Pub Date : 2019-03-23DOI: 10.1109/ICCI46240.2019.9404523
Anumit Garg, K. S. Nagla
The Kalman Filter is a very successful and popular tool for the estimation of posterior information of several engineering and non-engineering applications. In engineering applications, the estimation of the state of a ballistic missile is an important requirement for the reliable deployment of an anti ballistic missile (ABM) system. But during the measurement of its flight through radar there are many disturbances that tend to add significant amount of error in its readings thus reducing the effectiveness of ballistic missile defense system. Many researches conducted in the field estimated the state of the missile and tried to minimize the error by using various techniques such as Bayesian theorem, Kalman filter and extended Kalman filter. This research examines the Radar related errors, studies the extent of its impacton ABM system and proposes a solution to minimize the errors and increase the effectiveness of the system. The results obtained are used for error estimation in the filtered radar data and theoretically predicted trajectory of the missile. This approach considerably reduces the error and achieves a high level of accuracy in target interception.
{"title":"Error estimation in ballistic missile trajectory using Kalman Filter","authors":"Anumit Garg, K. S. Nagla","doi":"10.1109/ICCI46240.2019.9404523","DOIUrl":"https://doi.org/10.1109/ICCI46240.2019.9404523","url":null,"abstract":"The Kalman Filter is a very successful and popular tool for the estimation of posterior information of several engineering and non-engineering applications. In engineering applications, the estimation of the state of a ballistic missile is an important requirement for the reliable deployment of an anti ballistic missile (ABM) system. But during the measurement of its flight through radar there are many disturbances that tend to add significant amount of error in its readings thus reducing the effectiveness of ballistic missile defense system. Many researches conducted in the field estimated the state of the missile and tried to minimize the error by using various techniques such as Bayesian theorem, Kalman filter and extended Kalman filter. This research examines the Radar related errors, studies the extent of its impacton ABM system and proposes a solution to minimize the errors and increase the effectiveness of the system. The results obtained are used for error estimation in the filtered radar data and theoretically predicted trajectory of the missile. This approach considerably reduces the error and achieves a high level of accuracy in target interception.","PeriodicalId":178834,"journal":{"name":"2019 IEEE International Conference on Innovations in Communication, Computing and Instrumentation (ICCI)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116754731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-23DOI: 10.1109/icci46240.2019.9404529
{"title":"[Copyright notice]","authors":"","doi":"10.1109/icci46240.2019.9404529","DOIUrl":"https://doi.org/10.1109/icci46240.2019.9404529","url":null,"abstract":"","PeriodicalId":178834,"journal":{"name":"2019 IEEE International Conference on Innovations in Communication, Computing and Instrumentation (ICCI)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132166039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-23DOI: 10.1109/ICCI46240.2019.9404483
Kunal Pathak, S. Trivedi, M. H. Ayalani
The renewable energy sources supplying power to the microgrid can have fluctuating power characteristics depending on the environmental conditions. As renewable sources and connected loads have varying power nature, voltage instability conditions arises. To provide a stable voltage at a nominal level as per the standards is the main concern of any power supply network. This paper focuses on Non-isolated Bidirectional Interleaved DC- DC Converter (NIBIC) with battery storage. The NIBIC is controlled based on the voltage of the DC bus, connected to photovoltaic sources with maximum power point tracking technique (MPPT) via boost converter and load. The control circuit of bidirectional DC-DC converter includes current and voltage loop for operating the converter under different operating modes. This paper elaborates the operation of the system in the varying load conditions as well as in the varying irradiance conditions. The simulation model is built in Simulink (MATLAB) environment and the results of the simulation shows the effectiveness of the control strategy.
{"title":"Operation and Control of Non-isolated Interleaved Bidirectional DC-DC Converter Integrated with Solar PV system","authors":"Kunal Pathak, S. Trivedi, M. H. Ayalani","doi":"10.1109/ICCI46240.2019.9404483","DOIUrl":"https://doi.org/10.1109/ICCI46240.2019.9404483","url":null,"abstract":"The renewable energy sources supplying power to the microgrid can have fluctuating power characteristics depending on the environmental conditions. As renewable sources and connected loads have varying power nature, voltage instability conditions arises. To provide a stable voltage at a nominal level as per the standards is the main concern of any power supply network. This paper focuses on Non-isolated Bidirectional Interleaved DC- DC Converter (NIBIC) with battery storage. The NIBIC is controlled based on the voltage of the DC bus, connected to photovoltaic sources with maximum power point tracking technique (MPPT) via boost converter and load. The control circuit of bidirectional DC-DC converter includes current and voltage loop for operating the converter under different operating modes. This paper elaborates the operation of the system in the varying load conditions as well as in the varying irradiance conditions. The simulation model is built in Simulink (MATLAB) environment and the results of the simulation shows the effectiveness of the control strategy.","PeriodicalId":178834,"journal":{"name":"2019 IEEE International Conference on Innovations in Communication, Computing and Instrumentation (ICCI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121151845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-23DOI: 10.1109/icci46240.2019.9404413
{"title":"[Title page]","authors":"","doi":"10.1109/icci46240.2019.9404413","DOIUrl":"https://doi.org/10.1109/icci46240.2019.9404413","url":null,"abstract":"","PeriodicalId":178834,"journal":{"name":"2019 IEEE International Conference on Innovations in Communication, Computing and Instrumentation (ICCI)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115385184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-23DOI: 10.1109/ICCI46240.2019.9404531
Kalariya Chandresh, M. V. Makwana, R. N. Rathod
This paper represents soft switching based push-pull converter for LED application. This prominence of this topology is to reduce conduction loss, higher efficiency and low switching loss. This topology use zero voltage switching to reduce conduction loss. The push pull converter is used as a DC-DC converter very appropriate for low and medium power application. High efficiency, reduced ripple, low switching loss predominance of this application. Here increasing the switching frequency achieve high power density and reduce complexity of the circuit and also they have less component used. Here lower switching loss can be obtained by ZVS method. Here 48 V dc is converted into 12 V dc and switching frequency take 100 KHz, resonance frequency take 300 KHz to obtain soft switching. Here LED application used as a load. This topology is simulated in PSIM.
{"title":"Design and Implementation of Soft Switching based Push Pull Converter for LED Application","authors":"Kalariya Chandresh, M. V. Makwana, R. N. Rathod","doi":"10.1109/ICCI46240.2019.9404531","DOIUrl":"https://doi.org/10.1109/ICCI46240.2019.9404531","url":null,"abstract":"This paper represents soft switching based push-pull converter for LED application. This prominence of this topology is to reduce conduction loss, higher efficiency and low switching loss. This topology use zero voltage switching to reduce conduction loss. The push pull converter is used as a DC-DC converter very appropriate for low and medium power application. High efficiency, reduced ripple, low switching loss predominance of this application. Here increasing the switching frequency achieve high power density and reduce complexity of the circuit and also they have less component used. Here lower switching loss can be obtained by ZVS method. Here 48 V dc is converted into 12 V dc and switching frequency take 100 KHz, resonance frequency take 300 KHz to obtain soft switching. Here LED application used as a load. This topology is simulated in PSIM.","PeriodicalId":178834,"journal":{"name":"2019 IEEE International Conference on Innovations in Communication, Computing and Instrumentation (ICCI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114349415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-23DOI: 10.1109/ICCI46240.2019.9404387
Ramesh Sithara, R. Rajasree
Face recognition has attracted tremendous notice since it has numerous applications in computer vision, communication and automatic control systems. Face recognition frameworks either perform face verification or face identification. Face Detection is the first and most fundamental step in face recognition, and its essential point is to decide if there is a face in an image or not. Be that as it may, automatic face discovery is a mind boggling issue in image and video processing. Anticipating facial features is another major task in facial analysis and is an important step in face identification. Both these tasks are challenging because faces differ in size, shape, color, due to messy background, different face orientation and large fluctuations of the features in different images etc. The main objective of this paper is to provide an overview of some of the popular face recognition approaches and techniques and to compare them.
{"title":"A survey on Face Recognition Technique","authors":"Ramesh Sithara, R. Rajasree","doi":"10.1109/ICCI46240.2019.9404387","DOIUrl":"https://doi.org/10.1109/ICCI46240.2019.9404387","url":null,"abstract":"Face recognition has attracted tremendous notice since it has numerous applications in computer vision, communication and automatic control systems. Face recognition frameworks either perform face verification or face identification. Face Detection is the first and most fundamental step in face recognition, and its essential point is to decide if there is a face in an image or not. Be that as it may, automatic face discovery is a mind boggling issue in image and video processing. Anticipating facial features is another major task in facial analysis and is an important step in face identification. Both these tasks are challenging because faces differ in size, shape, color, due to messy background, different face orientation and large fluctuations of the features in different images etc. The main objective of this paper is to provide an overview of some of the popular face recognition approaches and techniques and to compare them.","PeriodicalId":178834,"journal":{"name":"2019 IEEE International Conference on Innovations in Communication, Computing and Instrumentation (ICCI)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121496209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-23DOI: 10.1109/ICCI46240.2019.9404388
S. Ganesh, A. Celestina, R. Jayashree, K.V. HariPriya
Today's business applications are widely structured on web-based systems that involve information which is dense and demands extensive processing. Many of the tasks involved are repetitive, tedious that take up lot of time and money. Tasks which are periodical like form filling, screen scraping, data extraction and transfer between applications, website testing and periodical report generation are the major tasks that are readily benefitted from web automation. Our project aims at automation of web using RPA technology in healthcare industry, where a software robot or bot that mimics a human worker, logging into applications, entering data, calculating and completing tasks, and logging out.
{"title":"Web Automation in Health Care","authors":"S. Ganesh, A. Celestina, R. Jayashree, K.V. HariPriya","doi":"10.1109/ICCI46240.2019.9404388","DOIUrl":"https://doi.org/10.1109/ICCI46240.2019.9404388","url":null,"abstract":"Today's business applications are widely structured on web-based systems that involve information which is dense and demands extensive processing. Many of the tasks involved are repetitive, tedious that take up lot of time and money. Tasks which are periodical like form filling, screen scraping, data extraction and transfer between applications, website testing and periodical report generation are the major tasks that are readily benefitted from web automation. Our project aims at automation of web using RPA technology in healthcare industry, where a software robot or bot that mimics a human worker, logging into applications, entering data, calculating and completing tasks, and logging out.","PeriodicalId":178834,"journal":{"name":"2019 IEEE International Conference on Innovations in Communication, Computing and Instrumentation (ICCI)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121824179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-23DOI: 10.1109/ICCI46240.2019.9404498
Basudha Bhattacharjee, Antara Das, Z. Livinsa, G. Valantina
Mobility is an important aspect of life, for day to day responsibilities, taking care of oneself, and for getting through life in general. While most people are blessed with the ability to do so, a few unfortunate ones face a lot of problems, and have to go through life while being assisted in some way or the other by people around them. The main inspiration behind this idea is to minimize the dependability of the visually impaired people, so as to help them move around a little bit easily than usual. This paper proposes a model and a system to navigate through unknown roads with safety and also provides an option of storing the user's location into a cloud for tracking purpose, which could also fight the problem of human trafficking.
{"title":"Directional assistant for the visually impaired with data logger for anti-trafficking","authors":"Basudha Bhattacharjee, Antara Das, Z. Livinsa, G. Valantina","doi":"10.1109/ICCI46240.2019.9404498","DOIUrl":"https://doi.org/10.1109/ICCI46240.2019.9404498","url":null,"abstract":"Mobility is an important aspect of life, for day to day responsibilities, taking care of oneself, and for getting through life in general. While most people are blessed with the ability to do so, a few unfortunate ones face a lot of problems, and have to go through life while being assisted in some way or the other by people around them. The main inspiration behind this idea is to minimize the dependability of the visually impaired people, so as to help them move around a little bit easily than usual. This paper proposes a model and a system to navigate through unknown roads with safety and also provides an option of storing the user's location into a cloud for tracking purpose, which could also fight the problem of human trafficking.","PeriodicalId":178834,"journal":{"name":"2019 IEEE International Conference on Innovations in Communication, Computing and Instrumentation (ICCI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116199448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-23DOI: 10.1109/ICCI46240.2019.9404383
Rinu Rani Jose, A. Salim
Malware industry is growing exponentially and the Internet is used as an entry point by most of the malwares. Thus the Internet security have been severely affected by the drastic growth of malwares. Malware detection is critical for protection against data theft, security breaches and other dangers. But the detection techniques continues to be challenging, as the attackers invent new techniques in order to resist the detection methods. It is reported that over 98% of the new malwares are exactly the derivatives of already existing malware families. Thus efficient techniques are required for the identification of malware variants or samples. This paper aims to overview various techniques developed so far for malware detection. Each of the examined techniques relies on either static, or dynamic or a combined approach.
{"title":"Malware Variants Detection Methods","authors":"Rinu Rani Jose, A. Salim","doi":"10.1109/ICCI46240.2019.9404383","DOIUrl":"https://doi.org/10.1109/ICCI46240.2019.9404383","url":null,"abstract":"Malware industry is growing exponentially and the Internet is used as an entry point by most of the malwares. Thus the Internet security have been severely affected by the drastic growth of malwares. Malware detection is critical for protection against data theft, security breaches and other dangers. But the detection techniques continues to be challenging, as the attackers invent new techniques in order to resist the detection methods. It is reported that over 98% of the new malwares are exactly the derivatives of already existing malware families. Thus efficient techniques are required for the identification of malware variants or samples. This paper aims to overview various techniques developed so far for malware detection. Each of the examined techniques relies on either static, or dynamic or a combined approach.","PeriodicalId":178834,"journal":{"name":"2019 IEEE International Conference on Innovations in Communication, Computing and Instrumentation (ICCI)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132734111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-23DOI: 10.1109/ICCI46240.2019.9404429
Vineetha Mathai, A. Chithra, P. Indumathi
The Spectrum scarcity is a major issue faced in wireless communication nowadays. To mitigate this problem, cognitive radio technology is the solution since utilizes the spectrum in an adaptable manner. The security of the cognitive radio was achieved by implementing relay selection scheme in the Physical layer. In underlay cognitive network due to the coexistence of primary user and secondary user, The Secondary user must in turn guard the primary user from the Eavesdropper. Here Cooperative diversity combining is incorporated with relay nodes in multipath fading environment to improve the secrecy performance in terms of Secrecy Outage Probability and Bit Error Rate (BER). The secrecy rate of the cognitive radio network has been analyzed with and without relay. It is obvious that Maximal ratio combining outperforms Selection combining scheme since the signals from each channel are added together. From the numerical results it is evident that BER comes down to 10−3 which is the required standard value for the wireless fading environment. Also the Outage probability with Amplify and Forward (AF) plus direct transmission gives the best performance compared to direct transmission.
{"title":"Performance Evaluation of Secured Co-operative Networks using Diversity Combining Techniques","authors":"Vineetha Mathai, A. Chithra, P. Indumathi","doi":"10.1109/ICCI46240.2019.9404429","DOIUrl":"https://doi.org/10.1109/ICCI46240.2019.9404429","url":null,"abstract":"The Spectrum scarcity is a major issue faced in wireless communication nowadays. To mitigate this problem, cognitive radio technology is the solution since utilizes the spectrum in an adaptable manner. The security of the cognitive radio was achieved by implementing relay selection scheme in the Physical layer. In underlay cognitive network due to the coexistence of primary user and secondary user, The Secondary user must in turn guard the primary user from the Eavesdropper. Here Cooperative diversity combining is incorporated with relay nodes in multipath fading environment to improve the secrecy performance in terms of Secrecy Outage Probability and Bit Error Rate (BER). The secrecy rate of the cognitive radio network has been analyzed with and without relay. It is obvious that Maximal ratio combining outperforms Selection combining scheme since the signals from each channel are added together. From the numerical results it is evident that BER comes down to 10−3 which is the required standard value for the wireless fading environment. Also the Outage probability with Amplify and Forward (AF) plus direct transmission gives the best performance compared to direct transmission.","PeriodicalId":178834,"journal":{"name":"2019 IEEE International Conference on Innovations in Communication, Computing and Instrumentation (ICCI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115155313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}