首页 > 最新文献

International Conference & Workshop on Emerging Trends in Technology最新文献

英文 中文
Design and implementation of a universal DMA controller 通用DMA控制器的设计与实现
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980281
A. Wadekar, S. Swapnil, R. Lohani
The direct memory access (DMA) I/O technique provides direct access to the memory while the microprocessor is temporarily disabled. A DMA Controller temporarily borrows the address bus, data bus and control bus from the microprocessor and transfers the data bytes directly between an I/O port and a series of memory locations. The proposed model of a Universal DMA Controller is of generic type and supports much functionality. This DMA Controller can be plugged into any SoC system for the required data transfer operation. Support transactions such as Port 1 IO/Memory to Port1 IO/Memory, Port1 IO/Memory to Port2 IO/Memory, Port2 IO/Memory to Port1 IO/Memory and Port2 IO/Memory to Port2 IO/Memory and many more.
直接存储器访问(DMA) I/O技术在微处理器暂时禁用时提供对存储器的直接访问。DMA控制器暂时从微处理器借用地址总线、数据总线和控制总线,并直接在I/O端口和一系列存储器位置之间传输数据字节。所提出的通用DMA控制器模型是通用类型的,并支持许多功能。这个DMA控制器可以插入到任何SoC系统所需的数据传输操作。支持事务,如端口1 IO/内存到Port1 IO/内存,Port1 IO/内存到Port2 IO/内存,Port2 IO/内存到Port1 IO/内存和Port2 IO/内存到Port2 IO/内存等等。
{"title":"Design and implementation of a universal DMA controller","authors":"A. Wadekar, S. Swapnil, R. Lohani","doi":"10.1145/1980022.1980281","DOIUrl":"https://doi.org/10.1145/1980022.1980281","url":null,"abstract":"The direct memory access (DMA) I/O technique provides direct access to the memory while the microprocessor is temporarily disabled. A DMA Controller temporarily borrows the address bus, data bus and control bus from the microprocessor and transfers the data bytes directly between an I/O port and a series of memory locations. The proposed model of a Universal DMA Controller is of generic type and supports much functionality. This DMA Controller can be plugged into any SoC system for the required data transfer operation. Support transactions such as Port 1 IO/Memory to Port1 IO/Memory, Port1 IO/Memory to Port2 IO/Memory, Port2 IO/Memory to Port1 IO/Memory and Port2 IO/Memory to Port2 IO/Memory and many more.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121398087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Neural network based sensor drift compensation of induction motor 基于神经网络的感应电机传感器漂移补偿
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980148
R. Uthra, N. Kalaiarasi, A. Rathinam
In this paper, sensor drift compensation of vector control of induction motor using neural network is presented. An induction motor is controlled based on vector control. The sensors sense the primary feedback signals for the feedback control system which is processed by the controller. Any fault in the sensors cause incorrect measurements of feedback signals due to malfunction in sensor circuit elements which affects the system performance. Hence, sensor fault compensation or drift compensation is important for an electric drive. Analysis of sensor drift compensation in motor drives is done using neural networks. The feedback signals from the phase current sensors are given as the neural network input. The neural network then performs the auto-associative mapping of these signals so that its output is an estimate of the sensed signals. Since the Auto-associative neural network exploits the physical and analytical redundancy, whenever a sensor starts to drift, the drift is compensated at the output, and the performance of the drive system is barely affected.
提出了一种基于神经网络的感应电机矢量控制传感器漂移补偿方法。基于矢量控制对异步电动机进行控制。传感器对一次反馈信号进行感知,反馈给反馈控制系统,由控制器进行处理。当传感器出现故障时,由于传感器电路元件故障,会导致反馈信号测量错误,从而影响系统性能。因此,传感器故障补偿或漂移补偿对于电驱动是很重要的。利用神经网络对电机驱动中的传感器漂移补偿进行了分析。将来自相电流传感器的反馈信号作为神经网络的输入。然后,神经网络对这些信号进行自动关联映射,使其输出是对感知信号的估计。由于自关联神经网络利用了物理和分析冗余,每当传感器开始漂移时,漂移在输出处得到补偿,并且驱动系统的性能几乎没有受到影响。
{"title":"Neural network based sensor drift compensation of induction motor","authors":"R. Uthra, N. Kalaiarasi, A. Rathinam","doi":"10.1145/1980022.1980148","DOIUrl":"https://doi.org/10.1145/1980022.1980148","url":null,"abstract":"In this paper, sensor drift compensation of vector control of induction motor using neural network is presented. An induction motor is controlled based on vector control. The sensors sense the primary feedback signals for the feedback control system which is processed by the controller. Any fault in the sensors cause incorrect measurements of feedback signals due to malfunction in sensor circuit elements which affects the system performance. Hence, sensor fault compensation or drift compensation is important for an electric drive. Analysis of sensor drift compensation in motor drives is done using neural networks. The feedback signals from the phase current sensors are given as the neural network input. The neural network then performs the auto-associative mapping of these signals so that its output is an estimate of the sensed signals. Since the Auto-associative neural network exploits the physical and analytical redundancy, whenever a sensor starts to drift, the drift is compensated at the output, and the performance of the drive system is barely affected.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121582444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
e-business adoption and implications in the banking industry in India 电子商务在印度银行业的应用及其影响
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980414
P. Mudholkar, M. Shanker, S. Maitra
The introduction of ICT and E-Business in the Banking Industry (hereinafter the BI) has had a significant impact on banks operating with physical branches. Especially the internet has made it possible for banks to cut cost by offering online banking at a lower cost. The econometric analysis show that ICT use is positively correlated with firm restructuring activities. Thus, ICT enables companies to redefine the boundaries of their organizations and possibly gain a competitive advantage. This paper is focusing on ICT and e-business usage in the banking industry. The study objectives are to describe how companies in this industry use ICT for conducting business, to identify opportunities and barriers for ICT adoption, and to assess impacts of this development for firms and for the industry as a whole.
信息通信技术和电子商务在银行业(以下简称BI)的引入对实体分行经营的银行产生了重大影响。特别是互联网使银行能够以较低的成本提供网上银行服务,从而降低成本。计量经济分析表明,信息通信技术的使用与企业重组活动呈正相关。因此,信息通信技术使公司能够重新定义其组织的边界,并可能获得竞争优势。本文的重点是信息通信技术和电子商务在银行业的应用。研究的目的是描述该行业的公司如何使用ICT开展业务,确定采用ICT的机会和障碍,并评估这一发展对公司和整个行业的影响。
{"title":"e-business adoption and implications in the banking industry in India","authors":"P. Mudholkar, M. Shanker, S. Maitra","doi":"10.1145/1980022.1980414","DOIUrl":"https://doi.org/10.1145/1980022.1980414","url":null,"abstract":"The introduction of ICT and E-Business in the Banking Industry (hereinafter the BI) has had a significant impact on banks operating with physical branches. Especially the internet has made it possible for banks to cut cost by offering online banking at a lower cost. The econometric analysis show that ICT use is positively correlated with firm restructuring activities. Thus, ICT enables companies to redefine the boundaries of their organizations and possibly gain a competitive advantage. This paper is focusing on ICT and e-business usage in the banking industry. The study objectives are to describe how companies in this industry use ICT for conducting business, to identify opportunities and barriers for ICT adoption, and to assess impacts of this development for firms and for the industry as a whole.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122200052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Resistive analysis of mixed carbon nanotube bundle interconnect and its comparison with copper interconnect 混合碳纳米管束互连的电阻分析及其与铜互连的比较
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980271
T. Alam, R. Dhiman, R. Chandel
As resistivity of Copper (Cu) increases with technology scaling, this drives us to look for new interconnect material for future very large scale integration (VLSI). Mixed carbon nanotube (CNT) bundle has superior properties like current carrying capacity and conductivity than Cu interconnect. It is the mixture of single wall carbon nanotubes (SWCNTs) and multi-wall carbon nanotubes (MWCNTs) due to the nature of the bottom-up fabrication process. In this paper, impact on resistance of the bundle has been shown due to various process parameters of the bundle and then optimized values of those parameters have been given. This work also presents a comprehensive analysis of bundle and compares its resistance (R) with those of the Cu interconnects for intermediate and global interconnect levels for 32nm technology node. More reduction in bundle resistance has been achieved than the research work reported in literature. The result show that bundle has smaller values of R compared to its Cu interconnect counterparts. This is advantageous for VLSI interconnect design and performance.
由于铜(Cu)的电阻率随着技术的扩展而增加,这促使我们为未来的超大规模集成(VLSI)寻找新的互连材料。混合碳纳米管(CNT)束具有比铜互连线更好的载流能力和导电性。它是单壁碳纳米管(SWCNTs)和多壁碳纳米管(MWCNTs)的混合物,由于自下而上的制造工艺的性质。本文分析了管束的各种工艺参数对管束阻力的影响,并给出了各工艺参数的优化值。本文还对束进行了全面的分析,并将其电阻(R)与32纳米技术节点的中间和全局互连级铜互连的电阻(R)进行了比较。比文献报道的研究工作更能降低束电阻。结果表明,该束具有较小的R值与铜互连的同类。这有利于VLSI互连设计和性能。
{"title":"Resistive analysis of mixed carbon nanotube bundle interconnect and its comparison with copper interconnect","authors":"T. Alam, R. Dhiman, R. Chandel","doi":"10.1145/1980022.1980271","DOIUrl":"https://doi.org/10.1145/1980022.1980271","url":null,"abstract":"As resistivity of Copper (Cu) increases with technology scaling, this drives us to look for new interconnect material for future very large scale integration (VLSI). Mixed carbon nanotube (CNT) bundle has superior properties like current carrying capacity and conductivity than Cu interconnect. It is the mixture of single wall carbon nanotubes (SWCNTs) and multi-wall carbon nanotubes (MWCNTs) due to the nature of the bottom-up fabrication process. In this paper, impact on resistance of the bundle has been shown due to various process parameters of the bundle and then optimized values of those parameters have been given. This work also presents a comprehensive analysis of bundle and compares its resistance (R) with those of the Cu interconnects for intermediate and global interconnect levels for 32nm technology node. More reduction in bundle resistance has been achieved than the research work reported in literature. The result show that bundle has smaller values of R compared to its Cu interconnect counterparts. This is advantageous for VLSI interconnect design and performance.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122240869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Motion sensing in mobile phone 移动电话的运动感应
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980366
S. U. Pacharaney, K. Reddy
With advancement in technology and also increase in consumer requirements, mobile phones are no longer just a mere communication tool. More and more applications are embedded onto the mobile phones nowadays. Here we introduce a novel technique for handheld mobile devices which enables the user interface to be controlled by the motion of the user's hand. A feature --based approach is proposed for local motion estimation that exploits the direction in which the handheld device is moved and the phone's motion is then used to trigger some events on the phone for example photo browsing, music track changing, games control etc. Special motion sensors such as accelerometers provide a straight forward solution but require extra hardware to be installed. Today, computer vision is a more natural choice, because current mobile phones are often are often equipped with cameras that can provide visual input for estimating motion.
随着科技的进步和消费者需求的增加,手机不再仅仅是一个通讯工具。现在越来越多的应用程序被嵌入到手机中。在这里,我们介绍了一种用于手持移动设备的新技术,该技术可以通过用户的手的运动来控制用户界面。我们提出了一种基于功能的局部运动估计方法,即利用手持设备移动的方向,然后使用手机的运动来触发手机上的一些事件,例如照片浏览,音乐轨道更改,游戏控制等。特殊的运动传感器,如加速度计,提供了一个直接的解决方案,但需要额外的硬件安装。今天,计算机视觉是一个更自然的选择,因为现在的手机通常都配备了摄像头,可以提供视觉输入来估计运动。
{"title":"Motion sensing in mobile phone","authors":"S. U. Pacharaney, K. Reddy","doi":"10.1145/1980022.1980366","DOIUrl":"https://doi.org/10.1145/1980022.1980366","url":null,"abstract":"With advancement in technology and also increase in consumer requirements, mobile phones are no longer just a mere communication tool. More and more applications are embedded onto the mobile phones nowadays. Here we introduce a novel technique for handheld mobile devices which enables the user interface to be controlled by the motion of the user's hand. A feature --based approach is proposed for local motion estimation that exploits the direction in which the handheld device is moved and the phone's motion is then used to trigger some events on the phone for example photo browsing, music track changing, games control etc. Special motion sensors such as accelerometers provide a straight forward solution but require extra hardware to be installed. Today, computer vision is a more natural choice, because current mobile phones are often are often equipped with cameras that can provide visual input for estimating motion.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122344808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Escaping difference image histogram steganalysis 转义差分图像直方图隐写分析
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980121
H. B. Kekre, A. Athawale, S. Maheshwari
Steganography is used to hide the occurrence of communication. Discovering and rendering useless such covert message is an art of Steganalysis. A popular Steganalysis technique is Difference Image Histogram (DIH), proposed by Zhang, aimed at LSB steganography. This algorithm can not only detect the existence of hidden messages embedded using sequential or random LSB replacement in images reliably, but also estimate the amount of hidden messages exactly. In this paper a number of stego images are created by varying the percentage of embedding i. e. from 0% to 100% of total number of pixels, total number of ones in the LSB plane and total number of zeros in the LSB plane. The Difference Image Histogram algorithm is applied to all these images. And a result is drawn as to exactly when and why the algorithm fails. A steganographic technique to escape Difference Image Histogram Steganalysis is then presented.
隐写术用于隐藏通信的发生。发现并使这种隐蔽的信息变得无用是一种隐写分析的艺术。一种流行的隐写分析技术是差分图像直方图(DIH),由Zhang提出,针对LSB隐写。该算法不仅能够可靠地检测出图像中是否存在通过顺序或随机LSB替换嵌入的隐藏消息,而且能够准确地估计出隐藏消息的数量。在本文中,通过改变嵌入的百分比,即从总像素数的0%到100%,LSB平面上的总1数和LSB平面上的总0数,创建了许多隐写图像。差分图像直方图算法应用于所有这些图像。并得出一个结果,准确地说明算法何时以及为什么会失败。然后提出了一种逃避差分图像直方图隐写分析的隐写技术。
{"title":"Escaping difference image histogram steganalysis","authors":"H. B. Kekre, A. Athawale, S. Maheshwari","doi":"10.1145/1980022.1980121","DOIUrl":"https://doi.org/10.1145/1980022.1980121","url":null,"abstract":"Steganography is used to hide the occurrence of communication. Discovering and rendering useless such covert message is an art of Steganalysis. A popular Steganalysis technique is Difference Image Histogram (DIH), proposed by Zhang, aimed at LSB steganography. This algorithm can not only detect the existence of hidden messages embedded using sequential or random LSB replacement in images reliably, but also estimate the amount of hidden messages exactly.\u0000 In this paper a number of stego images are created by varying the percentage of embedding i. e. from 0% to 100% of total number of pixels, total number of ones in the LSB plane and total number of zeros in the LSB plane. The Difference Image Histogram algorithm is applied to all these images. And a result is drawn as to exactly when and why the algorithm fails. A steganographic technique to escape Difference Image Histogram Steganalysis is then presented.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115978112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overview of visual analytics 视觉分析概述
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980329
A. Chopra, R. Samant
Visual analytics is "the science of analytical reasoning facilitated by visual interactive interfaces." It can attack certain problems whose size, complexity, and need for closely coupled human and machine analysis may make them otherwise intractable. Visual analytics advances science and technology developments in analytical reasoning, interaction, data transformations and representations for computation and visualization, analytic reporting, and technology transition. As a research agenda, visual analytics brings together several scientific and technical communities from computer science, information visualization, cognitive and perceptual sciences, interactive design, graphic design, and social sciences. This science of analytical reasoning provides the reasoning framework upon which one can build both strategic and tactical visual analytics technologies for threat analysis, prevention, and response. Visual Analytics is a relatively new multidisciplinary field that combines various research areas including knowledge discovery, data analysis, visualization, human-computer interaction, data management, geo-spatial and temporal data processing and statistics. Visual Analytics has seen unprecedented growth in the past five years and is expected to grow ten folds in the coming future seeing the amount of massive, dynamic and heterogeneous data which concludes nothing unless put to use using the visual analytical techniques. The basic goal of visual analytics includes deriving an insight from the large amount of dynamic data which is from different sources and to analyze them to discover the unexpected and provide timely, defensible, and understandable assessments which can be then communicated effectively for action. An integration of the increasing processing power of computers with the efficient pattern recognition abilities and domain knowledge of human analysts is a challenging and promising road in dealing with large amounts of complex data. It will be also a major driving force for solutions for information overload in many research and commercial areas.
视觉分析是“通过视觉交互界面促进分析推理的科学”。它可以解决某些问题,这些问题的规模、复杂性以及对人与机器紧密耦合分析的需求可能会使它们变得难以处理。可视化分析推动了科学和技术在分析推理、交互、数据转换和计算和可视化表示、分析报告和技术转换方面的发展。作为一项研究议程,视觉分析汇集了来自计算机科学、信息可视化、认知和感知科学、交互设计、图形设计和社会科学的几个科学和技术社区。这门分析推理科学提供了一个推理框架,在这个框架上,人们可以构建战略和战术视觉分析技术,用于威胁分析、预防和响应。视觉分析是一个相对较新的多学科领域,它结合了各种研究领域,包括知识发现、数据分析、可视化、人机交互、数据管理、地理空间和时间数据处理和统计。视觉分析在过去的五年中经历了前所未有的增长,预计在未来将增长十倍,因为大量的、动态的和异构的数据,除非使用视觉分析技术,否则将一无所获。可视化分析的基本目标包括从来自不同来源的大量动态数据中获得洞察力,并对其进行分析,以发现意想不到的情况,并提供及时、可辩护和可理解的评估,然后可以有效地沟通以采取行动。将计算机日益增强的处理能力与人类分析人员高效的模式识别能力和领域知识相结合,是处理大量复杂数据的一条具有挑战性和前景的道路。它也将成为许多研究和商业领域解决信息过载的主要推动力。
{"title":"Overview of visual analytics","authors":"A. Chopra, R. Samant","doi":"10.1145/1980022.1980329","DOIUrl":"https://doi.org/10.1145/1980022.1980329","url":null,"abstract":"Visual analytics is \"the science of analytical reasoning facilitated by visual interactive interfaces.\" It can attack certain problems whose size, complexity, and need for closely coupled human and machine analysis may make them otherwise intractable. Visual analytics advances science and technology developments in analytical reasoning, interaction, data transformations and representations for computation and visualization, analytic reporting, and technology transition. As a research agenda, visual analytics brings together several scientific and technical communities from computer science, information visualization, cognitive and perceptual sciences, interactive design, graphic design, and social sciences. This science of analytical reasoning provides the reasoning framework upon which one can build both strategic and tactical visual analytics technologies for threat analysis, prevention, and response. Visual Analytics is a relatively new multidisciplinary field that combines various research areas including knowledge discovery, data analysis, visualization, human-computer interaction, data management, geo-spatial and temporal data processing and statistics. Visual Analytics has seen unprecedented growth in the past five years and is expected to grow ten folds in the coming future seeing the amount of massive, dynamic and heterogeneous data which concludes nothing unless put to use using the visual analytical techniques. The basic goal of visual analytics includes deriving an insight from the large amount of dynamic data which is from different sources and to analyze them to discover the unexpected and provide timely, defensible, and understandable assessments which can be then communicated effectively for action. An integration of the increasing processing power of computers with the efficient pattern recognition abilities and domain knowledge of human analysts is a challenging and promising road in dealing with large amounts of complex data. It will be also a major driving force for solutions for information overload in many research and commercial areas.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123752174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Obtaining patterns for identification of power quality disturbances using continuous wavelet transform 利用连续小波变换获取电能质量扰动识别模式
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980106
R. A. Gupta, R. Kumar, Manoj Gupta
This paper presents a new approach for obtaining patterns for identification of power quality (PQ) disturbances present in electrical power systems with the use of continuous wavelet transform (CWT). A new difference coefficient matrix (DCM) is proposed, which is calculated from the difference of the CWT coefficients of the pure sinusoidal signal and the PQ disturbance signal. Then, the scale wise sums of coefficients of all the rows of DCM give unique feature matrix (UFM). This paper shows that the UFM posses unique features that can be used to generate the unique patterns of various PQ disturbances. The algorithms of the proposed approach are given together with its implementation on various cases of PQ disturbances namely sag, interruption, swell, transient, harmonics, and flicker with different magnitudes of each of the disturbances. The results show that unique pattern is obtained for each PQ disturbance irrespective of its magnitude, which can be treated as signature of the respective PQ disturbance.
本文提出了一种利用连续小波变换(CWT)获取电力系统电能质量(PQ)扰动识别模式的新方法。提出了一种新的差分系数矩阵(DCM),该矩阵由纯正弦信号与PQ干扰信号的CWT系数之差计算得到。然后,对DCM各行系数按比例求和,得到唯一特征矩阵(UFM)。本文表明,UFM具有独特的特性,可用于产生各种PQ干扰的独特模式。本文给出了该方法的算法及其在各种PQ干扰情况下的实现,即每一种干扰的不同幅度的下垂、中断、膨胀、瞬态、谐波和闪烁。结果表明,无论其大小如何,每个PQ扰动都得到了唯一的模式,可以作为各自PQ扰动的特征。
{"title":"Obtaining patterns for identification of power quality disturbances using continuous wavelet transform","authors":"R. A. Gupta, R. Kumar, Manoj Gupta","doi":"10.1145/1980022.1980106","DOIUrl":"https://doi.org/10.1145/1980022.1980106","url":null,"abstract":"This paper presents a new approach for obtaining patterns for identification of power quality (PQ) disturbances present in electrical power systems with the use of continuous wavelet transform (CWT). A new difference coefficient matrix (DCM) is proposed, which is calculated from the difference of the CWT coefficients of the pure sinusoidal signal and the PQ disturbance signal. Then, the scale wise sums of coefficients of all the rows of DCM give unique feature matrix (UFM). This paper shows that the UFM posses unique features that can be used to generate the unique patterns of various PQ disturbances. The algorithms of the proposed approach are given together with its implementation on various cases of PQ disturbances namely sag, interruption, swell, transient, harmonics, and flicker with different magnitudes of each of the disturbances. The results show that unique pattern is obtained for each PQ disturbance irrespective of its magnitude, which can be treated as signature of the respective PQ disturbance.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122409679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Outlier detection and visualization of large datasets 大型数据集的异常值检测和可视化
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980134
L. Gunisetti
Outliers are special observations or extraordinary cases in the available data which deviate so much from other observations so as to arouse suspicions that they were generated by a different mechanism. Outliers detected can be used to identify special or extraordinary or fraudulent cases in day to day transactions. Outlier detection can be used to identify the noise in the data and these detected outliers have to be removed to improve data quality. Outlier Detection can be used for Traffic Analysis, Credit Card Fraud Detection. We applied Outlier Detection to Traffic data set for identifying the outlier stations on the highway. Detected outlier stations represent abnormalities in the traffic sensors data. This information is used by us to identify the faulty traffic sensors located at the highway stations. We have provided two dimensional visualization of the outliers which can be used for analyzing the data in an efficient manner. Traffic Management becomes easier when the abnormal traffic sensors identified at the corresponding outlier stations are identified. The method used here is a Statistic Approach. This technique compares every location to its neighbors using the Statistic. The Statistic is calculated to identify whether the data generated at a highway traffic station sensor is abnormal or not. This technique can be used efficiently to identify the outliers. This method can be easily applied to very large datasets as compared to existing conventional approaches.
异常值是在现有数据中的特殊观测值或异常情况,它们与其他观测值偏差很大,从而引起人们怀疑它们是由不同的机制产生的。检测到的异常值可用于识别日常交易中的特殊或异常或欺诈案件。异常值检测可用于识别数据中的噪声,并且必须去除这些检测到的异常值以提高数据质量。异常值检测可用于流量分析,信用卡欺诈检测。我们将离群点检测应用于交通数据集,以识别高速公路上的离群站点。检测到的异常站点表示交通传感器数据中的异常。我们使用这些信息来识别位于高速公路站点的故障交通传感器。我们提供了离群值的二维可视化,可用于有效地分析数据。当识别出相应离群站点的异常交通传感器时,交通管理变得更加容易。这里使用的方法是统计方法。该技术使用Statistic将每个位置与其相邻位置进行比较。统计量是用来判断高速公路交通站点传感器产生的数据是否异常。该方法可以有效地识别异常值。与现有的传统方法相比,这种方法可以很容易地应用于非常大的数据集。
{"title":"Outlier detection and visualization of large datasets","authors":"L. Gunisetti","doi":"10.1145/1980022.1980134","DOIUrl":"https://doi.org/10.1145/1980022.1980134","url":null,"abstract":"Outliers are special observations or extraordinary cases in the available data which deviate so much from other observations so as to arouse suspicions that they were generated by a different mechanism. Outliers detected can be used to identify special or extraordinary or fraudulent cases in day to day transactions. Outlier detection can be used to identify the noise in the data and these detected outliers have to be removed to improve data quality. Outlier Detection can be used for Traffic Analysis, Credit Card Fraud Detection. We applied Outlier Detection to Traffic data set for identifying the outlier stations on the highway. Detected outlier stations represent abnormalities in the traffic sensors data. This information is used by us to identify the faulty traffic sensors located at the highway stations. We have provided two dimensional visualization of the outliers which can be used for analyzing the data in an efficient manner. Traffic Management becomes easier when the abnormal traffic sensors identified at the corresponding outlier stations are identified. The method used here is a Statistic Approach. This technique compares every location to its neighbors using the Statistic. The Statistic is calculated to identify whether the data generated at a highway traffic station sensor is abnormal or not. This technique can be used efficiently to identify the outliers. This method can be easily applied to very large datasets as compared to existing conventional approaches.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131505641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mitigating denial of service attack using CAPTCHA mechanism 使用CAPTCHA机制减轻拒绝服务攻击
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980086
Mahendra Mehra, Mayank Agarwal, R. Pawar, D. Shah
Denial of Service (DoS henceforth) attack is performed solely with the intention to deny the legitimate users to access services. Since DoS attack is usually performed by means of bots, automated software. These bots send a large number of fake requests to the server which exceeds server buffer capacity which results in DoS attack. In this paper we propose an idea to prevent DoS attack on web-sites which ask for user credentials before it allows them to access resources. Our approach is based on CAPTCHA verification. We verify CAPTCHA submitted by user before allowing the access to credentials page. The CAPTCHA would consist of variety of patterns that would be distinct in nature and are randomly generated during each visit to the webpage. Most of the current web sites use a common methodology to generate all its CAPTCHAs. The bots usually take advantage of this approach since bots are able to decipher those CAPTCHAs. A set of distinct CAPTCHA patterns prevents bots to decipher it and consequently helps to reduce the generation of illicit traffic. This preserves the server bandwidth to allow the legitimate users to access the site.
拒绝服务攻击(DoS)是一种完全以拒绝合法用户访问服务为目的的攻击。由于DoS攻击通常是通过自动软件来执行的。这些机器人向服务器发送大量虚假请求,超过服务器缓冲容量,导致DoS攻击。在本文中,我们提出了一种防止在允许网站访问资源之前要求用户凭据的DoS攻击的方法。我们的方法是基于CAPTCHA验证。我们在允许访问凭据页面之前验证用户提交的CAPTCHA。CAPTCHA将由各种不同的模式组成,这些模式在每次访问网页时随机生成。目前大多数网站都使用一种通用的方法来生成所有的验证码。机器人通常利用这种方法,因为机器人能够破译这些验证码。一组独特的CAPTCHA模式可以防止机器人破译它,从而有助于减少非法流量的产生。这样可以保留服务器带宽以允许合法用户访问站点。
{"title":"Mitigating denial of service attack using CAPTCHA mechanism","authors":"Mahendra Mehra, Mayank Agarwal, R. Pawar, D. Shah","doi":"10.1145/1980022.1980086","DOIUrl":"https://doi.org/10.1145/1980022.1980086","url":null,"abstract":"Denial of Service (DoS henceforth) attack is performed solely with the intention to deny the legitimate users to access services. Since DoS attack is usually performed by means of bots, automated software. These bots send a large number of fake requests to the server which exceeds server buffer capacity which results in DoS attack. In this paper we propose an idea to prevent DoS attack on web-sites which ask for user credentials before it allows them to access resources. Our approach is based on CAPTCHA verification. We verify CAPTCHA submitted by user before allowing the access to credentials page. The CAPTCHA would consist of variety of patterns that would be distinct in nature and are randomly generated during each visit to the webpage. Most of the current web sites use a common methodology to generate all its CAPTCHAs. The bots usually take advantage of this approach since bots are able to decipher those CAPTCHAs. A set of distinct CAPTCHA patterns prevents bots to decipher it and consequently helps to reduce the generation of illicit traffic. This preserves the server bandwidth to allow the legitimate users to access the site.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131913258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
期刊
International Conference & Workshop on Emerging Trends in Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1