首页 > 最新文献

2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)最新文献

英文 中文
Security protocol for distributed networks using formal method specification 使用形式化方法规范的分布式网络安全协议
Arun Nandewal, D. Mahendra, K. Chandrasekaran
Denial of service is becoming a growing concern. As our systems communicate more and more with others that we know less and less, they become increasingly vulnerable to hostile intruders who may take advantage of the very protocols intended for the establishment and authentication of communication to tie up our resources and disable our servers. Since these attacks occur before parties are authenticated to each other, we cannot rely upon enforcement of the appropriate access control policy to protect us. Instead we must build our defenses, as much as possible, into the protocols themselves. This paper shows how some principles that have already been used to make protocols more resistant to denial of service can be specified and verified. We specify a protocol for distributed networks and specify, verify it using general formal methods.
拒绝服务正成为一个日益令人担忧的问题。随着我们的系统与我们所知越来越少的其他系统进行越来越多的通信,它们变得越来越容易受到恶意入侵者的攻击,这些入侵者可能会利用用于建立和验证通信的协议来占用我们的资源并禁用我们的服务器。由于这些攻击发生在各方相互身份验证之前,因此我们不能依靠实施适当的访问控制策略来保护我们。相反,我们必须尽可能地在协议本身中建立我们的防御。本文展示了如何指定和验证一些已经用于使协议更能抵抗拒绝服务的原则。我们为分布式网络指定了一个协议,并使用一般的形式化方法指定和验证它。
{"title":"Security protocol for distributed networks using formal method specification","authors":"Arun Nandewal, D. Mahendra, K. Chandrasekaran","doi":"10.1109/ICACCS.2016.7586320","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586320","url":null,"abstract":"Denial of service is becoming a growing concern. As our systems communicate more and more with others that we know less and less, they become increasingly vulnerable to hostile intruders who may take advantage of the very protocols intended for the establishment and authentication of communication to tie up our resources and disable our servers. Since these attacks occur before parties are authenticated to each other, we cannot rely upon enforcement of the appropriate access control policy to protect us. Instead we must build our defenses, as much as possible, into the protocols themselves. This paper shows how some principles that have already been used to make protocols more resistant to denial of service can be specified and verified. We specify a protocol for distributed networks and specify, verify it using general formal methods.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116269902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from dean - research JL innovations 来自JL创新学院院长的信息
G. Karuppusami
The conference will look into the trends and leading-edge practices that are shaping the future in the fields of Information and Communication Technology (ICT). Sri Eshwar College of Engineering (SECE) has the tradition of hosting events in a unique and splendid international style. This was proved during the previous two conferences held during 2013 and 2015.
会议将探讨塑造信息和通信技术(ICT)领域未来的趋势和前沿实践。斯里埃什瓦尔工程学院(SECE)以独特而辉煌的国际风格举办活动。2013年和2015年的前两次会议证明了这一点。
{"title":"Message from dean - research JL innovations","authors":"G. Karuppusami","doi":"10.1109/ICACCS.2016.7586293","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586293","url":null,"abstract":"The conference will look into the trends and leading-edge practices that are shaping the future in the fields of Information and Communication Technology (ICT). Sri Eshwar College of Engineering (SECE) has the tradition of hosting events in a unique and splendid international style. This was proved during the previous two conferences held during 2013 and 2015.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123917677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software-defined networking: Reconfigurable network systems in LAN topology 软件定义网络:局域网拓扑中的可重构网络系统
N. Praveen, K. Kumar
An emerging technology of SDN plays a vital role in network reconfiguration. In an existing system, real word experiment on dynamic changing network topology lacks the ability to change the network configuration. The article works for dynamic reconfiguration in networking through high-level programmability via such C++ or python via SDN controller. In this paper, SDN enable an innovation performance for improving the network reconfigurability through three resources such as controller (Raspberry pi), switch and host nodes. The protocol of Openflow acts as an interface between controller and switch. As a result, the dynamic network reconfigurability solves the problem of manual configuration and reconfiguration to the network operator where the system deploys on campus network.
SDN这一新兴技术在网络重构中起着至关重要的作用。在现有系统中,动态改变网络拓扑结构的真实实验缺乏改变网络配置的能力。本文通过通过SDN控制器通过c++或python等高级可编程性来实现网络中的动态重新配置。在本文中,SDN通过控制器(树莓派)、交换机和主机节点等三种资源实现了提高网络可重构性的创新性能。Openflow协议作为控制器和交换机之间的接口。因此,网络的动态可重构性解决了系统部署在校园网中的网络运营商手动配置和重新配置的问题。
{"title":"Software-defined networking: Reconfigurable network systems in LAN topology","authors":"N. Praveen, K. Kumar","doi":"10.1109/ICACCS.2016.7586370","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586370","url":null,"abstract":"An emerging technology of SDN plays a vital role in network reconfiguration. In an existing system, real word experiment on dynamic changing network topology lacks the ability to change the network configuration. The article works for dynamic reconfiguration in networking through high-level programmability via such C++ or python via SDN controller. In this paper, SDN enable an innovation performance for improving the network reconfigurability through three resources such as controller (Raspberry pi), switch and host nodes. The protocol of Openflow acts as an interface between controller and switch. As a result, the dynamic network reconfigurability solves the problem of manual configuration and reconfiguration to the network operator where the system deploys on campus network.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121227143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wireless energy management and analysis system(WEMAS) 无线能源管理分析系统(WEMAS)
Gardhariya Smit Rajeshbhai, Rachna Jani, Jignesh J. Patoliya, Ekta Mehul
Wireless energy management and analysis is an embedded system implemented for smart metering. In Country like India energy management is done mostly with door-to-door billing system or User have to pay online at only Gram-Panchayat or municipality where authorized person will do payment procedure for User and take the amount. Here pre-Paid scheme is implemented for the user-end. User will get the electricity equivalent to balance in his account. All the activity done by the server implemented over here and some illegal activity at the user-end like stealing of electricity, meter-box's lock broken can be determined etc. Online recharge also can be done as per your need. For security purpose 3AES encryption algorithm is implemented on TCP/IP as well as Xbee communication. 3AES is mixture of AES and 3DES algorithm used in networking for encryption of data.
无线能源管理和分析是一个嵌入式系统实现的智能计量。在印度这样的国家,能源管理主要是通过门到门的计费系统完成的,或者用户必须在网上支付,由授权人员为用户办理支付手续并收取金额。在这里,预付费方案是为用户端实现的。用户将获得相当于其账户余额的电费。服务器所做的所有活动都在这里实现,而用户端的一些非法活动,如偷电,电表箱的锁被打破等都可以被确定。在线充值也可以根据您的需要完成。为了安全起见,在TCP/IP和Xbee通信上实现了3AES加密算法。3AES是AES和3DES算法的混合,用于网络数据加密。
{"title":"Wireless energy management and analysis system(WEMAS)","authors":"Gardhariya Smit Rajeshbhai, Rachna Jani, Jignesh J. Patoliya, Ekta Mehul","doi":"10.1109/ICACCS.2016.7586401","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586401","url":null,"abstract":"Wireless energy management and analysis is an embedded system implemented for smart metering. In Country like India energy management is done mostly with door-to-door billing system or User have to pay online at only Gram-Panchayat or municipality where authorized person will do payment procedure for User and take the amount. Here pre-Paid scheme is implemented for the user-end. User will get the electricity equivalent to balance in his account. All the activity done by the server implemented over here and some illegal activity at the user-end like stealing of electricity, meter-box's lock broken can be determined etc. Online recharge also can be done as per your need. For security purpose 3AES encryption algorithm is implemented on TCP/IP as well as Xbee communication. 3AES is mixture of AES and 3DES algorithm used in networking for encryption of data.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121309082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A study on Fibonacci series generation algorithms 斐波那契级数生成算法的研究
S. M. Farooq, S. H. Shabbeer Basha
many algorithms proposed to generate Fibonacci series introduced by a 12th century Italian mathematician Leonardo Bonacci [1]. The study paper gives insight into three different Fibonacci series generation algorithms. This paper compares and contrasts three different algorithms namely LINEAR_FIB, EXPO_FIB and MATRIX_FIB. Time complexities of these algorithms are computed. The results of our study show that the three algorithms gives linear, exponential and logarithmic time complexities. Finally we discussed application areas of Fibonacci numbers which are generated by the algorithms.
12世纪意大利数学家莱昂纳多·波纳奇(Leonardo Bonacci)提出了许多生成斐波那契级数的算法[1]。研究论文给出了三种不同的斐波那契级数生成算法的见解。本文对线性fib、EXPO_FIB和MATRIX_FIB三种不同的算法进行了比较。计算了这些算法的时间复杂度。我们的研究结果表明,这三种算法给出线性、指数和对数的时间复杂度。最后讨论了算法生成的斐波那契数的应用领域。
{"title":"A study on Fibonacci series generation algorithms","authors":"S. M. Farooq, S. H. Shabbeer Basha","doi":"10.1109/ICACCS.2016.7586379","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586379","url":null,"abstract":"many algorithms proposed to generate Fibonacci series introduced by a 12th century Italian mathematician Leonardo Bonacci [1]. The study paper gives insight into three different Fibonacci series generation algorithms. This paper compares and contrasts three different algorithms namely LINEAR_FIB, EXPO_FIB and MATRIX_FIB. Time complexities of these algorithms are computed. The results of our study show that the three algorithms gives linear, exponential and logarithmic time complexities. Finally we discussed application areas of Fibonacci numbers which are generated by the algorithms.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126070537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Measurement of thickness and roughness using gwyddion 用圭迪翁测量厚度和粗糙度
S. R. Yadhuraj, Satheesh Babu G, Uttara Kumari M
The measurement of thickness and roughness parameters are prime importance in thin film technologies and SPM (Scanning Probe Microscopy) based measurements. Unfortunately data processing is neglected compared to the importance given to the scanning of the data. Many inbuilt softwares are made available to the user which are complex and need expertise user. In this regards gwyddion provides the user friendly and open sources software available for data processing and statistical analysis of the sampled data obtained from SPM measurements. In this work the SPM data are obtained through the database and its morphologies and meteorology are studied using gwyddion software. The results obtained shows software could able to detect with the resolution of nanometers and the software can be used to measure the thickness and roughness measurements with reliable accuracy.
厚度和粗糙度参数的测量在薄膜技术和基于SPM(扫描探针显微镜)的测量中是至关重要的。不幸的是,与重视数据扫描相比,数据处理被忽视了。许多内置的软件是复杂的,需要专业知识的用户可用。在这方面,gwyddion提供了用户友好的开源软件,可用于从SPM测量中获得的采样数据的数据处理和统计分析。本文通过数据库获取SPM数据,并利用gwyddion软件对SPM数据进行形态学和气象学研究。结果表明,该软件可实现纳米级的检测,并可用于测量厚度和粗糙度,具有可靠的精度。
{"title":"Measurement of thickness and roughness using gwyddion","authors":"S. R. Yadhuraj, Satheesh Babu G, Uttara Kumari M","doi":"10.1109/ICACCS.2016.7586314","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586314","url":null,"abstract":"The measurement of thickness and roughness parameters are prime importance in thin film technologies and SPM (Scanning Probe Microscopy) based measurements. Unfortunately data processing is neglected compared to the importance given to the scanning of the data. Many inbuilt softwares are made available to the user which are complex and need expertise user. In this regards gwyddion provides the user friendly and open sources software available for data processing and statistical analysis of the sampled data obtained from SPM measurements. In this work the SPM data are obtained through the database and its morphologies and meteorology are studied using gwyddion software. The results obtained shows software could able to detect with the resolution of nanometers and the software can be used to measure the thickness and roughness measurements with reliable accuracy.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128961096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An adaptive fault identification scheme for DC microgrid using event based classification 基于事件分类的直流微电网自适应故障识别方案
S. S. Balasreedharan, S. Thangavel
The recent high penetration of stationary renewable energy sources yielding DC output coupled with the increased interest in storage systems, electronic loads, machine drives and other components operating with DC input, require the development of new techniques for control and link integration. Faults in power distribution systems have high impact on continuous supply and quality service. If a contingency occurs in a system, instability and cascading failures blackout would be possible. Protection against such severe faults increases the transfer capabilities of the existing transmission systems. The literature survey shows various methods available for the fault identification and fault location. In the existing system each protection unit is able to autonomously identify the type of fault using the current derivative fault identification method. Then the event judgment is sent to other interconnected protection units through high level data communication. But in the existing system there is a limitation that it is possible to limit the load voltage drop up to 2.88%. A novel protective method is proposed to identify the fault, isolate the faulted area and restore the system quickly. The fault identification is based on voltage derivative method. In the voltage derivative protection method, the derivatives ∂V/∂t and ∂I/∂t are calculated from the dc voltages and currents measured locally at the relaying point to detect, locate and isolate the fault. The local voltage and current measurements are taken for each instance of time. It requires less data and doesn't require high speed communication and synchronization. The advantage of this method is that the first incident/reflected wave from the fault is used in the detection and, therefore, the response time is very fast, providing fault detection within 2-3ms than current derivative method. The expected results of the proposed system are to identify the fault, isolated the faulted area and restore the system quickly. The results of the proposed system are verified using MATLAB Simulink.
最近产生直流输出的固定可再生能源的高度渗透,加上对存储系统,电子负载,机器驱动器和其他使用直流输入的组件的兴趣增加,需要开发新的控制和链路集成技术。配电系统故障对配电系统的持续供电和服务质量影响很大。如果系统中发生意外事件,则可能出现不稳定和级联故障。对这种严重故障的保护增加了现有传输系统的传输能力。文献综述显示了各种可用的故障识别和故障定位方法。在现有的系统中,利用现有的微分故障识别方法,各保护单元能够自主识别故障类型。然后将事件判断通过高层数据通信发送到其他互联保护单元。但在现有的系统中存在一个限制,即可能将负载电压降限制在2.88%以内。提出了一种新的故障识别、隔离故障区域、快速恢复系统的保护方法。故障识别基于电压导数法。在电压导数保护方法中,从继电点局部测量的直流电压和电流计算导数∂V/∂t和∂I/∂t,以检测、定位和隔离故障。对每个时间实例进行局部电压和电流测量。它需要更少的数据,不需要高速通信和同步。该方法的优点是利用了故障的第一个入射/反射波进行检测,因此响应时间非常快,与目前的导数方法相比,可以在2-3ms内提供故障检测。该系统的预期结果是能够快速识别故障,隔离故障区域并恢复系统。利用MATLAB Simulink对系统的结果进行了验证。
{"title":"An adaptive fault identification scheme for DC microgrid using event based classification","authors":"S. S. Balasreedharan, S. Thangavel","doi":"10.1109/ICACCS.2016.7586390","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586390","url":null,"abstract":"The recent high penetration of stationary renewable energy sources yielding DC output coupled with the increased interest in storage systems, electronic loads, machine drives and other components operating with DC input, require the development of new techniques for control and link integration. Faults in power distribution systems have high impact on continuous supply and quality service. If a contingency occurs in a system, instability and cascading failures blackout would be possible. Protection against such severe faults increases the transfer capabilities of the existing transmission systems. The literature survey shows various methods available for the fault identification and fault location. In the existing system each protection unit is able to autonomously identify the type of fault using the current derivative fault identification method. Then the event judgment is sent to other interconnected protection units through high level data communication. But in the existing system there is a limitation that it is possible to limit the load voltage drop up to 2.88%. A novel protective method is proposed to identify the fault, isolate the faulted area and restore the system quickly. The fault identification is based on voltage derivative method. In the voltage derivative protection method, the derivatives ∂V/∂t and ∂I/∂t are calculated from the dc voltages and currents measured locally at the relaying point to detect, locate and isolate the fault. The local voltage and current measurements are taken for each instance of time. It requires less data and doesn't require high speed communication and synchronization. The advantage of this method is that the first incident/reflected wave from the fault is used in the detection and, therefore, the response time is very fast, providing fault detection within 2-3ms than current derivative method. The expected results of the proposed system are to identify the fault, isolated the faulted area and restore the system quickly. The results of the proposed system are verified using MATLAB Simulink.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"309 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122805117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Performance enhancement via efficient buffer and cache utilization in Uplink Control Path for LTE 通过在LTE上行控制路径中有效的缓冲和缓存利用来提高性能
P. Srivastava, Raghav Dogra, Ajay Sharma
Physical Uplink Control Channel (PUCCH) is a transmission channel used to transport acknowledgment responses and retransmission requests (Hybrid Automatic Repeat Request (HARQ ACK/NACK)) for Downlink (DL) data packets, send service scheduling requests (SR), transfer channel quality information (CQI) and Multiple Input Multiple Output (MIMO) feedback (such as Rank Indicator (RI) or Precoding Matrix Indicator (PMI) from one or more User Equipment (UE) that can transmit on the control channel to an Evolved Node-Base Station (eNB). In this paper we analyze an existing PUCCH design, which is a part of LTE Uplink Processing Chain and propose methods to optimize the performance of the Uplink Control Path with no incremental change in underlying hardware resources. The proposed design decreases the processor resource consumption by the PUCCH decoder by half (best case) and simplifies LTE Layer 1 Scheduler Design, thereby allowing the system to achieve higher throughput. The results are compared via black box testing over configuration supported by the system. The proposed improvements can be leveraged in other parts of LTE Uplink and Downlink Processing Chain for performance gains.
物理上行控制通道(Physical Uplink Control Channel, PUCCH)是一种传输通道,用于传输对下行(DL)数据包的确认响应和重传请求(HARQ ACK/NACK),发送业务调度请求(SR),传输信道质量信息(CQI)和多输入多输出(MIMO)反馈(如秩指标(RI)或预编码矩阵指标(PMI)),这些反馈信息可以从一个或多个用户设备(UE)在控制信道上传输到演进节点基站(eNB)。在本文中,我们分析了现有的PUCCH设计,它是LTE上行处理链的一部分,并提出了在不增加底层硬件资源变化的情况下优化上行控制路径性能的方法。提出的设计将PUCCH解码器的处理器资源消耗减少了一半(最佳情况),并简化了LTE第1层调度器设计,从而使系统能够实现更高的吞吐量。结果通过黑盒测试与系统支持的配置进行比较。所提出的改进可以用于LTE上行链路和下行链路处理链的其他部分,以获得性能提升。
{"title":"Performance enhancement via efficient buffer and cache utilization in Uplink Control Path for LTE","authors":"P. Srivastava, Raghav Dogra, Ajay Sharma","doi":"10.1109/ICACCS.2016.7586337","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586337","url":null,"abstract":"Physical Uplink Control Channel (PUCCH) is a transmission channel used to transport acknowledgment responses and retransmission requests (Hybrid Automatic Repeat Request (HARQ ACK/NACK)) for Downlink (DL) data packets, send service scheduling requests (SR), transfer channel quality information (CQI) and Multiple Input Multiple Output (MIMO) feedback (such as Rank Indicator (RI) or Precoding Matrix Indicator (PMI) from one or more User Equipment (UE) that can transmit on the control channel to an Evolved Node-Base Station (eNB). In this paper we analyze an existing PUCCH design, which is a part of LTE Uplink Processing Chain and propose methods to optimize the performance of the Uplink Control Path with no incremental change in underlying hardware resources. The proposed design decreases the processor resource consumption by the PUCCH decoder by half (best case) and simplifies LTE Layer 1 Scheduler Design, thereby allowing the system to achieve higher throughput. The results are compared via black box testing over configuration supported by the system. The proposed improvements can be leveraged in other parts of LTE Uplink and Downlink Processing Chain for performance gains.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114774710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of an efficient cascaded inverter with different loads 不同负载下的高效级联逆变器分析
P. M. James, Jaimol Thomas
Multilevel inverter is a very popular converter in many areas including renewable energy integration, HVDC systems, FACTS devices, industrial drives and numerous other power system and power electronic applications. It has many advantages like low power loss, lesser harmonics, low electromagnetic interference, reduced stress on switches etc. Many configurations have been developed over the last few decades like the neutral clamped inverter, flying capacitor inverter, advanced H bridge inverter etc. New configurations capable of reducing the number of switches and increasing the efficiency of inverter are always welcome. This paper considers an efficient topology with reduced number of switches and evaluates harmonic limiting capability. The control used is sinusoidal pulse width modulation. Simulation platform is MATLAB-Simulink. Total harmonics distortion (THD) values are calculated to find out the harmonic limiting capability.
多电平逆变器是一种非常流行的转换器,在许多领域,包括可再生能源集成,HVDC系统,FACTS设备,工业驱动器和许多其他电力系统和电力电子应用。它具有功耗低、谐波小、电磁干扰小、开关受力小等优点。在过去的几十年里,已经开发了许多配置,如中性钳位逆变器,飞电容逆变器,先进的H桥逆变器等。能够减少开关数量和提高逆变器效率的新配置总是受欢迎的。本文考虑了一种减少开关数量的高效拓扑结构,并对其谐波限制能力进行了评估。所使用的控制是正弦脉宽调制。仿真平台为MATLAB-Simulink。通过计算总谐波失真(THD)值来确定谐波限制能力。
{"title":"Analysis of an efficient cascaded inverter with different loads","authors":"P. M. James, Jaimol Thomas","doi":"10.1109/ICACCS.2016.7586342","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586342","url":null,"abstract":"Multilevel inverter is a very popular converter in many areas including renewable energy integration, HVDC systems, FACTS devices, industrial drives and numerous other power system and power electronic applications. It has many advantages like low power loss, lesser harmonics, low electromagnetic interference, reduced stress on switches etc. Many configurations have been developed over the last few decades like the neutral clamped inverter, flying capacitor inverter, advanced H bridge inverter etc. New configurations capable of reducing the number of switches and increasing the efficiency of inverter are always welcome. This paper considers an efficient topology with reduced number of switches and evaluates harmonic limiting capability. The control used is sinusoidal pulse width modulation. Simulation platform is MATLAB-Simulink. Total harmonics distortion (THD) values are calculated to find out the harmonic limiting capability.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134147883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on incremental and iterative models in big data mining environment 大数据挖掘环境中增量与迭代模型研究综述
Priyanka Joseph, J. C. Pamila
It has become increasingly popular to mine big data in order to gain insights to help business decisions or to provide more desirable personalized, higher quality services. They usually include data sets with sizes beyond the ability of commonly used software tools to retrieve, manage, and process data within an adequate elapsed time. So there is big demand for distributed computing framework. As new data and updates are constantly arriving, the results of data mining applications become incomplete over time. In such situations it is desirable to periodically refresh the mined data in order to keep it up-to-date. This paper describes the existing approaches to big data mining which uses these frameworks in an incremental approach that saves and reuses the previous states of computations. It also explores several enhancements introduced in this same framework with iterative mapping characteristics. Gaps in the current methods are identified in this literature review.
挖掘大数据以获得洞察力来帮助商业决策或提供更理想的个性化、更高质量的服务已经变得越来越流行。它们通常包括数据集,其大小超出了常用软件工具在足够的运行时间内检索、管理和处理数据的能力。因此对分布式计算框架的需求很大。随着新数据和更新的不断到来,数据挖掘应用程序的结果随着时间的推移变得不完整。在这种情况下,需要定期刷新挖掘的数据,以使其保持最新状态。本文描述了现有的大数据挖掘方法,这些方法以增量的方式使用这些框架来保存和重用以前的计算状态。本文还探讨了在这个框架中引入的几个具有迭代映射特征的增强。在这篇文献综述中确定了当前方法的差距。
{"title":"Survey on incremental and iterative models in big data mining environment","authors":"Priyanka Joseph, J. C. Pamila","doi":"10.1109/ICACCS.2016.7586377","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586377","url":null,"abstract":"It has become increasingly popular to mine big data in order to gain insights to help business decisions or to provide more desirable personalized, higher quality services. They usually include data sets with sizes beyond the ability of commonly used software tools to retrieve, manage, and process data within an adequate elapsed time. So there is big demand for distributed computing framework. As new data and updates are constantly arriving, the results of data mining applications become incomplete over time. In such situations it is desirable to periodically refresh the mined data in order to keep it up-to-date. This paper describes the existing approaches to big data mining which uses these frameworks in an incremental approach that saves and reuses the previous states of computations. It also explores several enhancements introduced in this same framework with iterative mapping characteristics. Gaps in the current methods are identified in this literature review.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130298583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1