Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586400
M. Valarmathi, L. Sumathi, G. Deepika
Internet of Things (IoT) paradigm is gaining immense importance in today's world of rapid connectivity. Mobile IoT scenario like Smart City is characterized by short and recurrent contact between IoT devices. The existence of contacts between the mobile and infrastructure devices is an enabler for nodes to discover their neighbors to relay data. A recent chapter in research aims at learning the mobility pattern of devices to improve efficiency of discovery. In this paper, various techniques that are available for neighbor discovery are discussed and it is shown that knowledge integration in the process of node discovery leads to efficient scheduling of resources.
{"title":"A survey on node discovery in Mobile Internet of Things(IoT) scenarios","authors":"M. Valarmathi, L. Sumathi, G. Deepika","doi":"10.1109/ICACCS.2016.7586400","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586400","url":null,"abstract":"Internet of Things (IoT) paradigm is gaining immense importance in today's world of rapid connectivity. Mobile IoT scenario like Smart City is characterized by short and recurrent contact between IoT devices. The existence of contacts between the mobile and infrastructure devices is an enabler for nodes to discover their neighbors to relay data. A recent chapter in research aims at learning the mobility pattern of devices to improve efficiency of discovery. In this paper, various techniques that are available for neighbor discovery are discussed and it is shown that knowledge integration in the process of node discovery leads to efficient scheduling of resources.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128798953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586349
S. Jena, Bhabasis Mohapatra, C. Panigrahi, Subodh Kumar Mohanty
At present-day scenario, renewable energy sources become a substitute source of energy to reduce environment pollution and future energy demand. Commonly pulse width modulated voltage source inverter is widely used for the interconnecting renewable to the existing grid. For the control of the converter hysteresis current controller is one of the popular control strategies. But hysteresis Current Controller has the drawback of inconsistence switching frequency. In this paper a hysteresis current controller with offset band for single phase grid integrated pulse width modulated voltage source inverter has been implemented. In the conventional hysteresis current controller an offset band is introduced for considerable diminution in switching frequency and better power quality. The MATLAB-Simulink environment is used to model, study and simulate the system.
{"title":"Power quality improvement of 1-φ grid integrated pulse width modulated voltage source inverter using hysteresis Current Controller with offset band","authors":"S. Jena, Bhabasis Mohapatra, C. Panigrahi, Subodh Kumar Mohanty","doi":"10.1109/ICACCS.2016.7586349","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586349","url":null,"abstract":"At present-day scenario, renewable energy sources become a substitute source of energy to reduce environment pollution and future energy demand. Commonly pulse width modulated voltage source inverter is widely used for the interconnecting renewable to the existing grid. For the control of the converter hysteresis current controller is one of the popular control strategies. But hysteresis Current Controller has the drawback of inconsistence switching frequency. In this paper a hysteresis current controller with offset band for single phase grid integrated pulse width modulated voltage source inverter has been implemented. In the conventional hysteresis current controller an offset band is introduced for considerable diminution in switching frequency and better power quality. The MATLAB-Simulink environment is used to model, study and simulate the system.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133952264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586341
John William Carey Medithe, U. R. Nelakuditi
Electroencephalogram (EEG) is the most efficient medical imaging tool to analyze and interpret the characteristics of the brain disorder which helps the physician to diagnose the brain disorder patient. EEG signal is a representation of electrical activity over the surface of the brain with respect to time, this electrical activity is caused by the firing of neurons. If these neurons fire in anomalous manner, results in sudden impulses which can be stated as Seizures. If this unusual firing of nerve cells occurs in severe, may result in a shake and loss of control in the subject sometime. EEG waveform information about frequency, amplitude and shape are entirely dependent on the subjects age, state of alertness and location on scalp where the EEG is drawn with electrodes. An EEG waveform is said to be abnormal when the EEG waveform exhibits unusual characteristics which does not match to the subject's state of alertness, age and other factors. In this article it is to study the different types of EEG waveforms both in the case of normal and abnormal and further concentrated on the abnormalities both in the foam of Epileptical and Non-Epileptical. These abnormalities are internally classified as focal and generalized seizures. The comparable tabular form is given to the each type of EEG waveform based on their characteristics.
{"title":"Study of normal and abnormal EEG","authors":"John William Carey Medithe, U. R. Nelakuditi","doi":"10.1109/ICACCS.2016.7586341","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586341","url":null,"abstract":"Electroencephalogram (EEG) is the most efficient medical imaging tool to analyze and interpret the characteristics of the brain disorder which helps the physician to diagnose the brain disorder patient. EEG signal is a representation of electrical activity over the surface of the brain with respect to time, this electrical activity is caused by the firing of neurons. If these neurons fire in anomalous manner, results in sudden impulses which can be stated as Seizures. If this unusual firing of nerve cells occurs in severe, may result in a shake and loss of control in the subject sometime. EEG waveform information about frequency, amplitude and shape are entirely dependent on the subjects age, state of alertness and location on scalp where the EEG is drawn with electrodes. An EEG waveform is said to be abnormal when the EEG waveform exhibits unusual characteristics which does not match to the subject's state of alertness, age and other factors. In this article it is to study the different types of EEG waveforms both in the case of normal and abnormal and further concentrated on the abnormalities both in the foam of Epileptical and Non-Epileptical. These abnormalities are internally classified as focal and generalized seizures. The comparable tabular form is given to the each type of EEG waveform based on their characteristics.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"9 47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130998481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586362
D. Manimala, D. Sundararajan
IEEE 1459-2010 defines a set of power components for measuring power quality factors such as active power, reactive power and apparent power. In a recent paper, the stationary wavelet transform has been proposed to evaluate the power components. In this paper, the use of the stationary wavelet transform to evaluate the power components, as defined by the standard, will further be investigated. Simulation results and computational complexity are provided to validate the proposed approach.
{"title":"Evaluation of IEEE standard 1459-2010 power components using stationary wavelet transform","authors":"D. Manimala, D. Sundararajan","doi":"10.1109/ICACCS.2016.7586362","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586362","url":null,"abstract":"IEEE 1459-2010 defines a set of power components for measuring power quality factors such as active power, reactive power and apparent power. In a recent paper, the stationary wavelet transform has been proposed to evaluate the power components. In this paper, the use of the stationary wavelet transform to evaluate the power components, as defined by the standard, will further be investigated. Simulation results and computational complexity are provided to validate the proposed approach.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130052333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586403
S. Anupama, S. Priya
This paper is a brief survey of various existing methods for an open circuit switch fault diagnosis methods with special focus on three phase voltage source inverters. 15 such methods for open circuit faults has been studied and compared. A new real time fault diagnosis method for three phase pulse width modulated voltage source inverter fed vector controlled induction motor drive is presented in a brief which can detect both single and double switches faults. By the proposed method it has a tendency to get high potency compared with all existing methods. Finally the MATLAB/SIMULINK simulations are carried out which shows the effectiveness and merits of the proposed method.
{"title":"Open circuit switch fault diagnosis methods for VSI fed induction motor drive","authors":"S. Anupama, S. Priya","doi":"10.1109/ICACCS.2016.7586403","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586403","url":null,"abstract":"This paper is a brief survey of various existing methods for an open circuit switch fault diagnosis methods with special focus on three phase voltage source inverters. 15 such methods for open circuit faults has been studied and compared. A new real time fault diagnosis method for three phase pulse width modulated voltage source inverter fed vector controlled induction motor drive is presented in a brief which can detect both single and double switches faults. By the proposed method it has a tendency to get high potency compared with all existing methods. Finally the MATLAB/SIMULINK simulations are carried out which shows the effectiveness and merits of the proposed method.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114299935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586389
K. Akila, S. Chitrakala, S. Vaishnavi
Both videos and images captured during various events play a vital role in information sharing amongst human race from olden days. The images and video captured under varied conditions such as lighting, shading etc., are classified under two major categories viz., controlled and uncontrolled environment. The clarity factor of such multimedia data are affected by factors such as lighting, weather or the equipments used to capture etc., Among various factors, illumination plays a major role in the clarity of videos and images. This paper attempts to enlist various illumination of video / image pertaining to enhancement for various applications.
{"title":"Survey on illumination condition of video / image under heterogeneous environments for enhancement","authors":"K. Akila, S. Chitrakala, S. Vaishnavi","doi":"10.1109/ICACCS.2016.7586389","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586389","url":null,"abstract":"Both videos and images captured during various events play a vital role in information sharing amongst human race from olden days. The images and video captured under varied conditions such as lighting, shading etc., are classified under two major categories viz., controlled and uncontrolled environment. The clarity factor of such multimedia data are affected by factors such as lighting, weather or the equipments used to capture etc., Among various factors, illumination plays a major role in the clarity of videos and images. This paper attempts to enlist various illumination of video / image pertaining to enhancement for various applications.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116464136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586329
Romil Chauhan, Yash S. Jain, Harsh Agarwal, A. Patil
To improve the life of disabled people by use of automated tools, many scientists and organizations have been doing research on designing various products. One such intelligent product is the Voice Controlled Wheelchair. Many methods have been used to design it, each method uses a different hardware and hence providing specific functionalities. In this paper we examine few of the implemented methods and then propose a new model based on the concept of Artificial Intelligence which uses Raspberry Pi, for controlling the device, infrared and ultrasonic sensors for robust obstacle detection, USB microphone for voice input. Thus, enhancing the hardware used in previous models and at the same time achieving cost efficiency.
{"title":"Study of implementation of Voice Controlled Wheelchair","authors":"Romil Chauhan, Yash S. Jain, Harsh Agarwal, A. Patil","doi":"10.1109/ICACCS.2016.7586329","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586329","url":null,"abstract":"To improve the life of disabled people by use of automated tools, many scientists and organizations have been doing research on designing various products. One such intelligent product is the Voice Controlled Wheelchair. Many methods have been used to design it, each method uses a different hardware and hence providing specific functionalities. In this paper we examine few of the implemented methods and then propose a new model based on the concept of Artificial Intelligence which uses Raspberry Pi, for controlling the device, infrared and ultrasonic sensors for robust obstacle detection, USB microphone for voice input. Thus, enhancing the hardware used in previous models and at the same time achieving cost efficiency.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124214659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586323
K. M. Kumar, S. Tejasree, S. Swarnalatha
Big data is emerging technology now in all areas, i.e. like online purchase, E-healthcare, tweet analysis, and banking sector. Now a day's insurance companies are showing interest towards analysis of their huge datasets consists of patient's and hospital's information. From those data sets they extracting some useful information. Mostly they concentrate on success and failure percentage and feedback given by patients. Patients will be applying the hospital bills along with discharge summary, medical reports to the insurance company. Based on the patient procedure insurance company will decide to approve the claim and suggest for new patients. Here in this paper patients records, reports, symptoms, and feedbacks are analyzed using big data technologies like infinispan and map reduce concepts for data extraction and segregation in E-health insurance. Disclosing of patients' private information has been done using private data encoding algorithm.
{"title":"Effective Implementation of Data Segregation and Extraction Using Big Data in E-Health Insurance as a Service","authors":"K. M. Kumar, S. Tejasree, S. Swarnalatha","doi":"10.1109/ICACCS.2016.7586323","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586323","url":null,"abstract":"Big data is emerging technology now in all areas, i.e. like online purchase, E-healthcare, tweet analysis, and banking sector. Now a day's insurance companies are showing interest towards analysis of their huge datasets consists of patient's and hospital's information. From those data sets they extracting some useful information. Mostly they concentrate on success and failure percentage and feedback given by patients. Patients will be applying the hospital bills along with discharge summary, medical reports to the insurance company. Based on the patient procedure insurance company will decide to approve the claim and suggest for new patients. Here in this paper patients records, reports, symptoms, and feedbacks are analyzed using big data technologies like infinispan and map reduce concepts for data extraction and segregation in E-health insurance. Disclosing of patients' private information has been done using private data encoding algorithm.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124615984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586363
R. Sugi, D. Sundararajan
An estimation and analysis of power quality disturbances are essential for the maintenance of power quality of power systems. Since the power quality disturbances are mostly noisy and nonstationary, wavelet transform methods have gained significant importance in analyzing them recently. In a recent paper, the estimation of power quality indices using an empirical wavelet transform has been proposed. In this paper, further investigation of this approach is carried out and a comparison of the use of the empirical and discrete wavelet transform is presented.
{"title":"Estimation of power quality indices using discrete wavelet transform","authors":"R. Sugi, D. Sundararajan","doi":"10.1109/ICACCS.2016.7586363","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586363","url":null,"abstract":"An estimation and analysis of power quality disturbances are essential for the maintenance of power quality of power systems. Since the power quality disturbances are mostly noisy and nonstationary, wavelet transform methods have gained significant importance in analyzing them recently. In a recent paper, the estimation of power quality indices using an empirical wavelet transform has been proposed. In this paper, further investigation of this approach is carried out and a comparison of the use of the empirical and discrete wavelet transform is presented.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124237352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACCS.2016.7586353
I. Nandhini, K. Selvappriya, S. Tamilselvi
The data storage management is the biggest problem in the cloud computing environment. To reduce the storing space and save the bandwidth share the data with others in cloud storage using public-key cryptosystems that produce constant-size cipher texts such that the active delegation of decoding rights for any set of cipher texts but it lead to many privacy problems. To avoid this problem the private and public cloud combine and form a hybrid cloud. In this the confidential data can be stored in private cloud and other data are stored in public cloud. Even though, the exponential growth of ever-increasing volume of data in the cloud has raised many storage challenges. To overcome these challenges we proposed a deduplication technique. It is specialized and resent data compression technique which eliminates redundant data as well as improves the cloud storage and bandwidth utilization. We also present several new deduplication constructions which are supporting authorized duplicate check in hybrid cloud architecture. To protect the confidentiality of sensitive data, whereas supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To provide the highest data security, this paper makes the first attempt to formally address the problem of authorized data deduplication. We also proposed many new deduplication constructions supporting authorized duplicate check in hybrid cloud architecture, which incurs nominal overhead compared to conventional operation.
{"title":"A review of hilevel authorized deduplication method for cloud storage system","authors":"I. Nandhini, K. Selvappriya, S. Tamilselvi","doi":"10.1109/ICACCS.2016.7586353","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586353","url":null,"abstract":"The data storage management is the biggest problem in the cloud computing environment. To reduce the storing space and save the bandwidth share the data with others in cloud storage using public-key cryptosystems that produce constant-size cipher texts such that the active delegation of decoding rights for any set of cipher texts but it lead to many privacy problems. To avoid this problem the private and public cloud combine and form a hybrid cloud. In this the confidential data can be stored in private cloud and other data are stored in public cloud. Even though, the exponential growth of ever-increasing volume of data in the cloud has raised many storage challenges. To overcome these challenges we proposed a deduplication technique. It is specialized and resent data compression technique which eliminates redundant data as well as improves the cloud storage and bandwidth utilization. We also present several new deduplication constructions which are supporting authorized duplicate check in hybrid cloud architecture. To protect the confidentiality of sensitive data, whereas supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To provide the highest data security, this paper makes the first attempt to formally address the problem of authorized data deduplication. We also proposed many new deduplication constructions supporting authorized duplicate check in hybrid cloud architecture, which incurs nominal overhead compared to conventional operation.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128524054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}