in linear array antenna with various fault percentage","authors":"K. Yadav, Harshavardhan Singh","doi":"10.1109/CIPECH.2014.7019104","DOIUrl":"https://doi.org/10.1109/CIPECH.2014.7019104","url":null,"abstract":"In this paper, the detection of faulty elements in a linear antenna array with different combination of faulty element; is presented. The task of finding faulty element position and its level of fault in antenna arrays has been solved by using Iterative Fast Fourier Transform (IFFT) technique. A Chebyshev antenna array of 30 elements with specific sidelobe level (SLL) is considered as the basic antenna array and the developed formulation is tested on it. Various combinations of failure have been considered in this work and successfully detected using the developed methodology. All the Simulated results has been explained, tabulated and presented with different figures successfully.","PeriodicalId":170027,"journal":{"name":"2014 Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133757244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/CIPECH.2014.7019069
N. Bhardwaj, Nitish Aggarwal, N. Ahlawat, Charu Rana
Evolution comes before survival only in dictionary. We are creatures of reason, programmed to preserve energy and maintain equilibrium. However in this era of electronics and communication it is important to not merely survive but to thrive, we must occasionally consider the role of autonomous machine at times of disaster. Having a disaster management machine will help us through early evacuation which will eliminate panic situation and reap the ultimate rewards in saving precious lives. This paper discusses NISTARA (which is a Sanskrit word meaning rescue and pronounced as Nistar), a system built to detect and handle disasters in physical environments. It is based on different sensors (water, fire, seismic) deployed at different vantage points, which send their signals to a base computer which implements fuzzy logic based detection and evacuation response. It sends camera images to output displays, and information to end user cellular phones through specially designed android app. This paper also discusses the feasibility and effectiveness of implementing this device in premises such as schools, offices, colleges and hospitals.
{"title":"Controls and intelligence behind “NISTARA-2” — A disaster management machine (DMM)","authors":"N. Bhardwaj, Nitish Aggarwal, N. Ahlawat, Charu Rana","doi":"10.1109/CIPECH.2014.7019069","DOIUrl":"https://doi.org/10.1109/CIPECH.2014.7019069","url":null,"abstract":"Evolution comes before survival only in dictionary. We are creatures of reason, programmed to preserve energy and maintain equilibrium. However in this era of electronics and communication it is important to not merely survive but to thrive, we must occasionally consider the role of autonomous machine at times of disaster. Having a disaster management machine will help us through early evacuation which will eliminate panic situation and reap the ultimate rewards in saving precious lives. This paper discusses NISTARA (which is a Sanskrit word meaning rescue and pronounced as Nistar), a system built to detect and handle disasters in physical environments. It is based on different sensors (water, fire, seismic) deployed at different vantage points, which send their signals to a base computer which implements fuzzy logic based detection and evacuation response. It sends camera images to output displays, and information to end user cellular phones through specially designed android app. This paper also discusses the feasibility and effectiveness of implementing this device in premises such as schools, offices, colleges and hospitals.","PeriodicalId":170027,"journal":{"name":"2014 Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130034962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/CIPECH.2014.7019110
Prashant Vats, Manju Mandot, A. Gosain
Ant Colony Optimization are metaheuristic algorithms that uses the search based algorithms as their base. It applies the natural phenomenon of finding the best possible path by the Ants that is covering the minimum distance from the food source to the ant colony, which will be followed by the rest of the ants, resulting into the optimized path. This phenomenon can be applied to provide optimized solutions to solve some complex computational problems. In this paper, we have carried out a review for the applications of the Ant colony Optimization algorithms in context to various level of the Software Testing, thus proving their worth in providing solutions to the various aspects of the Software Testing.
{"title":"A comparative analysis of ant colony optimization for its applications into software testing","authors":"Prashant Vats, Manju Mandot, A. Gosain","doi":"10.1109/CIPECH.2014.7019110","DOIUrl":"https://doi.org/10.1109/CIPECH.2014.7019110","url":null,"abstract":"Ant Colony Optimization are metaheuristic algorithms that uses the search based algorithms as their base. It applies the natural phenomenon of finding the best possible path by the Ants that is covering the minimum distance from the food source to the ant colony, which will be followed by the rest of the ants, resulting into the optimized path. This phenomenon can be applied to provide optimized solutions to solve some complex computational problems. In this paper, we have carried out a review for the applications of the Ant colony Optimization algorithms in context to various level of the Software Testing, thus proving their worth in providing solutions to the various aspects of the Software Testing.","PeriodicalId":170027,"journal":{"name":"2014 Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114213820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/CIPECH.2014.7019040
A. Prakash, S. Singh
This paper describes a model for forecasting the daily solar energy. The features used in this model include precipitation, flux (long-wave, short wave), air pressure, humidity, cloud cover, temperature, radiation (long-wave and shortwave). These features along with previous data for daily solar energy received for the years 1994-2007 has been used for forecasting. The data for the features comes from a grid of sites in the United States and the data for previous years' daily solar energy comes from 98 sites in Oklahoma, United States. Two algorithms have been used for forecasting - Linear Least Square Regression and Gradient Boosting Regression. Gradient Boosting Regression has shown to be around 2.5% more accurate as compared to Linear Least Square Regression.
{"title":"Towards an efficient regression model for solar energy prediction","authors":"A. Prakash, S. Singh","doi":"10.1109/CIPECH.2014.7019040","DOIUrl":"https://doi.org/10.1109/CIPECH.2014.7019040","url":null,"abstract":"This paper describes a model for forecasting the daily solar energy. The features used in this model include precipitation, flux (long-wave, short wave), air pressure, humidity, cloud cover, temperature, radiation (long-wave and shortwave). These features along with previous data for daily solar energy received for the years 1994-2007 has been used for forecasting. The data for the features comes from a grid of sites in the United States and the data for previous years' daily solar energy comes from 98 sites in Oklahoma, United States. Two algorithms have been used for forecasting - Linear Least Square Regression and Gradient Boosting Regression. Gradient Boosting Regression has shown to be around 2.5% more accurate as compared to Linear Least Square Regression.","PeriodicalId":170027,"journal":{"name":"2014 Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122963080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/CIPECH.2014.7019103
A. D. Janaj, D. Joshi, B. Akiwate
This paper deals with the analysis and simulation of power system operation with an integrated control viz., under single area and two-area control and it was carried out with the help of MATLAB. The simulation studies will enable an easier understanding of the effect of an actual load change and how the frequency and voltage are maintained by introducing state feedback controller. The paper deals with simulated results using MATLAB to show the response of the system like tie-line power, frequency deviation for different torques. The modeling, analysis and simulation has been carried out for a detailed performance evaluation of a real time power system. Such a study has helped in proposing methods to examine the stability of the system. The stability of the system is improved by feedback gain matrix.
{"title":"Design of controller to damp inter area oscillations","authors":"A. D. Janaj, D. Joshi, B. Akiwate","doi":"10.1109/CIPECH.2014.7019103","DOIUrl":"https://doi.org/10.1109/CIPECH.2014.7019103","url":null,"abstract":"This paper deals with the analysis and simulation of power system operation with an integrated control viz., under single area and two-area control and it was carried out with the help of MATLAB. The simulation studies will enable an easier understanding of the effect of an actual load change and how the frequency and voltage are maintained by introducing state feedback controller. The paper deals with simulated results using MATLAB to show the response of the system like tie-line power, frequency deviation for different torques. The modeling, analysis and simulation has been carried out for a detailed performance evaluation of a real time power system. Such a study has helped in proposing methods to examine the stability of the system. The stability of the system is improved by feedback gain matrix.","PeriodicalId":170027,"journal":{"name":"2014 Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH)","volume":"350 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122762311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/CIPECH.2014.7019088
Zaheeruddin, M. Pande
This papers proposes a plan of using fixed and switched capacitor for the during disaster condition of distribution system. The configuration of a distribution network is different from a transmission network. Distribution systems are typically radial: the loop power flow does not exist. Distribution systems include the inductive loads along with transformers and lines, which account for quite significant power loss due to lagging current. The introduction of strategically sized and placed shunt capacitors within the distribution system help to counteract the losses created due to an inductive system by, increasing the system capacity, reducing system losses and improving the voltage profile. The problem of capacitor allocation includes the location, type (fixed or switched), and size of capacitor. The sizing of capacitor is determined by a simple capacitor-sizing algorithm developed in MATLAB.
{"title":"Disaster management of distribution line using fixed and switched capacitors","authors":"Zaheeruddin, M. Pande","doi":"10.1109/CIPECH.2014.7019088","DOIUrl":"https://doi.org/10.1109/CIPECH.2014.7019088","url":null,"abstract":"This papers proposes a plan of using fixed and switched capacitor for the during disaster condition of distribution system. The configuration of a distribution network is different from a transmission network. Distribution systems are typically radial: the loop power flow does not exist. Distribution systems include the inductive loads along with transformers and lines, which account for quite significant power loss due to lagging current. The introduction of strategically sized and placed shunt capacitors within the distribution system help to counteract the losses created due to an inductive system by, increasing the system capacity, reducing system losses and improving the voltage profile. The problem of capacitor allocation includes the location, type (fixed or switched), and size of capacitor. The sizing of capacitor is determined by a simple capacitor-sizing algorithm developed in MATLAB.","PeriodicalId":170027,"journal":{"name":"2014 Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115252339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/CIPECH.2014.7019091
Preeti Kushwah, S. Akashe
The proposed paper shows the half adder circuit with low power consumption preferred for arithmetic operations. Leakage power dissipation problem of electronics systems has attracted a lot of attention from engineers and researchers over the years. In the CMOS circuits Power dissipation occurs due to increasing leakage current in deep-sub micrometer regimes which is becoming a significant contributor as threshold voltage, channel length, and gate oxide thickness are reduced. The half adder circuit composed of XOR gate and AND logic gate, which have many transistor. Power consumption (leakage power) in the CMOS technology half adder circuit achieving better performance for maintain the speed, power dissipation, size, reliability of the device. SVL (Self-controllable Voltage Level) technique provides better leakage power reduction with minimum area and it not only reduces power but also retains data during standby period in half adder. Simulation work has been done in 45 nm technology, in this technology power consumption (leakage power) have provided for half adder circuit.
{"title":"Standby and active leakage current control mechanism of half adder cell","authors":"Preeti Kushwah, S. Akashe","doi":"10.1109/CIPECH.2014.7019091","DOIUrl":"https://doi.org/10.1109/CIPECH.2014.7019091","url":null,"abstract":"The proposed paper shows the half adder circuit with low power consumption preferred for arithmetic operations. Leakage power dissipation problem of electronics systems has attracted a lot of attention from engineers and researchers over the years. In the CMOS circuits Power dissipation occurs due to increasing leakage current in deep-sub micrometer regimes which is becoming a significant contributor as threshold voltage, channel length, and gate oxide thickness are reduced. The half adder circuit composed of XOR gate and AND logic gate, which have many transistor. Power consumption (leakage power) in the CMOS technology half adder circuit achieving better performance for maintain the speed, power dissipation, size, reliability of the device. SVL (Self-controllable Voltage Level) technique provides better leakage power reduction with minimum area and it not only reduces power but also retains data during standby period in half adder. Simulation work has been done in 45 nm technology, in this technology power consumption (leakage power) have provided for half adder circuit.","PeriodicalId":170027,"journal":{"name":"2014 Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128611785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/CIPECH.2014.7019043
M. Lakhera
A biometric system is weak to a different type of attacks targeted at undermining the reliability of the verification process. These attacks are either imposter or irrevocability. Imposter means information stored in database, can be abused to construction of artificial biometric and replace it for fake authentication and irrevocability means once compromised, biometric not be updated, reissued or destroyed. In this paper we present a general architecture with the help of Digital Signature that guarantees privacy protection of biometric data. We specifically focus on secure a biometric data at the time of authentication and storage.
{"title":"Enhancing security of stored biometric data","authors":"M. Lakhera","doi":"10.1109/CIPECH.2014.7019043","DOIUrl":"https://doi.org/10.1109/CIPECH.2014.7019043","url":null,"abstract":"A biometric system is weak to a different type of attacks targeted at undermining the reliability of the verification process. These attacks are either imposter or irrevocability. Imposter means information stored in database, can be abused to construction of artificial biometric and replace it for fake authentication and irrevocability means once compromised, biometric not be updated, reissued or destroyed. In this paper we present a general architecture with the help of Digital Signature that guarantees privacy protection of biometric data. We specifically focus on secure a biometric data at the time of authentication and storage.","PeriodicalId":170027,"journal":{"name":"2014 Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130606638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/CIPECH.2014.7019095
Shweta Singh, Dipali Bansal
This paper investigates acoustic patterns generated by different liquids in real time based on spectral analysis technique which finds a lot of relevance in various fields related to defense and homeland security. Some of the drawbacks with existing techniques include limitations with acquisition of well defined patterns for various liquids. To overcome these limitations, this paper describes a technique which involves generation of a single frequency tone in MATLAB with the help of a program and passing that signal through the liquid and then further capturing and analyzing the received signal using a virtual spectrum analyzer. Piezoelectric sensors are used for transmission and receiving the tone through the fluid. The arrangement discussed successfully captures acoustic patterns in non destructive way for five different liquids/solutions by exciting them with various single frequency tones. Thus a low cost system that exhibits consistency in results and can quickly acquire specific acoustic patterns for various fluids is developed that also facilitates easy-to-interpret measurement results.
{"title":"Real time acquisition and frequency domain analysis of acoustic patterns of fluids for applications in the field of homeland security","authors":"Shweta Singh, Dipali Bansal","doi":"10.1109/CIPECH.2014.7019095","DOIUrl":"https://doi.org/10.1109/CIPECH.2014.7019095","url":null,"abstract":"This paper investigates acoustic patterns generated by different liquids in real time based on spectral analysis technique which finds a lot of relevance in various fields related to defense and homeland security. Some of the drawbacks with existing techniques include limitations with acquisition of well defined patterns for various liquids. To overcome these limitations, this paper describes a technique which involves generation of a single frequency tone in MATLAB with the help of a program and passing that signal through the liquid and then further capturing and analyzing the received signal using a virtual spectrum analyzer. Piezoelectric sensors are used for transmission and receiving the tone through the fluid. The arrangement discussed successfully captures acoustic patterns in non destructive way for five different liquids/solutions by exciting them with various single frequency tones. Thus a low cost system that exhibits consistency in results and can quickly acquire specific acoustic patterns for various fluids is developed that also facilitates easy-to-interpret measurement results.","PeriodicalId":170027,"journal":{"name":"2014 Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116980186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}