首页 > 最新文献

2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)最新文献

英文 中文
A review of passive forensic techniques for detection of copy-move attacks on digital videos 对数字视频复制移动攻击检测的被动取证技术综述
Shashank Sharma, S. Dhavale
In recent times, the ease in availability and usability of digital video editing tools has become a major challenge to video forensic experts, to accurately authenticate any suspected digital video content. Besides, the wide range and rapid advancement in the field of such editing tools and improvements in anti-forensic techniques has enabled any naïve user to edit, alter, and modify any digital video with minimal traces/footprints. Recent surveys in the field of digital video forensics highlight the need of research in this field. The requirement of authenticating the integrity of the contents of digital videos ranges from an individual to organizations, defense and security setups to law enforcement agencies. Further to it, the need to explore newer and more effective Passive (or Blind) video forgery detection approaches is gaining importance day by day. This is attributable to the fact that digital videos are accepted as evidences in most of the countries and real life cases involving tampered digital videos, more often than not, rarely get supplemented by any other reference information besides the suspected video. This paper aims at highlighting the challenges and brings out opportunities in the field of Passive or Blind digital video forensics, focusing on spatio-temporal or copy-move attacks on digital videos, by reviewing the existing literature and research work in this field.
近年来,数字视频编辑工具的易用性和可用性已成为视频法医专家面临的主要挑战,如何准确地鉴定任何可疑的数字视频内容。此外,这种编辑工具领域的广泛和快速发展以及反取证技术的改进使任何naïve用户能够以最小的痕迹/足迹编辑,更改和修改任何数字视频。最近在数字视频取证领域的调查突出了这一领域研究的必要性。从个人到组织,从国防和安全机构到执法机构,都需要验证数字视频内容的完整性。此外,探索更新和更有效的被动(或盲)视频伪造检测方法的需求日益重要。这是因为数字视频在大多数国家都被接受为证据,而现实生活中涉及数字视频篡改的案件,除了嫌疑视频之外,往往很少有其他参考信息的补充。本文旨在通过回顾该领域的现有文献和研究工作,突出被动或盲目数字视频取证领域的挑战和机遇,重点关注数字视频的时空或复制移动攻击。
{"title":"A review of passive forensic techniques for detection of copy-move attacks on digital videos","authors":"Shashank Sharma, S. Dhavale","doi":"10.1109/ICACCS.2016.7586396","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586396","url":null,"abstract":"In recent times, the ease in availability and usability of digital video editing tools has become a major challenge to video forensic experts, to accurately authenticate any suspected digital video content. Besides, the wide range and rapid advancement in the field of such editing tools and improvements in anti-forensic techniques has enabled any naïve user to edit, alter, and modify any digital video with minimal traces/footprints. Recent surveys in the field of digital video forensics highlight the need of research in this field. The requirement of authenticating the integrity of the contents of digital videos ranges from an individual to organizations, defense and security setups to law enforcement agencies. Further to it, the need to explore newer and more effective Passive (or Blind) video forgery detection approaches is gaining importance day by day. This is attributable to the fact that digital videos are accepted as evidences in most of the countries and real life cases involving tampered digital videos, more often than not, rarely get supplemented by any other reference information besides the suspected video. This paper aims at highlighting the challenges and brings out opportunities in the field of Passive or Blind digital video forensics, focusing on spatio-temporal or copy-move attacks on digital videos, by reviewing the existing literature and research work in this field.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123846843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Diffusing multi-aspects of local and global social trust for personalizing trust enhanced recommender system 分散地方和全球社会信任的多方位,实现个性化信任增强推荐系统
K. Senthilkumar, R. P. Principal, R. Gandhi
Recommender systems are an effective solution to the information overload problem, especially in the World Wide Web where we gather vast information from anonymous people around the world. Trust enhanced recommender system to be promising to overcome the cold-start and sparsity challenges of traditional recommender system as well as improving the accuracy of the recommendations. This arise a research focus about blending of the trust information and trust level prediction to the recommendation framework. From the past decade, numerous researches were done to adapt online social network trust (simply social trust) for many web applications, including e-commerce, P2P networks, multi-agent systems, recommendation systems, and service-oriented computing. Usually, online social trust prediction can be based on two mechanisms to acquire trust value: evaluating trustee on basis of truster/truster's neighbor trust experience information (local trust), otherwise evaluating trustee on the basis of the whole social network trust experience information as reputation (global trust). Here, we leverage social science theories to develop the trust models that enable the study of online social trust evolution. In this paper, we propose a matrix factorization based trust enhanced recommendation system which properly incorporates both local trust and global trust with diffusion of the social trust multi-aspects to improve the quality of recommendations for mitigating the data sparsity and the cold-start issues. Through experiments on the Epinions data set, we show that our model outperforms its standard trust enhanced counterparts with respect to accuracy on recommender systems.
推荐系统是解决信息过载问题的有效方法,特别是在万维网上,我们从世界各地的匿名者那里收集大量信息。信任增强推荐系统有望克服传统推荐系统的冷启动和稀疏性问题,提高推荐的准确性。这就引起了将信任信息和信任水平预测融合到推荐框架中的研究热点。在过去的十年里,人们进行了大量的研究,将在线社会网络信任(简称社会信任)应用于许多web应用,包括电子商务、P2P网络、多智能体系统、推荐系统和面向服务的计算。通常,在线社会信任预测可以基于两种机制获取信任价值:基于受托人/受托人的邻居信任经验信息评价受托人(本地信任),或者基于整个社会网络信任经验信息评价受托人(声誉)(全局信任)。本文运用社会科学理论建立信任模型,研究网络社会信任的演化。本文提出了一种基于矩阵分解的信任增强推荐系统,该系统将局部信任和全局信任结合起来,并在社会信任的多个方面进行扩散,以提高推荐质量,减轻数据稀疏性和冷启动问题。通过在Epinions数据集上的实验,我们表明我们的模型在推荐系统的准确性方面优于其标准的信任增强模型。
{"title":"Diffusing multi-aspects of local and global social trust for personalizing trust enhanced recommender system","authors":"K. Senthilkumar, R. P. Principal, R. Gandhi","doi":"10.1109/ICACCS.2016.7586387","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586387","url":null,"abstract":"Recommender systems are an effective solution to the information overload problem, especially in the World Wide Web where we gather vast information from anonymous people around the world. Trust enhanced recommender system to be promising to overcome the cold-start and sparsity challenges of traditional recommender system as well as improving the accuracy of the recommendations. This arise a research focus about blending of the trust information and trust level prediction to the recommendation framework. From the past decade, numerous researches were done to adapt online social network trust (simply social trust) for many web applications, including e-commerce, P2P networks, multi-agent systems, recommendation systems, and service-oriented computing. Usually, online social trust prediction can be based on two mechanisms to acquire trust value: evaluating trustee on basis of truster/truster's neighbor trust experience information (local trust), otherwise evaluating trustee on the basis of the whole social network trust experience information as reputation (global trust). Here, we leverage social science theories to develop the trust models that enable the study of online social trust evolution. In this paper, we propose a matrix factorization based trust enhanced recommendation system which properly incorporates both local trust and global trust with diffusion of the social trust multi-aspects to improve the quality of recommendations for mitigating the data sparsity and the cold-start issues. Through experiments on the Epinions data set, we show that our model outperforms its standard trust enhanced counterparts with respect to accuracy on recommender systems.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122028915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Certain investigation on web application security: Phishing detection and phishing target discovery web应用安全研究:网络钓鱼检测和网络钓鱼目标发现
R. Aravindhan, R. Shanmugalakshmi, K. Ramya, C. Selvan
With the rapid development of web applications, and with the comfort provided by these web applications, internet users utilize this benefits to a great extent that they make almost all their day to day activities such as news paper reading, shopping, electricity bill payment, ticket booking and entertainment with the help of the internet. This phenomenon forces the users of the internet to get connected with the internet for a prolonged time and hence it increases the chances of the users to get caught in the web of phishing - an attack crafted by hackers to steal sensitive information by tempting the users with lucrative offers initially and then redirecting them to a fraudulent website(which the user may not suspect) where they can deceive the user by asking them to submit their credentials(usually users submit their credentials without knowing that these are fake offers created with a sole intention of stealing sensitive information). In spite of the alert and awareness given by the web community in this regard, more and more phishing artist succeed in their attack. Also these phishing artist develop novel attacks such as tab nabbing, website impersonation etc that attracts more and more internet user to be caught in the web of phishing. However many tools and methodologies have been developed to prevent phishing and to alert users orally and visually. But still the success rates of the phishing attack remains high and also the approaches related to phishing detection suffers high false positive and false negative ratio. In this paper various tools and methodologies used to prevent phishing has been analyzed and an efficient mechanism has been proposed to prevent phishing.
随着web应用程序的快速发展,以及这些web应用程序提供的舒适,互联网用户在很大程度上利用了这一好处,他们几乎所有的日常活动,如阅读报纸,购物,支付电费,预订机票和娱乐与互联网的帮助。这种现象迫使互联网的用户与互联网持续一段时间,因此它增加了用户的机会陷入网络钓鱼攻击,精心设计的黑客窃取敏感信息通过诱人的用户提供丰厚的最初,然后将他们一个欺诈性的网站(用户可能不怀疑),在那里他们可以欺骗用户要求他们提交他们的凭证(通常是用户提交他们而不知道这些凭证是伪造的,其唯一目的是窃取敏感信息)。尽管网络社区在这方面给予了警惕和意识,但越来越多的网络钓鱼艺术家成功地进行了攻击。此外,这些网络钓鱼艺术家还开发了新的攻击手段,如标签抓取、网站冒充等,吸引了越来越多的互联网用户陷入网络钓鱼的陷阱。然而,已经开发了许多工具和方法来防止网络钓鱼,并口头和视觉上提醒用户。但是,网络钓鱼攻击的成功率仍然很高,网络钓鱼检测方法的误报率和误报率也很高。本文分析了用于防止网络钓鱼的各种工具和方法,并提出了一种有效的防止网络钓鱼的机制。
{"title":"Certain investigation on web application security: Phishing detection and phishing target discovery","authors":"R. Aravindhan, R. Shanmugalakshmi, K. Ramya, C. Selvan","doi":"10.1109/ICACCS.2016.7586405","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586405","url":null,"abstract":"With the rapid development of web applications, and with the comfort provided by these web applications, internet users utilize this benefits to a great extent that they make almost all their day to day activities such as news paper reading, shopping, electricity bill payment, ticket booking and entertainment with the help of the internet. This phenomenon forces the users of the internet to get connected with the internet for a prolonged time and hence it increases the chances of the users to get caught in the web of phishing - an attack crafted by hackers to steal sensitive information by tempting the users with lucrative offers initially and then redirecting them to a fraudulent website(which the user may not suspect) where they can deceive the user by asking them to submit their credentials(usually users submit their credentials without knowing that these are fake offers created with a sole intention of stealing sensitive information). In spite of the alert and awareness given by the web community in this regard, more and more phishing artist succeed in their attack. Also these phishing artist develop novel attacks such as tab nabbing, website impersonation etc that attracts more and more internet user to be caught in the web of phishing. However many tools and methodologies have been developed to prevent phishing and to alert users orally and visually. But still the success rates of the phishing attack remains high and also the approaches related to phishing detection suffers high false positive and false negative ratio. In this paper various tools and methodologies used to prevent phishing has been analyzed and an efficient mechanism has been proposed to prevent phishing.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115815462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Implementation of AMBA compliant SoC design for the application of detection of landmines on FPGA 在FPGA上实现符合AMBA标准的地雷探测SoC设计
Krutika Keche, K. Mankar
Landmines are an enormous problem around the world for both military personnel and civilians. The landmine detection techniques that have been used over the years involves huge devices, proper setting of the devices, complicated processing systems and much more. All this makes it difficult to use the techniques on the actual war field. In this paper we have presented design and simulation of the processing system that can be used for locating landmines during wars. The objective of the paper is to design and simulate processing system which has high speed, high throughput and low complexity. On chip based system uses advanced micro controller bus architecture. Different circuits are designed and all are interfaced with each other using advanced micro controller bus architecture to form a complete system on chip. The system finally can be used to detect landmines. A complete application to detect the location of the land mines on the war fields is designed on a single chip. High speed processing is need of this application. The system on chip is designed and simulated using Xilinx and FPGA board.
地雷对全世界的军事人员和平民来说都是一个巨大的问题。多年来使用的地雷探测技术涉及巨大的装置、装置的适当设置、复杂的处理系统等等。所有这些都使得这些技术很难在实际战场上使用。本文介绍了一种可用于战时地雷定位的处理系统的设计与仿真。本文的目标是设计和仿真一个高速、高吞吐量、低复杂度的加工系统。基于片上的系统采用先进的单片机总线结构。设计了不同的电路,并采用先进的微控制器总线结构相互连接,形成完整的片上系统。该系统最终可以用于探测地雷。在单芯片上设计了一个完整的战场地雷探测应用程序。这种应用需要高速处理。利用Xilinx和FPGA板对片上系统进行了设计和仿真。
{"title":"Implementation of AMBA compliant SoC design for the application of detection of landmines on FPGA","authors":"Krutika Keche, K. Mankar","doi":"10.1109/ICACCS.2016.7586327","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586327","url":null,"abstract":"Landmines are an enormous problem around the world for both military personnel and civilians. The landmine detection techniques that have been used over the years involves huge devices, proper setting of the devices, complicated processing systems and much more. All this makes it difficult to use the techniques on the actual war field. In this paper we have presented design and simulation of the processing system that can be used for locating landmines during wars. The objective of the paper is to design and simulate processing system which has high speed, high throughput and low complexity. On chip based system uses advanced micro controller bus architecture. Different circuits are designed and all are interfaced with each other using advanced micro controller bus architecture to form a complete system on chip. The system finally can be used to detect landmines. A complete application to detect the location of the land mines on the war fields is designed on a single chip. High speed processing is need of this application. The system on chip is designed and simulated using Xilinx and FPGA board.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116620325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Chief guest & session chairs 首席嘉宾和会议主席
R. Venkatesan
{"title":"Chief guest & session chairs","authors":"R. Venkatesan","doi":"10.1109/icaccs.2016.7586304","DOIUrl":"https://doi.org/10.1109/icaccs.2016.7586304","url":null,"abstract":"","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129410936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secured Service Provider selection methods in Cloud 云中的安全服务提供商选择方法
R. Devi, R. Dhivya, R. Shanmugalakshmi
Cloud computing is an important trend and experienced exponential growth over the last few years. Almost sixty percent of current small-to-medium businesses (SMB) use cloud services. The growth is only expected to increase over the next few years. However, the control of data over the cloud is less for the customers. Hence we lack in trust management which is near about two percentages of the total services provided. Prefer a cloud service provider among numerous vendors based on qualitative and quantitative manner is a challenge for the cloud customer. This paper on the theme of brief examine in existing models which are used for cloud service provider selection in cloud environment and we analysed the criteria which can be improved to provide the best selection.
云计算是一个重要的趋势,在过去几年中经历了指数级的增长。目前几乎60%的中小型企业(SMB)使用云服务。预计在未来几年内,这一增长只会继续增长。然而,客户对云上数据的控制较少。因此,我们缺乏信任管理,这在所提供的全部服务中约占2%。基于定性和定量的方式,在众多供应商中选择一个云服务提供商对云客户来说是一个挑战。本文简要考察了云环境下用于云服务提供商选择的现有模型,并分析了可以改进的标准,以提供最佳选择。
{"title":"Secured Service Provider selection methods in Cloud","authors":"R. Devi, R. Dhivya, R. Shanmugalakshmi","doi":"10.1109/ICACCS.2016.7586334","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586334","url":null,"abstract":"Cloud computing is an important trend and experienced exponential growth over the last few years. Almost sixty percent of current small-to-medium businesses (SMB) use cloud services. The growth is only expected to increase over the next few years. However, the control of data over the cloud is less for the customers. Hence we lack in trust management which is near about two percentages of the total services provided. Prefer a cloud service provider among numerous vendors based on qualitative and quantitative manner is a challenge for the cloud customer. This paper on the theme of brief examine in existing models which are used for cloud service provider selection in cloud environment and we analysed the criteria which can be improved to provide the best selection.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128567604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experimental results of structurally modified high power ultra broadband phased array antenna for extending the operating frequency range and improving the VSWR 结构改进的大功率超宽带相控阵天线扩展工作频率范围,提高驻波比的实验结果
C. Viswanadham, P. Rao
Phased array antennas find many applications in modern electronic systems like radars, satellite communications, trackers, jammers etc. Jammers normally use high power antennas and in military applications, the jammer antennas are mission critical and need to operate continuously over long periods and transmit high power RF signals in a particular direction to provide effective jamming on the threat fire control radars, supporting the missiles. Many types of antennas mounted on rotary platforms were in use for jamming applications over few decades, but steering of the radiation beams electronically with very less reaction time with phased array antennas, fed with a dynamic phase shift network (DPSN) came into existence over past few years, provides highly directive beams for effective jamming. The radiated powers are in the order of few hundreds of power (approx. 300 Watts of CW), generated by TWTs, over wide frequency coverage with BWR >3. In such applications, the ports of the phased array antenna elements are simultaneously fed with high power UWB TWT amplifiers. In this type of applications where high power transmissions are involved, VSWR is an important parameter, which determines the amount of the transmitting power and controls the temperature at the feed point due to heating and many times poor VSWR, damages the feed connector and high cost UWB TWTs. A research has been carried out to improve the VSWR of an eight element 8-18 GHz phased array antenna and improved the VSWR over the extended frequency range of 6-18 GHz, without changing the dimensions of the array. Many conventional methods like dielectric loading, stub matching, etc., [1] were experimented, though little improvement is observed in VSWR performance in certain frequency bands of 8-18 GHz, but could not achieved the required VSWR over 6-18 GHz frequency range. Therefore structural modifications to the aperture of the array have been studied and many experiments have been carried out to evolve mechanism for improving the VSWR over entire frequency range. The experiments were successful and VSWR results were satisfactory over 6-18 GHz. These experiments and the measured results are presented in this paper and the authors would like to promote these methods for any type of aperture antennas.
相控阵天线在现代电子系统中有许多应用,如雷达、卫星通信、跟踪器、干扰器等。干扰机通常使用高功率天线,在军事应用中,干扰机天线是关键任务,需要长时间连续运行,并在特定方向上传输高功率射频信号,以对支持导弹的威胁火控雷达提供有效干扰。几十年来,安装在旋转平台上的许多类型的天线都被用于干扰应用,但在过去几年中,采用动态相移网络(DPSN)馈电的相控阵天线以电子方式控制辐射波束,其反应时间非常短,为有效干扰提供了高度定向的波束。辐射功率大约是几百倍的功率。300瓦连续波),由行波管产生,在宽频率覆盖范围内,BWR >3。在这种应用中,相控阵天线元件的端口同时与大功率超宽带行波管放大器馈电。在涉及高功率传输的这类应用中,驻波比是一个重要的参数,它决定了发射功率的大小,并控制了馈电点的温度,因为加热和多次较差的驻波比会损坏馈电连接器和高成本的UWB行波管。对8-18 GHz八元相控阵天线的驻波比进行了改进研究,在不改变阵列尺寸的情况下,提高了6-18 GHz扩展频率范围内的驻波比。许多传统的方法如介质加载、短段匹配等[1]进行了实验,虽然在8-18 GHz的某些频段的驻波比性能几乎没有改善,但在6-18 GHz的频率范围内无法达到所需的驻波比。因此,研究人员对阵列的孔径进行了结构调整,并进行了大量的实验来探索提高全频率范围内驻波比的机制。实验取得了成功,在6 ~ 18 GHz范围内的VSWR结果令人满意。本文介绍了这些实验和测量结果,并希望将这些方法推广到任何类型的孔径天线。
{"title":"Experimental results of structurally modified high power ultra broadband phased array antenna for extending the operating frequency range and improving the VSWR","authors":"C. Viswanadham, P. Rao","doi":"10.1109/ICACCS.2016.7586354","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586354","url":null,"abstract":"Phased array antennas find many applications in modern electronic systems like radars, satellite communications, trackers, jammers etc. Jammers normally use high power antennas and in military applications, the jammer antennas are mission critical and need to operate continuously over long periods and transmit high power RF signals in a particular direction to provide effective jamming on the threat fire control radars, supporting the missiles. Many types of antennas mounted on rotary platforms were in use for jamming applications over few decades, but steering of the radiation beams electronically with very less reaction time with phased array antennas, fed with a dynamic phase shift network (DPSN) came into existence over past few years, provides highly directive beams for effective jamming. The radiated powers are in the order of few hundreds of power (approx. 300 Watts of CW), generated by TWTs, over wide frequency coverage with BWR >3. In such applications, the ports of the phased array antenna elements are simultaneously fed with high power UWB TWT amplifiers. In this type of applications where high power transmissions are involved, VSWR is an important parameter, which determines the amount of the transmitting power and controls the temperature at the feed point due to heating and many times poor VSWR, damages the feed connector and high cost UWB TWTs. A research has been carried out to improve the VSWR of an eight element 8-18 GHz phased array antenna and improved the VSWR over the extended frequency range of 6-18 GHz, without changing the dimensions of the array. Many conventional methods like dielectric loading, stub matching, etc., [1] were experimented, though little improvement is observed in VSWR performance in certain frequency bands of 8-18 GHz, but could not achieved the required VSWR over 6-18 GHz frequency range. Therefore structural modifications to the aperture of the array have been studied and many experiments have been carried out to evolve mechanism for improving the VSWR over entire frequency range. The experiments were successful and VSWR results were satisfactory over 6-18 GHz. These experiments and the measured results are presented in this paper and the authors would like to promote these methods for any type of aperture antennas.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117036512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of impact on rotor angle stability of DFIG wind turbines employing STATCOM STATCOM对DFIG风力机转子角稳定性的影响分析
T. Tamilarasi, M. Elango
Due to rapid increase in population and industrial growth power demand occurs. Non conventional energy resource, especially wind energy is used to generate the power at low cost. Doubly Fed Induction Generator (DFIG) is used to generate the power which has the capability to generate or absorb the reactive power to or from the grid during grid fault. The objective is to analyze the impact on small signal and transient stability of DFIG wind turbines by Power System stabilizer. High penetration of DFIG wind turbines creates the stability problem in power system due to fluctuations in voltage and frequency which reduces the efficiency and power quality of the system. The generation of power from wind energy causes damage to the system. Power qualities, impact of low power factor, poor grid stability are the issues related with grid interconnection. In proposed method, Static Compensator (STATCOM) controls the voltage, reactive power, power factor. It also reduces the line current, power losses and maximizes the power transfer capability. The MATLAB/SIMULINK software is used to analyze the impact on rotor angle stability of DFIG wind turbines employing STATCOM will be used as Grid Side Converter(GSC) of DFIG wind turbines to provide reactive power compensation and to enhance stability of the power system.
由于人口的快速增长和工业的增长,电力需求出现了。利用非常规能源,特别是风能,以低成本发电。双馈感应发电机(DFIG)是一种能够在电网发生故障时产生或吸收电网无功功率的发电设备。目的是分析电力系统稳定器对DFIG风力发电机组小信号和暂态稳定的影响。DFIG风电机组的高穿透性会引起电压和频率的波动,从而导致电力系统的稳定性问题,降低了系统的效率和电能质量。风能发电会对系统造成损害。电能质量、低功率因数的影响、电网稳定性差是与电网互联相关的问题。在该方法中,静态补偿器(STATCOM)控制电压、无功功率、功率因数。它还减少了线路电流,功率损耗和最大限度地提高了功率传输能力。利用MATLAB/SIMULINK软件分析了采用STATCOM作为DFIG风力机的电网侧变流器(Grid Side Converter, GSC)提供无功补偿,增强电力系统稳定性对DFIG风力机转子角稳定性的影响。
{"title":"Analysis of impact on rotor angle stability of DFIG wind turbines employing STATCOM","authors":"T. Tamilarasi, M. Elango","doi":"10.1109/ICACCS.2016.7586392","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586392","url":null,"abstract":"Due to rapid increase in population and industrial growth power demand occurs. Non conventional energy resource, especially wind energy is used to generate the power at low cost. Doubly Fed Induction Generator (DFIG) is used to generate the power which has the capability to generate or absorb the reactive power to or from the grid during grid fault. The objective is to analyze the impact on small signal and transient stability of DFIG wind turbines by Power System stabilizer. High penetration of DFIG wind turbines creates the stability problem in power system due to fluctuations in voltage and frequency which reduces the efficiency and power quality of the system. The generation of power from wind energy causes damage to the system. Power qualities, impact of low power factor, poor grid stability are the issues related with grid interconnection. In proposed method, Static Compensator (STATCOM) controls the voltage, reactive power, power factor. It also reduces the line current, power losses and maximizes the power transfer capability. The MATLAB/SIMULINK software is used to analyze the impact on rotor angle stability of DFIG wind turbines employing STATCOM will be used as Grid Side Converter(GSC) of DFIG wind turbines to provide reactive power compensation and to enhance stability of the power system.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116053258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A survey on classification techniques for text mining 文本挖掘分类技术综述
S. Brindha, K. Prabha, S. Sukumaran
The development of the World Wide Web it is no longer feasible for a user can understand all the data coming from classify into categories. The expansion of information and power automatic classification of data and textual data gains increasingly and give high performance. In this paper five important text classifications are described Naive Bayesian, K-Nearest Neighbour, Support Vector Machine, Decision Tree and Regression. Which are categorized the text data into pre define class. The target of the paper is to study different classification techniques and finding the classification accuracy for different datasets. An efficient and effective text documents into mutually exclusive categories.
万维网的发展使它不再可行,用户可以理解所有来自分类的数据。随着信息的扩展,数据和文本数据的自动分类能力日益增强,并给出了较高的性能。本文介绍了朴素贝叶斯、k近邻、支持向量机、决策树和回归五种重要的文本分类方法。将文本数据分类到预定义类中。本文的目标是研究不同的分类技术,并找到不同数据集的分类精度。将高效和有效的文本文档分为互斥的类别。
{"title":"A survey on classification techniques for text mining","authors":"S. Brindha, K. Prabha, S. Sukumaran","doi":"10.1109/ICACCS.2016.7586371","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586371","url":null,"abstract":"The development of the World Wide Web it is no longer feasible for a user can understand all the data coming from classify into categories. The expansion of information and power automatic classification of data and textual data gains increasingly and give high performance. In this paper five important text classifications are described Naive Bayesian, K-Nearest Neighbour, Support Vector Machine, Decision Tree and Regression. Which are categorized the text data into pre define class. The target of the paper is to study different classification techniques and finding the classification accuracy for different datasets. An efficient and effective text documents into mutually exclusive categories.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134578750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
A survey on duplicate record detection in real world data 真实数据中重复记录检测的研究进展
Dhivyabharathi G V, S. Kumaresan
Duplicate can be defined as Same entities have two or more representations in the database. The process of finding the multiple representations of same real world entities is called duplicate detection. Detection of duplicates should be fast in large and small datasets. The duplicate detection methods should find the duplicates in shorter time and at the same time quality of the data set should be maintained. In this paper, we present a thorough analysis of literature survey on adaptive and progressive duplicate detection techniques.
重复可以定义为相同的实体在数据库中有两个或多个表示。寻找现实世界中相同实体的多个表示的过程称为重复检测。在大型和小型数据集中,重复的检测应该是快速的。重复检测方法既要在较短的时间内找到重复项,又要保证数据集的质量。在本文中,我们提出了一个全面的文献调查分析自适应和渐进重复检测技术。
{"title":"A survey on duplicate record detection in real world data","authors":"Dhivyabharathi G V, S. Kumaresan","doi":"10.1109/ICACCS.2016.7586397","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586397","url":null,"abstract":"Duplicate can be defined as Same entities have two or more representations in the database. The process of finding the multiple representations of same real world entities is called duplicate detection. Detection of duplicates should be fast in large and small datasets. The duplicate detection methods should find the duplicates in shorter time and at the same time quality of the data set should be maintained. In this paper, we present a thorough analysis of literature survey on adaptive and progressive duplicate detection techniques.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131331801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1