首页 > 最新文献

2014 IEEE International Conference on Computational Intelligence and Computing Research最新文献

英文 中文
Power analysis attack on 8051 microcontrollers 8051单片机的功耗分析攻击
P. Saravanan, Nithya Rajadurai, P. Kalpana
In this modern era of electronics almost all day to day activities are governed by electronic devices. Even money transactions have been made electronic with the advent of smart cards. These smart cards contain small controller chips which executes encryption algorithm to make the transactions secure. Though the software algorithm is powerful, their security is weakened when implemented in hardware, as they are vulnerable to power analysis attacks. This paper explores the vulnerability of the widely used 8051 microcontroller to simple power analysis attack.
在这个现代电子时代,几乎所有的日常活动都是由电子设备控制的。随着智能卡的出现,就连货币交易也实现了电子化。这些智能卡包含执行加密算法的小型控制器芯片,以确保交易安全。虽然软件算法很强大,但在硬件上实现时,其安全性被削弱,因为它们容易受到功率分析攻击。本文探讨了广泛使用的8051单片机在简单的功耗分析攻击下的脆弱性。
{"title":"Power analysis attack on 8051 microcontrollers","authors":"P. Saravanan, Nithya Rajadurai, P. Kalpana","doi":"10.1109/ICCIC.2014.7238441","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238441","url":null,"abstract":"In this modern era of electronics almost all day to day activities are governed by electronic devices. Even money transactions have been made electronic with the advent of smart cards. These smart cards contain small controller chips which executes encryption algorithm to make the transactions secure. Though the software algorithm is powerful, their security is weakened when implemented in hardware, as they are vulnerable to power analysis attacks. This paper explores the vulnerability of the widely used 8051 microcontroller to simple power analysis attack.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133933225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Random forest and change point detection for root cause localization in large scale systems 随机森林和变化点检测在大规模系统中根本原因定位中的应用
Dhan V. Sagar, P. Sivakumar, R. V. Anand
Identification of root causes of a performance problem is very difficult in case of large scale IT environment. A model which is scalable and reasonably accurate is required for such complex scenarios. This paper proposes a hybrid model using random forest and statistical change point detection, for root cause localization. Based on impurity measure and change in error rates, random forest identifies the features which can be a potential cause for the problem. Since it is a tree based approach, it does not require any prior information about the measured features. To reduce the number of false classifications, a second level of selection using change point analysis is done. The ability of random forest to work well on very large dataset makes the solution scalable and accurate. Proposed model is applied and verified by identifying the root causes for Service Level Objective Violations in enterprise IT systems.
在大型IT环境中,识别性能问题的根本原因是非常困难的。对于如此复杂的场景,需要一个可伸缩且相当准确的模型。本文提出了一种基于随机森林和统计变化点检测的混合模型,用于根本原因定位。基于杂质测量和错误率的变化,随机森林识别可能是问题的潜在原因的特征。由于它是基于树的方法,它不需要任何关于测量特征的先验信息。为了减少错误分类的数量,使用变化点分析进行了第二级选择。随机森林在非常大的数据集上运行良好的能力使解决方案具有可扩展性和准确性。通过识别企业IT系统中服务水平目标违反的根本原因,对所提出的模型进行了应用和验证。
{"title":"Random forest and change point detection for root cause localization in large scale systems","authors":"Dhan V. Sagar, P. Sivakumar, R. V. Anand","doi":"10.1109/ICCIC.2014.7238442","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238442","url":null,"abstract":"Identification of root causes of a performance problem is very difficult in case of large scale IT environment. A model which is scalable and reasonably accurate is required for such complex scenarios. This paper proposes a hybrid model using random forest and statistical change point detection, for root cause localization. Based on impurity measure and change in error rates, random forest identifies the features which can be a potential cause for the problem. Since it is a tree based approach, it does not require any prior information about the measured features. To reduce the number of false classifications, a second level of selection using change point analysis is done. The ability of random forest to work well on very large dataset makes the solution scalable and accurate. Proposed model is applied and verified by identifying the root causes for Service Level Objective Violations in enterprise IT systems.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"402 1-6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131579968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stability improvement and power flow control of a grid connected offshore wind farm system using IPFC 基于IPFC的并网海上风电场系统稳定性改善与潮流控制
P. S. Anitha Kumar, G. Radhakrishnan, V. Gopalakrishnan
Power flow control and stability improvement of a transmission line connected with three energy sources for different loads are studied, in which Flexible AC Transmission system (FACTS) controllers are used to balance the power flow in transmission lines and increase the effective use of transmission line by improving stability of the power system. The Interline Power Flow Controller is the FACTS device used, it consists of static synchronous series compensator to reduce low frequency oscillation, and damping produced is reduced by designing an oscillation damping controller. Among the three sources of energy to transmission line one is considered as renewable wind farm that are capable of producing 9MW power. A Simulink system is developed for the proposed system and the output waveforms are analyzed for various parameters such as voltage, real and reactive power.
研究了不同负荷下三源并网输电线路的潮流控制与稳定性改善问题,利用柔性交流输电系统(FACTS)控制器来平衡输电线路中的潮流,通过提高电力系统的稳定性来提高输电线路的有效利用率。线间功率流控制器采用的是FACTS装置,它由静态同步串联补偿器来减小低频振荡,并通过设计振荡阻尼控制器来减小产生的阻尼。在输电线的三种能源中,有一种被认为是可再生风力发电厂,能够产生9MW的电力。针对该系统开发了Simulink仿真系统,并对输出波形在电压、实功率和无功功率等参数下进行了分析。
{"title":"Stability improvement and power flow control of a grid connected offshore wind farm system using IPFC","authors":"P. S. Anitha Kumar, G. Radhakrishnan, V. Gopalakrishnan","doi":"10.1109/ICCIC.2014.7238316","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238316","url":null,"abstract":"Power flow control and stability improvement of a transmission line connected with three energy sources for different loads are studied, in which Flexible AC Transmission system (FACTS) controllers are used to balance the power flow in transmission lines and increase the effective use of transmission line by improving stability of the power system. The Interline Power Flow Controller is the FACTS device used, it consists of static synchronous series compensator to reduce low frequency oscillation, and damping produced is reduced by designing an oscillation damping controller. Among the three sources of energy to transmission line one is considered as renewable wind farm that are capable of producing 9MW power. A Simulink system is developed for the proposed system and the output waveforms are analyzed for various parameters such as voltage, real and reactive power.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131588255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ultra area efficient reversible Quantum Radix-2 booth's recoding multiplier for low power applications 用于低功耗应用的超面积高效可逆量子基数-2展台的重新编码乘法器
Kaveri Talawar, Poonam Hosamani
Reversible logic plays a vital role in Quantum computing and Nanotechnology which in future can be applied for low power processor applications. In this paper, we propose, ultra area efficient reversible quantum multiplier based on Radix-2 Booth's recoding algorithm. The Non-Fault tolerant Radix-2 Booth's recoding architecture is designed and optimized for Quantum Cost and Garbage Outputs. The proposed methodology for reversible quantum multiplier shows the improvement in terms of Quantum Cost, Garbage Outputs and gates count compared to all the existing reversible quantum multiplier designs.
可逆逻辑在量子计算和纳米技术中起着至关重要的作用,未来可以应用于低功耗处理器应用。本文提出了一种基于Radix-2 Booth重编码算法的超面积高效可逆量子乘法器。非容错的Radix-2 Booth的编码架构是针对量子成本和垃圾输出进行设计和优化的。与所有现有的可逆量子乘法器设计相比,所提出的可逆量子乘法器在量子成本、垃圾输出和门数方面都有改进。
{"title":"Ultra area efficient reversible Quantum Radix-2 booth's recoding multiplier for low power applications","authors":"Kaveri Talawar, Poonam Hosamani","doi":"10.1109/ICCIC.2014.7238484","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238484","url":null,"abstract":"Reversible logic plays a vital role in Quantum computing and Nanotechnology which in future can be applied for low power processor applications. In this paper, we propose, ultra area efficient reversible quantum multiplier based on Radix-2 Booth's recoding algorithm. The Non-Fault tolerant Radix-2 Booth's recoding architecture is designed and optimized for Quantum Cost and Garbage Outputs. The proposed methodology for reversible quantum multiplier shows the improvement in terms of Quantum Cost, Garbage Outputs and gates count compared to all the existing reversible quantum multiplier designs.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131749993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A refined rough fuzzy clustering algorithm 一种改进的粗糙模糊聚类算法
Sahil Sobti, Vivek Shah, B. Tripathy
Clustering is a familiar concept in the realm of Data mining and has wide applications in areas like image processing, pattern recognition and rule generation. Uncertainty in present day databases is a common feature. In order to handle these datasets, several clustering algorithms have been formulated in the literature. The first one being the Fuzzy C-Means (FCM) algorithm and it was followed by the Rough C-Means (RCM) by Lingras. In the paper Lingras has refined his previous algorithm. We combine this algorithm with the fuzzy C-means algorithm to generate a rough fuzzy C-Means (RFCM) algorithm in this paper. Also, we provide a comparative analysis with earlier RFCM algorithm introduced by Mitra et al and establish that our algorithm performs better. We use both numeric as well as image datasets as input and use the performance indices DB and D for this purpose.
聚类是数据挖掘领域中一个熟悉的概念,在图像处理、模式识别和规则生成等领域有着广泛的应用。当前数据库的不确定性是一个共同的特征。为了处理这些数据集,文献中已经制定了几种聚类算法。首先是模糊c均值(Fuzzy C-Means, FCM)算法,其次是粗糙c均值(Rough C-Means, RCM)算法。在论文中,林格拉斯改进了他之前的算法。本文将该算法与模糊c均值算法相结合,生成了一种粗糙模糊c均值(RFCM)算法。此外,我们还与Mitra等人引入的早期RFCM算法进行了比较分析,并证明我们的算法性能更好。我们使用数字和图像数据集作为输入,并为此使用性能指标DB和D。
{"title":"A refined rough fuzzy clustering algorithm","authors":"Sahil Sobti, Vivek Shah, B. Tripathy","doi":"10.1109/ICCIC.2014.7238516","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238516","url":null,"abstract":"Clustering is a familiar concept in the realm of Data mining and has wide applications in areas like image processing, pattern recognition and rule generation. Uncertainty in present day databases is a common feature. In order to handle these datasets, several clustering algorithms have been formulated in the literature. The first one being the Fuzzy C-Means (FCM) algorithm and it was followed by the Rough C-Means (RCM) by Lingras. In the paper Lingras has refined his previous algorithm. We combine this algorithm with the fuzzy C-means algorithm to generate a rough fuzzy C-Means (RFCM) algorithm in this paper. Also, we provide a comparative analysis with earlier RFCM algorithm introduced by Mitra et al and establish that our algorithm performs better. We use both numeric as well as image datasets as input and use the performance indices DB and D for this purpose.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132907132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Steganography over video file by hiding video in another video file, random byte hiding and LSB technique 通过将视频隐藏在另一个视频文件中,随机字节隐藏和LSB技术对视频文件进行隐写
Rachna Patel, Mukesh Patel
Steganography is an art of hiding the secret data or information inside the digitally covered information. The hidden message can be text, image, speech (audio) or even video and the cover can be chosen accordingly from either a text, an image, an audio or a video. The traditional method uses image as a cover which has the limitation of embedding dimension. So, cover should be a video to overcome the limitation of embedding dimension. Nowadays, the use of a video based steganography is common and numbers of steganalysis tools are available to check whether the video is stego-video or not. Most of the tools are checking for information hided by LSB, DCT, Frequency Domain Analysis etc and finds whether the video has hidden or secret data or not. In this paper, the video based steganography techniques are discussed specifically, video in another video technique this means that the cover is video and MATLAB based implementation is done to simulate the results.
隐写术是一种将秘密数据或信息隐藏在数字覆盖的信息中的艺术。隐藏的信息可以是文本、图像、语音(音频)甚至视频,封面可以相应地从文本、图像、音频或视频中选择。传统的方法采用图像作为掩蔽物,存在嵌入维数的限制。因此,为了克服嵌入维度的限制,封面应该是视频。如今,使用基于视频的隐写术是很常见的,并且有许多隐写分析工具可以检查视频是否为隐写视频。大多数工具都是检查LSB, DCT,频域分析等隐藏的信息,并发现视频是否有隐藏或秘密数据。本文对基于视频的隐写技术进行了具体的讨论,视频中的另一种视频技术这意味着覆盖的是视频,并对基于MATLAB的实现结果进行了仿真。
{"title":"Steganography over video file by hiding video in another video file, random byte hiding and LSB technique","authors":"Rachna Patel, Mukesh Patel","doi":"10.1109/ICCIC.2014.7238343","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238343","url":null,"abstract":"Steganography is an art of hiding the secret data or information inside the digitally covered information. The hidden message can be text, image, speech (audio) or even video and the cover can be chosen accordingly from either a text, an image, an audio or a video. The traditional method uses image as a cover which has the limitation of embedding dimension. So, cover should be a video to overcome the limitation of embedding dimension. Nowadays, the use of a video based steganography is common and numbers of steganalysis tools are available to check whether the video is stego-video or not. Most of the tools are checking for information hided by LSB, DCT, Frequency Domain Analysis etc and finds whether the video has hidden or secret data or not. In this paper, the video based steganography techniques are discussed specifically, video in another video technique this means that the cover is video and MATLAB based implementation is done to simulate the results.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132944239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Intelligent control technique for autonomous collective robotics systems 自主集体机器人系统的智能控制技术
A. Akzhalova, A. Kornev, D. Mukharsky
The paper considers the problem of finding maximum number of the radiation sources that are located on the plain field by group of mobile agents with limited time. We formulate both physical and mathematical models that describe the environment and the behavior of mobile agents by including a topology of communication between agents. We propose MPSO-Optima which is improved version of Particle Swarm Optimization (PSO) algorithm adapted to changes in the velocity directions by the conjugate gradient method and optimizing magnitude of the inertia ratio. Both improvements lead to the higher convergence rate that proved by numerical experiments. As a result of the study, the method demonstrates increased resistance to the variation of the acceleration coefficients. The algorithm is tested on virtual simulator environment.
本文研究了在有限时间内移动agent群在平原上寻找最大数量辐射源的问题。我们制定了物理和数学模型,通过包括代理之间通信的拓扑来描述环境和移动代理的行为。本文提出了一种改进的粒子群优化算法(Particle Swarm Optimization, PSO),该算法通过共轭梯度法和优化惯性比的大小来适应速度方向的变化。数值实验证明,这两种改进都提高了收敛速度。研究结果表明,该方法对加速度系数变化的阻力增大。在虚拟仿真环境下对该算法进行了测试。
{"title":"Intelligent control technique for autonomous collective robotics systems","authors":"A. Akzhalova, A. Kornev, D. Mukharsky","doi":"10.1109/ICCIC.2014.7238502","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238502","url":null,"abstract":"The paper considers the problem of finding maximum number of the radiation sources that are located on the plain field by group of mobile agents with limited time. We formulate both physical and mathematical models that describe the environment and the behavior of mobile agents by including a topology of communication between agents. We propose MPSO-Optima which is improved version of Particle Swarm Optimization (PSO) algorithm adapted to changes in the velocity directions by the conjugate gradient method and optimizing magnitude of the inertia ratio. Both improvements lead to the higher convergence rate that proved by numerical experiments. As a result of the study, the method demonstrates increased resistance to the variation of the acceleration coefficients. The algorithm is tested on virtual simulator environment.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128892238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CPLM: Cloud facilitated privacy shielding leakage resilient mobile health monitoring CPLM:云促进隐私屏蔽泄漏弹性移动健康监测
R. J. Anita, Dr Narayana Rao Appini
Cloud-assisted mobile health (mHealth) monitoring is a revolutionary approach to provide decision support in the health care sector. It employs not only mobile communications but also cloud computing technologies to deliver timely suggestions. Its main objective is to not only improve the quality of healthcare service but also to decrease the healthcare expenditure. In spite of the benefits it offers, needless to say the acceptance of such a mobile health monitoring system is affected as it doesn't shield the patients' personal data and also the data of the medicare service providers. As a result of which the wide deployment of mHealth technology is hindered and the patients' consent to participate in such a mobile medicare monitoring scheme is abated. Cloud Facilitated Privacy Shielding Leakage Resilient Mobile Health Monitoring addresses the fore mentioned limitations by offering a privacy shield to the involved parties and their data in addition to handling the side channel attack. To take into consideration the resource constraints of the parties involved, outsourcing decryption and proxy re-encryption are implemented to transfer the computational effort of the privacy shielding scheme to the cloud server without affecting the personal data of the clients and that of the Medicare providers. The side channel attack is handled by implementing a Virtual machine policing approach.
云辅助移动健康(mHealth)监测是在卫生保健部门提供决策支持的一种革命性方法。它不仅使用移动通信,还使用云计算技术来提供及时的建议。其主要目标不仅是提高医疗服务质量,而且是减少医疗支出。尽管它提供了好处,但毋庸置疑,这种移动健康监测系统的接受程度受到了影响,因为它没有保护患者的个人数据,也没有保护医疗服务提供商的数据。因此,移动医疗技术的广泛部署受到阻碍,患者对参与这种移动医疗监测计划的同意也减少了。云促进隐私屏蔽泄漏弹性移动健康监测解决了前面提到的限制,除了处理侧信道攻击外,还为相关方及其数据提供隐私屏蔽。考虑到所涉及各方的资源约束,实施外包解密和代理再加密,将隐私保护方案的计算工作转移到云服务器,而不影响客户和医疗保险提供者的个人数据。通过实现虚拟机监管方法来处理侧信道攻击。
{"title":"CPLM: Cloud facilitated privacy shielding leakage resilient mobile health monitoring","authors":"R. J. Anita, Dr Narayana Rao Appini","doi":"10.1109/ICCIC.2014.7238312","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238312","url":null,"abstract":"Cloud-assisted mobile health (mHealth) monitoring is a revolutionary approach to provide decision support in the health care sector. It employs not only mobile communications but also cloud computing technologies to deliver timely suggestions. Its main objective is to not only improve the quality of healthcare service but also to decrease the healthcare expenditure. In spite of the benefits it offers, needless to say the acceptance of such a mobile health monitoring system is affected as it doesn't shield the patients' personal data and also the data of the medicare service providers. As a result of which the wide deployment of mHealth technology is hindered and the patients' consent to participate in such a mobile medicare monitoring scheme is abated. Cloud Facilitated Privacy Shielding Leakage Resilient Mobile Health Monitoring addresses the fore mentioned limitations by offering a privacy shield to the involved parties and their data in addition to handling the side channel attack. To take into consideration the resource constraints of the parties involved, outsourcing decryption and proxy re-encryption are implemented to transfer the computational effort of the privacy shielding scheme to the cloud server without affecting the personal data of the clients and that of the Medicare providers. The side channel attack is handled by implementing a Virtual machine policing approach.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127802669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of intelligent battery monitoring system for solar powered lighting applications 太阳能照明用智能电池监测系统的开发
J. S. M. Lenord Melvix, K. Sundararamabalasubramanian, M. Madhan
This paper presents an intelligent battery monitoring system to aid in maintaining lead acid batteries used in solar powered lighting systems. In addition to this, the proposed system also employs maximum power point tracking algorithm to optimize battery performance. Remote monitoring of battery system has been implemented using an embedded web server that transfers State of Charge information of battery via Ethernet Network to multiple clients. The system also assists in faster fault rectification by reporting critical conditions that require immediate attention with escalated priorities. This paper explicates salient features of proposed design and also analyzes the performance of developed system.
本文介绍了一种用于太阳能照明系统中铅酸蓄电池的智能监测系统。此外,该系统还采用了最大功率点跟踪算法来优化电池性能。采用嵌入式web服务器,通过以太网将电池的充电状态信息传输到多个客户端,实现了对电池系统的远程监控。该系统还通过报告需要立即关注的紧急情况来帮助更快地解决故障。本文阐述了本设计的主要特点,并对开发系统的性能进行了分析。
{"title":"Development of intelligent battery monitoring system for solar powered lighting applications","authors":"J. S. M. Lenord Melvix, K. Sundararamabalasubramanian, M. Madhan","doi":"10.1109/ICCIC.2014.7238332","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238332","url":null,"abstract":"This paper presents an intelligent battery monitoring system to aid in maintaining lead acid batteries used in solar powered lighting systems. In addition to this, the proposed system also employs maximum power point tracking algorithm to optimize battery performance. Remote monitoring of battery system has been implemented using an embedded web server that transfers State of Charge information of battery via Ethernet Network to multiple clients. The system also assists in faster fault rectification by reporting critical conditions that require immediate attention with escalated priorities. This paper explicates salient features of proposed design and also analyzes the performance of developed system.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131864610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
High level performance in multiple relay networks 在多个中继网络中的高水平性能
V. Eswaramurthy, A. Raghavendra
A relay network is a broad class of network topology commonly used in networks, where the source and destination are interconnected by means of a some nodes. In such a network the source and destination cannot transmit data each other directly, because the distance between the source and destination is greater than the transmission range between them, hence the demand for intermediate node(s) to relay. Relay nodes in applying network coding, follow the decode-and-forward protocol. In proposed work, we consider a peer-to-peer (P2P) network in which peers receive and forward a linear combination of the exogenous data packets. To check out the integrity of the received packets, a key signature vector are generated at the source node and broadcasted to all nodes where it is used to check the integrity of the received packets. There are several information theoretic algorithms for mitigating falsified data injection effects are proposed. The network modeling used in these works is composed of a single source, multiple intermediate nodes which utilize network coding. We consider a multiple access relay network where multiple sources send independent data to a single destination through multiple relays, which may interject falsified data into the network. To detect the malevolent relays and dispose (efface) data from them, trace bits are embedded in the information data at each source node.
中继网络是一种广泛的网络拓扑结构,通常用于网络中,其中源和目的通过一些节点相互连接。在这种网络中,源和目的之间不能直接传输数据,因为源和目的之间的距离大于它们之间的传输距离,因此需要中间节点进行中继。中继节点在应用网络编码时,遵循解码转发协议。在提出的工作中,我们考虑了一个点对点(P2P)网络,其中对等点接收和转发外生数据包的线性组合。为了检查接收到的数据包的完整性,在源节点生成一个密钥签名向量,并将其广播到所有节点,在这些节点中,密钥签名向量用于检查接收到的数据包的完整性。针对伪数据注入效应,提出了几种信息理论算法。在这些工作中使用的网络建模是由一个单一的源,多个中间节点,利用网络编码。我们考虑一个多址中继网络,其中多个源通过多个中继将独立的数据发送到单个目的地,这可能会将伪造的数据插入网络。为了检测恶意中继并清除其中的数据,跟踪位被嵌入到每个源节点的信息数据中。
{"title":"High level performance in multiple relay networks","authors":"V. Eswaramurthy, A. Raghavendra","doi":"10.1109/ICCIC.2014.7238455","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238455","url":null,"abstract":"A relay network is a broad class of network topology commonly used in networks, where the source and destination are interconnected by means of a some nodes. In such a network the source and destination cannot transmit data each other directly, because the distance between the source and destination is greater than the transmission range between them, hence the demand for intermediate node(s) to relay. Relay nodes in applying network coding, follow the decode-and-forward protocol. In proposed work, we consider a peer-to-peer (P2P) network in which peers receive and forward a linear combination of the exogenous data packets. To check out the integrity of the received packets, a key signature vector are generated at the source node and broadcasted to all nodes where it is used to check the integrity of the received packets. There are several information theoretic algorithms for mitigating falsified data injection effects are proposed. The network modeling used in these works is composed of a single source, multiple intermediate nodes which utilize network coding. We consider a multiple access relay network where multiple sources send independent data to a single destination through multiple relays, which may interject falsified data into the network. To detect the malevolent relays and dispose (efface) data from them, trace bits are embedded in the information data at each source node.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124551348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2014 IEEE International Conference on Computational Intelligence and Computing Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1