首页 > 最新文献

2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)最新文献

英文 中文
Fingerprint localization using WLAN RSS and magnetic field with landmark detection 利用无线局域网RSS和磁场进行指纹定位
Peng Tang, Zhiqing Huang, Jun Lei
In this paper, we proposed an indoor localization technique which use WLAN fingerprint and magnetic field fingerprint with landmarks detection. First, we use WLAN RSS fingerprint and magnetic field fingerprint to improve fingerprint's spatial and time characterization and localization accuracy. Second against the special position like stairs, elevators, etc., we mark the special position as landmarks and use the accelerometer sensor data to detect whether the user is in the special position. Through landmarks detection we can reduce the impact of the limitations of location fingerprinting positioning effectively and improve the localization algorithm's efficiency. Experimental results show that, compared to a single widely used WLAN RSS fingerprint localization algorithm, the proposed algorithm can effectively improve the accuracy and efficiency of indoor location.
本文提出了一种利用无线局域网指纹和磁场指纹结合地标检测的室内定位技术。首先,我们采用无线局域网RSS指纹和磁场指纹来提高指纹的时空表征和定位精度。其次,针对楼梯、电梯等特殊位置,我们将特殊位置标记为地标,并使用加速度计传感器数据检测用户是否处于特殊位置。通过地标检测可以有效降低位置指纹定位局限性的影响,提高定位算法的效率。实验结果表明,与目前广泛使用的单一WLAN RSS指纹定位算法相比,本文算法能有效提高室内定位的精度和效率。
{"title":"Fingerprint localization using WLAN RSS and magnetic field with landmark detection","authors":"Peng Tang, Zhiqing Huang, Jun Lei","doi":"10.1109/CIACT.2017.7977316","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977316","url":null,"abstract":"In this paper, we proposed an indoor localization technique which use WLAN fingerprint and magnetic field fingerprint with landmarks detection. First, we use WLAN RSS fingerprint and magnetic field fingerprint to improve fingerprint's spatial and time characterization and localization accuracy. Second against the special position like stairs, elevators, etc., we mark the special position as landmarks and use the accelerometer sensor data to detect whether the user is in the special position. Through landmarks detection we can reduce the impact of the limitations of location fingerprinting positioning effectively and improve the localization algorithm's efficiency. Experimental results show that, compared to a single widely used WLAN RSS fingerprint localization algorithm, the proposed algorithm can effectively improve the accuracy and efficiency of indoor location.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125010611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Study on DDoS attacks based on DPDK in cloud computing 云计算中基于DPDK的DDoS攻击研究
Xutao Zhao
DDoS (distributed denial of service attack) is a common and destructive network attack. In order to minimize the impact of network equipments and protect cloud platform user'security, this paper puts forward a prevention strategy based on DPDK. The BP algorithm is applied to the abnormal traffic detection module and DPDK is used to process network packet in user mode. This kind of mode not only improves the DDoS detection rate but also makes full use of the CPU's powerful computation ability, which greatly enhances the efficiency of real-time processing.
分布式拒绝服务攻击(DDoS)是一种常见的破坏性网络攻击。为了最大限度地减少对网络设备的影响,保护云平台用户的安全,本文提出了一种基于DPDK的防范策略。异常流量检测模块采用BP算法,用户模式下使用DPDK处理网络报文。这种模式不仅提高了DDoS的检测率,而且充分利用了CPU强大的计算能力,大大提高了实时处理的效率。
{"title":"Study on DDoS attacks based on DPDK in cloud computing","authors":"Xutao Zhao","doi":"10.1109/CIACT.2017.7977325","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977325","url":null,"abstract":"DDoS (distributed denial of service attack) is a common and destructive network attack. In order to minimize the impact of network equipments and protect cloud platform user'security, this paper puts forward a prevention strategy based on DPDK. The BP algorithm is applied to the abnormal traffic detection module and DPDK is used to process network packet in user mode. This kind of mode not only improves the DDoS detection rate but also makes full use of the CPU's powerful computation ability, which greatly enhances the efficiency of real-time processing.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127991369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Materialized view selection using exchange function based particle swarm optimization 基于交换函数的粒子群优化物化视图选择
Amit Kumar, T. Kumar
Data warehousing is an essential part of any effectual business intelligence endeavor. The queries necessary for business decision making against a large data warehouse are usually analytical, complex and exploratory in nature. The facility to answer these queries economically is a critical performance concern in the data warehouse environment. One of the techniques employed in data warehouse to improve query performance is to identify and store the relevant data as summaries or aggregates, referred to as materialized view. The problem of choosing such data and storing them as views has been shown to be an NP-hard problem. This problem has been solved using exchange function based particle swarm optimization (EFPSO) in this paper. Accordingly EFPSO based view selection algorithm (EFPSOVSA) is proposed. Experimentally, it is observed that EFPSOVSA selects comparatively better quality views than the greedy algorithm for view selection.
数据仓库是任何有效的商业智能努力的重要组成部分。针对大型数据仓库进行业务决策所需的查询本质上通常是分析性的、复杂的和探索性的。在数据仓库环境中,经济地回答这些查询的功能是一个关键的性能问题。数据仓库中用于提高查询性能的技术之一是将相关数据识别并存储为摘要或聚合,称为物化视图。选择这样的数据并将其存储为视图的问题已被证明是一个np困难问题。本文采用基于交换函数的粒子群算法(EFPSO)解决了这一问题。据此,提出了基于EFPSO的视图选择算法(EFPSOVSA)。实验结果表明,EFPSOVSA算法比贪婪算法选择的视图质量更好。
{"title":"Materialized view selection using exchange function based particle swarm optimization","authors":"Amit Kumar, T. Kumar","doi":"10.1109/CIACT.2017.7977364","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977364","url":null,"abstract":"Data warehousing is an essential part of any effectual business intelligence endeavor. The queries necessary for business decision making against a large data warehouse are usually analytical, complex and exploratory in nature. The facility to answer these queries economically is a critical performance concern in the data warehouse environment. One of the techniques employed in data warehouse to improve query performance is to identify and store the relevant data as summaries or aggregates, referred to as materialized view. The problem of choosing such data and storing them as views has been shown to be an NP-hard problem. This problem has been solved using exchange function based particle swarm optimization (EFPSO) in this paper. Accordingly EFPSO based view selection algorithm (EFPSOVSA) is proposed. Experimentally, it is observed that EFPSOVSA selects comparatively better quality views than the greedy algorithm for view selection.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128965708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure routing against DDoS attack in wireless sensor network 无线传感器网络抵御DDoS攻击的安全路由
Surendra Nagar, S. S. Rajput, A. Gupta, M. Trivedi
Wireless sensor network is a low cost network to solve many of the real world problems. These sensor nodes used to deploy in the hostile or unattended areas to sense and monitor the atmospheric situations such as motion, pressure, sound, temperature and vibration etc. The sensor nodes have low energy and low computing power, any security scheme for wireless sensor network must not be computationally complex and it should be efficient. In this paper we introduced a secure routing protocol for WSNs, which is able to prevent the network from DDoS attack. In our methodology we scan the infected nodes using the proposed algorithm and block that node from any further activities in the network. To protect the network we use intrusion prevention scheme, where specific nodes of the network acts as IPS node. These nodes operate in their radio range for the region of the network and scan the neighbors regularly. When the IPS node find a misbehavior node which is involves in frequent message passing other than UDP and TCP messages, IPS node blocks the infected node and also send the information to all genuine sender nodes to change their routes. All simulation work has been done using NS 2.35. After simulation the proposed scheme gives feasible results to protect the network against DDoS attack. The performance parameters have been improved after applying the security mechanism on an infected network.
无线传感器网络是一种低成本的网络,可以解决许多现实世界中的问题。这些传感器节点用于部署在敌对或无人值守的区域,以感知和监测大气情况,如运动,压力,声音,温度和振动等。传感器节点具有低能量和低计算能力的特点,任何无线传感器网络的安全方案都不能计算复杂,必须是高效的。本文介绍了一种用于WSNs的安全路由协议,该协议能够防止网络受到DDoS攻击。在我们的方法中,我们使用提出的算法扫描受感染的节点,并阻止该节点在网络中的任何进一步活动。为了保护网络,我们采用入侵防御方案,将网络中的特定节点作为入侵防御节点。这些节点在其网络区域的无线电范围内工作,并定期扫描邻居。当IPS节点发现除UDP和TCP报文外,其他报文传递频繁的异常节点时,将异常节点阻断,并将异常信息发送给所有正常发送节点,使其改变路由。所有的仿真工作都是在ns2.35环境下完成的。仿真结果表明,该方案能够有效地保护网络免受DDoS攻击。在受感染的网络上应用安全机制后,性能参数得到了改善。
{"title":"Secure routing against DDoS attack in wireless sensor network","authors":"Surendra Nagar, S. S. Rajput, A. Gupta, M. Trivedi","doi":"10.1109/CIACT.2017.7977375","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977375","url":null,"abstract":"Wireless sensor network is a low cost network to solve many of the real world problems. These sensor nodes used to deploy in the hostile or unattended areas to sense and monitor the atmospheric situations such as motion, pressure, sound, temperature and vibration etc. The sensor nodes have low energy and low computing power, any security scheme for wireless sensor network must not be computationally complex and it should be efficient. In this paper we introduced a secure routing protocol for WSNs, which is able to prevent the network from DDoS attack. In our methodology we scan the infected nodes using the proposed algorithm and block that node from any further activities in the network. To protect the network we use intrusion prevention scheme, where specific nodes of the network acts as IPS node. These nodes operate in their radio range for the region of the network and scan the neighbors regularly. When the IPS node find a misbehavior node which is involves in frequent message passing other than UDP and TCP messages, IPS node blocks the infected node and also send the information to all genuine sender nodes to change their routes. All simulation work has been done using NS 2.35. After simulation the proposed scheme gives feasible results to protect the network against DDoS attack. The performance parameters have been improved after applying the security mechanism on an infected network.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130316365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
High-accuracy homography estimation for robust pan-tilt-zoom camera calibration 稳健平移-倾斜变焦相机标定的高精度单应性估计
Jiaoru Yang, Rui Wang
A robust and full automatic pan-tilt-zoom (PTZ) camera calibration of intrinsic parameters is proposed in this paper. This method elegantly combined the estimation of lens distortion coefficient and the homography given an image pair taken by the camera undergoing an arbitrary pan-tilt rotation in a fixed zoom. Addressing the problem that the feature-based homography estimation approaches loose the optimality in presence of feature location noise which was assumed as isotropic and identical distributed, we propose a better homography and lens distortion estimation by using covariance matrix weighted Ransac under lens distortion called as CWRLD in which the feature location noise is considered as anisotropic non identical distributed noise. The robustness and effectiveness of our method are demonstrated on both synthetic and real data.
本文提出了一种鲁棒的全自动平移-倾斜-变焦(PTZ)相机固有参数标定方法。该方法将镜头畸变系数的估计与给定相机在固定变焦下任意平移旋转的图像对的单应性巧妙地结合在一起。针对基于特征的单应性估计方法在假设特征位置噪声为各向异性且分布相同的情况下失去最优性的问题,提出了一种基于协方差矩阵加权Ransac的单应性和镜头畸变估计方法(CWRLD),该方法将特征位置噪声视为各向异性非均匀分布噪声。本文方法的鲁棒性和有效性在合成数据和实际数据上都得到了验证。
{"title":"High-accuracy homography estimation for robust pan-tilt-zoom camera calibration","authors":"Jiaoru Yang, Rui Wang","doi":"10.1109/CIACT.2017.7977293","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977293","url":null,"abstract":"A robust and full automatic pan-tilt-zoom (PTZ) camera calibration of intrinsic parameters is proposed in this paper. This method elegantly combined the estimation of lens distortion coefficient and the homography given an image pair taken by the camera undergoing an arbitrary pan-tilt rotation in a fixed zoom. Addressing the problem that the feature-based homography estimation approaches loose the optimality in presence of feature location noise which was assumed as isotropic and identical distributed, we propose a better homography and lens distortion estimation by using covariance matrix weighted Ransac under lens distortion called as CWRLD in which the feature location noise is considered as anisotropic non identical distributed noise. The robustness and effectiveness of our method are demonstrated on both synthetic and real data.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130517920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A security criteria regulation middleware using security policy for Web Services on multi-Cloud tenancies 一个安全标准规范中间件,在多云租赁中使用Web服务的安全策略
Ziyi Su, Changda Song, Lin Dai, Fuyong Ge, Ruopeng Yang, F. Biennier
In the multi-cloud tenancy environments, Web Service offers an standard approach for discovering and using capabilities in an environment that transcends ownership domains. This brings into concern the ownership and security related to Web Service governance. Our approach for this issue involves an ESB-integrated middleware for security criteria regulation on Clouds. It uses an attribute-based security policy model for the exhibition of assets consumers' security profiles and deducing service accessing decision. Assets represent computing power/functionality and information/data provided by entities. Experiments show the middleware to bring minor governance burdens on the hardware aspect, as well as better performance with colosum scaling property, dealing well with cumbersome policy files, which is probably the situation of complex composite service scenarios.
在多云租赁环境中,Web Service提供了一种标准方法,用于发现和使用超越所有权域的环境中的功能。这就涉及到与Web服务治理相关的所有权和安全性。我们解决这个问题的方法包括一个esb集成的中间件,用于云上的安全标准规范。它使用基于属性的安全策略模型来显示资产消费者的安全配置文件并推导服务访问决策。资产表示实体提供的计算能力/功能和信息/数据。实验表明,中间件在硬件方面带来的治理负担较小,并且具有较好的性能,具有巨大的可扩展性,可以很好地处理繁琐的策略文件,这可能是复杂的组合服务场景的情况。
{"title":"A security criteria regulation middleware using security policy for Web Services on multi-Cloud tenancies","authors":"Ziyi Su, Changda Song, Lin Dai, Fuyong Ge, Ruopeng Yang, F. Biennier","doi":"10.1109/CIACT.2017.7977320","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977320","url":null,"abstract":"In the multi-cloud tenancy environments, Web Service offers an standard approach for discovering and using capabilities in an environment that transcends ownership domains. This brings into concern the ownership and security related to Web Service governance. Our approach for this issue involves an ESB-integrated middleware for security criteria regulation on Clouds. It uses an attribute-based security policy model for the exhibition of assets consumers' security profiles and deducing service accessing decision. Assets represent computing power/functionality and information/data provided by entities. Experiments show the middleware to bring minor governance burdens on the hardware aspect, as well as better performance with colosum scaling property, dealing well with cumbersome policy files, which is probably the situation of complex composite service scenarios.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133902832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy — Efficiency techniques in cooperative spectrum sensing: A survey 协同频谱传感中的能效技术:综述
Meenakshi Awasthi, Vijay Kumar, M. Nigam
Cognitive radio is a propitious technology to alleviate the issue of spectrum paucity by sensing and allocation of free spectrum bands. Spectrum sensing may be local: single node or cooperative: multiple nodes. It is customary that single node spectrum sensing is not much reliable as compared to cooperative spectrum sensing. However, cooperative spectrum sensing suffers from large overhead due to multiple secondary users who are working in cooperation with each other. Hence, energy efficiency in cooperative spectrum sensing is a challenging concern in cognitive radio. This survey enlightens the various aspects of energy efficiency in cooperative spectrum sensing. Various energy efficient algorithms are available in the literature. This survey compares various methods and techniques used for the optimization of no. of collaborative user in cooperative spectrum sensing. Challenges, drawbacks and newfangled ways of energy efficient collaborative sensing are briefly covered.
认知无线电是一种通过感知和分配自由频段来缓解频谱稀缺问题的有利技术。频谱感知可以是本地的:单节点或合作的:多节点。一般认为,单节点频谱感知的可靠性不如协同频谱感知。然而,由于多个辅助用户相互协作,协作频谱感知的开销很大。因此,协同频谱感知的能量效率是认知无线电领域的一个具有挑战性的问题。这一研究对协同频谱传感中能源效率的各个方面都有启示。各种节能算法在文献中是可用的。本调查比较了用于优化no. 5的各种方法和技术。协同频谱感知中协同用户的研究。简要介绍了节能协同传感的挑战、缺陷和新方法。
{"title":"Energy — Efficiency techniques in cooperative spectrum sensing: A survey","authors":"Meenakshi Awasthi, Vijay Kumar, M. Nigam","doi":"10.1109/CIACT.2017.7977341","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977341","url":null,"abstract":"Cognitive radio is a propitious technology to alleviate the issue of spectrum paucity by sensing and allocation of free spectrum bands. Spectrum sensing may be local: single node or cooperative: multiple nodes. It is customary that single node spectrum sensing is not much reliable as compared to cooperative spectrum sensing. However, cooperative spectrum sensing suffers from large overhead due to multiple secondary users who are working in cooperation with each other. Hence, energy efficiency in cooperative spectrum sensing is a challenging concern in cognitive radio. This survey enlightens the various aspects of energy efficiency in cooperative spectrum sensing. Various energy efficient algorithms are available in the literature. This survey compares various methods and techniques used for the optimization of no. of collaborative user in cooperative spectrum sensing. Challenges, drawbacks and newfangled ways of energy efficient collaborative sensing are briefly covered.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124193920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Research on fuzzy PID-based variable frequency control technology of electroplating power supply 基于模糊pid的电镀电源变频控制技术研究
Zhou Jie, Huang Chunlin
To improve the intelligent level of electroplating power supply control system and meet the demand of electroplating products of various kinds, this paper designs a fuzzy PID algorithm-based electroplating power control system. The system, with fuzzy PID algorithm and variable frequency speed control technology as its core, applies fuzzy algorithm to adjust PID parameters in real time to control the inverter output frequency with a purpose to change the power supply of the motor speed, to improve the quality of current modulation, and to adapt to different plating load. The test proves that the transformed power supply control system can ensure its rapidity and accuracy of current regulation under different loads, and has strong ability to restrain disturbance. In addition, the power control can be carried out both in the field and on remote clients and therefore increases its flexibility.
为了提高电镀电源控制系统的智能化水平,满足各种电镀产品的需求,本文设计了一种基于模糊PID算法的电镀电源控制系统。该系统以模糊PID算法和变频调速技术为核心,采用模糊算法实时调节PID参数控制逆变器输出频率,以改变电源对电机的转速,提高电流调制质量,适应不同电镀负载。试验证明,改造后的电源控制系统能保证在不同负载下电流调节的快速性和准确性,并具有较强的抗干扰能力。此外,电源控制既可以在现场进行,也可以在远程客户端进行,因此增加了其灵活性。
{"title":"Research on fuzzy PID-based variable frequency control technology of electroplating power supply","authors":"Zhou Jie, Huang Chunlin","doi":"10.1109/CIACT.2017.7977343","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977343","url":null,"abstract":"To improve the intelligent level of electroplating power supply control system and meet the demand of electroplating products of various kinds, this paper designs a fuzzy PID algorithm-based electroplating power control system. The system, with fuzzy PID algorithm and variable frequency speed control technology as its core, applies fuzzy algorithm to adjust PID parameters in real time to control the inverter output frequency with a purpose to change the power supply of the motor speed, to improve the quality of current modulation, and to adapt to different plating load. The test proves that the transformed power supply control system can ensure its rapidity and accuracy of current regulation under different loads, and has strong ability to restrain disturbance. In addition, the power control can be carried out both in the field and on remote clients and therefore increases its flexibility.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128457010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of elastic properties of nc-BC2N nc-BC2N的弹性性能分析
M. Goyal
The isothermal equations of state are applied to analyze the elastic properties of cubic shaped nanocrystalline BC2N under pressure. The equations of state (EOS) used are Usual Tait's EOS, Shanker EOS and its empirically modified form used earlier for the study of nanomaterials. It is noted that Usual Tait's equation yields results in between the results obtained using Shanker EOS and its modified form. The results for volume compression from the applied EOS's are compared with the experimental data available and the best results are found from modified Shanker EOS.A good agreement of theoretical results with the experimental proves the validity of the potential independent approach used for explaining the elastic properties of nanocrystalline BC2N. The variation in elastic parameters across the nanocrystal in BC2N under pressure is studied using Usual Tait's EOS and empirically modified Shanker EOS. Further, we have determined the variation in poisson's ratio with pressure using these theoretical models considered. The variation of elastic constants for cubic crystal, i.e. C11, C12 and C44, are also determined with pressure.
采用等温状态方程分析了立方形纳米晶BC2N在压力作用下的弹性性能。所使用的状态方程(EOS)是Usual Tait的EOS, Shanker EOS及其先前用于纳米材料研究的经验修正形式。值得注意的是,通常的Tait方程产生的结果介于使用Shanker EOS和它的修改形式得到的结果之间。将应用的EOS的体积压缩结果与现有的实验数据进行了比较,发现改进的Shanker EOS的体积压缩效果最好。理论结果与实验结果吻合较好,证明了势无关方法解释纳米晶BC2N弹性特性的有效性。利用Usual Tait的EOS和经验修正的Shanker EOS研究了BC2N纳米晶体中弹性参数在压力下的变化。此外,我们还利用这些理论模型确定了泊松比随压力的变化。测定了C11、C12、C44等立方晶体的弹性常数随压力的变化。
{"title":"Analysis of elastic properties of nc-BC2N","authors":"M. Goyal","doi":"10.1109/CIACT.2017.7977387","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977387","url":null,"abstract":"The isothermal equations of state are applied to analyze the elastic properties of cubic shaped nanocrystalline BC2N under pressure. The equations of state (EOS) used are Usual Tait's EOS, Shanker EOS and its empirically modified form used earlier for the study of nanomaterials. It is noted that Usual Tait's equation yields results in between the results obtained using Shanker EOS and its modified form. The results for volume compression from the applied EOS's are compared with the experimental data available and the best results are found from modified Shanker EOS.A good agreement of theoretical results with the experimental proves the validity of the potential independent approach used for explaining the elastic properties of nanocrystalline BC2N. The variation in elastic parameters across the nanocrystal in BC2N under pressure is studied using Usual Tait's EOS and empirically modified Shanker EOS. Further, we have determined the variation in poisson's ratio with pressure using these theoretical models considered. The variation of elastic constants for cubic crystal, i.e. C11, C12 and C44, are also determined with pressure.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116944261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A DDoS prevention scheme for session resumption SEA architecture in healthcare IoT 医疗物联网中会话恢复SEA架构的DDoS防护方案
Aditya Rajagopalan, M. Jagga, Anju Kumari, Syed Taqi Ali
We propose a scheme for DDoS prevention in session resumption based end-to-end security for healthcare Internet of Things. In the proposed scheme a certificate based DTLS handshake takes place for mutual authentication between Smart e-Health Gateway and client. The end-to-end communication between client and medical sensors is susceptible to replay and DDoS attacks, and the communication is made secure by ensuring all requests to the medical sensor are sent through the Smart e-Health Gateways in the fog layer. This model not only makes the communication more secure, but also reduces the load on the resource-constrained medical sensors.
我们提出了一种基于会话恢复的医疗物联网端到端安全DDoS防护方案。在该方案中,基于证书的DTLS握手在智能电子健康网关和客户端之间进行相互认证。客户端和医疗传感器之间的端到端通信容易受到重放和DDoS攻击,并且通过确保通过雾层中的智能电子健康网关发送对医疗传感器的所有请求来确保通信的安全性。该模型不仅提高了通信的安全性,而且减少了资源受限的医疗传感器的负载。
{"title":"A DDoS prevention scheme for session resumption SEA architecture in healthcare IoT","authors":"Aditya Rajagopalan, M. Jagga, Anju Kumari, Syed Taqi Ali","doi":"10.1109/CIACT.2017.7977361","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977361","url":null,"abstract":"We propose a scheme for DDoS prevention in session resumption based end-to-end security for healthcare Internet of Things. In the proposed scheme a certificate based DTLS handshake takes place for mutual authentication between Smart e-Health Gateway and client. The end-to-end communication between client and medical sensors is susceptible to replay and DDoS attacks, and the communication is made secure by ensuring all requests to the medical sensor are sent through the Smart e-Health Gateways in the fog layer. This model not only makes the communication more secure, but also reduces the load on the resource-constrained medical sensors.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126807729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1