首页 > 最新文献

2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)最新文献

英文 中文
Design high performance and low power 10T full adder cell using double gate MOSFET at 45nm technology 采用45纳米双栅MOSFET技术设计高性能低功耗10T全加法器单元
A. Shrivastava, S. Akashe
Design of complex arithmetic logic circuits considering leakage current, active power and delay is an important and challenging task in deep submicron circuits. Double gate transistor circuit consider as a promising candidate for low power application domain as well as used in Radio Frequency (RF) devices. In this paper we designed full adder with the help of double gate transistor, the used parameters value has been varied significantly thus improving the performance of full adder. Power Gating is one of the most used circuit techniques to reduce the leakage current in idle circuit. In this paper different parameters are analysed on Power Gating Technique. Power Gating technique achieves 93% reduction of leakage current, active power is reduced by 60% and delay is reduced by 14% as compared with conventional double gate full adder. Simulation results of double gate full adder have been performed on cadence virtuoso with 45nm technology.
在深亚微米电路中,考虑漏电流、有功功率和时延的复杂算术逻辑电路设计是一项重要而富有挑战性的任务。双栅晶体管电路被认为是低功耗应用领域的一个很有前途的候选者,并且在射频(RF)器件中得到了应用。本文利用双栅晶体管设计了全加法器,使用的参数值发生了很大的变化,从而提高了全加法器的性能。功率门控是一种常用的减小电路漏电流的电路技术。本文对功率门控技术的不同参数进行了分析。与传统的双栅全加法器相比,功率门控技术使漏电流降低93%,有功功率降低60%,延时降低14%。在cadence virtuoso上采用45nm技术对双栅全加法器进行了仿真。
{"title":"Design high performance and low power 10T full adder cell using double gate MOSFET at 45nm technology","authors":"A. Shrivastava, S. Akashe","doi":"10.1109/ICCCCM.2013.6648903","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648903","url":null,"abstract":"Design of complex arithmetic logic circuits considering leakage current, active power and delay is an important and challenging task in deep submicron circuits. Double gate transistor circuit consider as a promising candidate for low power application domain as well as used in Radio Frequency (RF) devices. In this paper we designed full adder with the help of double gate transistor, the used parameters value has been varied significantly thus improving the performance of full adder. Power Gating is one of the most used circuit techniques to reduce the leakage current in idle circuit. In this paper different parameters are analysed on Power Gating Technique. Power Gating technique achieves 93% reduction of leakage current, active power is reduced by 60% and delay is reduced by 14% as compared with conventional double gate full adder. Simulation results of double gate full adder have been performed on cadence virtuoso with 45nm technology.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114880227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A design pattern for symmetric encryption 对称加密的设计模式
Yash Bharadwaj, S. Chakraverty
Symmetric encryption is widely used to enforce data security and provide other cryptographic primitives. Despite significant research that has led to the development of sophisticated symmetric encryption algorithms, very little has been done to develop systematic frameworks that can support the creation of adaptable, application-specific encryption techniques with varying levels of security. In this paper, we tackle this challenge by proposing a new Circular Design Pattern (CDP) which serves as a template for generating Dynamic Symmetric Encryption Frameworks (DSEF). The layout of a DSEF remains the same but the underlying algorithms may vary during run time. We illustrate how the proposed CDP can be used to create new DSEF from the set of existing algorithms. We propose a modified version of conventional cryptosystem model to deploy the DSEF. We analyze the enhanced security level of any new symmetric encryption algorithm generated by the CDP. We also present a comparison of the proposed CDP with some existing design patterns that may be used for creating DSEF.
对称加密被广泛用于加强数据安全性和提供其他加密原语。尽管大量的研究已经导致了复杂对称加密算法的发展,但在开发能够支持创建具有不同安全级别的可适应的、特定于应用程序的加密技术的系统框架方面做得很少。在本文中,我们通过提出一种新的圆形设计模式(CDP)来解决这一挑战,该模式作为生成动态对称加密框架(DSEF)的模板。DSEF的布局保持不变,但底层算法在运行时可能有所不同。我们说明了如何使用建议的CDP从现有算法集创建新的DSEF。我们提出了一个改进的传统密码系统模型来部署DSEF。我们分析了CDP生成的任何新的对称加密算法的增强安全级别。我们还将提议的CDP与一些可用于创建DSEF的现有设计模式进行了比较。
{"title":"A design pattern for symmetric encryption","authors":"Yash Bharadwaj, S. Chakraverty","doi":"10.1109/ICCCCM.2013.6648912","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648912","url":null,"abstract":"Symmetric encryption is widely used to enforce data security and provide other cryptographic primitives. Despite significant research that has led to the development of sophisticated symmetric encryption algorithms, very little has been done to develop systematic frameworks that can support the creation of adaptable, application-specific encryption techniques with varying levels of security. In this paper, we tackle this challenge by proposing a new Circular Design Pattern (CDP) which serves as a template for generating Dynamic Symmetric Encryption Frameworks (DSEF). The layout of a DSEF remains the same but the underlying algorithms may vary during run time. We illustrate how the proposed CDP can be used to create new DSEF from the set of existing algorithms. We propose a modified version of conventional cryptosystem model to deploy the DSEF. We analyze the enhanced security level of any new symmetric encryption algorithm generated by the CDP. We also present a comparison of the proposed CDP with some existing design patterns that may be used for creating DSEF.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128584573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analyze the ATMOS configuration with VTH abolition logic in 4×1 MUX 分析4×1 MUX中带有VTH取消逻辑的ATMOS配置
Prateek Jain, S. Akashe
A speculative configuration of MOS transistors with a threshold rejection technique is modified. The design configuration is analyzed logic in aspect cum internal threshold abolition (ITA) and discloses circuit imminent and recital confines. Consequent circuit equations exemplify the exchange between the voltage drop and the reverse leakage. Moreover, a circuit development process for the improvement of the power transmission efficiency (PTE) of a 4×1 MUX with ITA MOS configuration was modified based on the design. A 4×1 MUX was optimized and employed in a digital system 45-nm CMOS technology, and Cadence simulation experimental implementation results of the leakage power and PCE illustrate superior conformity through the proposed configuration.
修改了具有阈值抑制技术的MOS晶体管的推测配置。对设计结构进行了逻辑分析,并对内部阈值消除(ITA)进行了分析,揭示了电路迫在眉睫的限制。随后的电路方程举例说明了电压降和反漏之间的交换。在此基础上,改进了用于提高具有ITA MOS配置的4×1 MUX功率传输效率(PTE)的电路开发流程。对4×1 MUX进行了优化,并将其应用于45纳米CMOS技术的数字系统中,漏功率和PCE的Cadence仿真实验实现结果表明,该配置具有较好的一致性。
{"title":"Analyze the ATMOS configuration with VTH abolition logic in 4×1 MUX","authors":"Prateek Jain, S. Akashe","doi":"10.1109/ICCCCM.2013.6648916","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648916","url":null,"abstract":"A speculative configuration of MOS transistors with a threshold rejection technique is modified. The design configuration is analyzed logic in aspect cum internal threshold abolition (ITA) and discloses circuit imminent and recital confines. Consequent circuit equations exemplify the exchange between the voltage drop and the reverse leakage. Moreover, a circuit development process for the improvement of the power transmission efficiency (PTE) of a 4×1 MUX with ITA MOS configuration was modified based on the design. A 4×1 MUX was optimized and employed in a digital system 45-nm CMOS technology, and Cadence simulation experimental implementation results of the leakage power and PCE illustrate superior conformity through the proposed configuration.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126133002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trajectory tracking of two wheeled mobile robot using higher order sliding mode control 基于高阶滑模控制的两轮移动机器人轨迹跟踪
Himajit Aithal, S. Janardhanan
This paper presents a robust control method for trajectory tracking of a two wheeled mobile robot. A second order sliding mode control methodology is used to ensure continuity in the torque inputs, in addition to disturbance rejection. The results are validated through two simulations.
针对两轮移动机器人的轨迹跟踪问题,提出了一种鲁棒控制方法。二阶滑模控制方法用于确保扭矩输入的连续性,以及干扰抑制。通过两次仿真验证了结果。
{"title":"Trajectory tracking of two wheeled mobile robot using higher order sliding mode control","authors":"Himajit Aithal, S. Janardhanan","doi":"10.1109/ICCCCM.2013.6648908","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648908","url":null,"abstract":"This paper presents a robust control method for trajectory tracking of a two wheeled mobile robot. A second order sliding mode control methodology is used to ensure continuity in the torque inputs, in addition to disturbance rejection. The results are validated through two simulations.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124248972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
3D - Playfair cipher with additional bitwise operation 3D -游戏公平密码与额外的位操作
Versha Verma, D. Kaur, Ravindra Kumar Singh, A. Kaur
3D-Playfair cipher is multiple letter encryption cipher. In this, trigraphs of plaintext are treated as single units and converted into corresponding cipher text trigraphs. 3D-Playfair Ciphers originates due to the limitations in classical Playfair as it supports only alphabets and may not support two alphabets at the same time. It also eliminates the fact that a diagram and its reverse will encrypt in a similar fashion. 3D-Playfair cipher supports all 26 alphabets, 10 digits and 28 special characters. The theme of research is to furnish security to data which contains alphabets numerals and special characters during transmission that's why additional bitwise operations are introduced and applied on the cipher text of 3D-Playfair cipher with a random key. Linear Feedback Shift Register is a good candidate for generation of random sequences and is selected for generating random keys for bitwise operations to offer better security to cipher text before transmission over the internet. Here X-OR or X-NOR operations are taken into consideration for the bitwise operations based on the key.
3D-Playfair密码是多字母加密密码。在这种方法中,明文的三个字符被视为单个单元,并转换成相应的密文三个字符。3D-Playfair Ciphers源于经典Playfair的限制,因为它只支持字母,可能不支持两个字母同时。它还消除了一个图和它的反向将以类似的方式加密的事实。3D-Playfair密码支持所有26个字母,10个数字和28个特殊字符。研究的主题是为包含字母、数字和特殊字符的数据在传输过程中提供安全性,因此在3D-Playfair密码的随机密钥密文中引入并应用了额外的位运算。线性反馈移位寄存器是生成随机序列的一个很好的候选者,被选择用于生成按位操作的随机密钥,以在互联网上传输之前为密文提供更好的安全性。这里基于键的位操作考虑x或x或nor操作。
{"title":"3D - Playfair cipher with additional bitwise operation","authors":"Versha Verma, D. Kaur, Ravindra Kumar Singh, A. Kaur","doi":"10.1109/ICCCCM.2013.6648913","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648913","url":null,"abstract":"3D-Playfair cipher is multiple letter encryption cipher. In this, trigraphs of plaintext are treated as single units and converted into corresponding cipher text trigraphs. 3D-Playfair Ciphers originates due to the limitations in classical Playfair as it supports only alphabets and may not support two alphabets at the same time. It also eliminates the fact that a diagram and its reverse will encrypt in a similar fashion. 3D-Playfair cipher supports all 26 alphabets, 10 digits and 28 special characters. The theme of research is to furnish security to data which contains alphabets numerals and special characters during transmission that's why additional bitwise operations are introduced and applied on the cipher text of 3D-Playfair cipher with a random key. Linear Feedback Shift Register is a good candidate for generation of random sequences and is selected for generating random keys for bitwise operations to offer better security to cipher text before transmission over the internet. Here X-OR or X-NOR operations are taken into consideration for the bitwise operations based on the key.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123842822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Computation of multimetalmultiligand complex formation equilibria in aqueous medium involving glutamic acid as primary ligand and Uracil as secondary ligand 以谷氨酸为一级配体,尿嘧啶为二级配体的水溶液中多金属多配体络合物形成平衡的计算
Divya Bartaria, Surabhi Sinha, P. Chandra, V. Krishna
Metallic complexes of multimetal and multiligand systems are complicated for calculating equilibrium concentrations in solution. Complexation equilibria have been deduced on the basis of speciation curves obtained through SCGOS computer program. The formation constants of ternary(1:1:1) quaternary(1:1:1:1) complexes of CuII, PbII, HgII, CdII, ZnII, CoII and NiII with Glutamic acid(A) and Uracil(B) as ligands have been determined potentiometrically in aqueous medium.Study of metal complexes of said ligands with respect to their stability, solution structure and quantitative aspects has been done. Acid dissociation constants of the ligands used and the formation constants of the ternary and quaternary complexes were determined at 37±1°C and in ionic strength I = 0.1 M NaNO3. Different concentration of species as a function of pH was examined and sequence of overall stability constants for MA, MB, MAB and M1M2AB type of complexes have been discussed which seem to follow Irving William order.
多金属和多配体体系的金属配合物在溶液中的平衡浓度计算比较复杂。根据SCGOS计算机程序得到的物种形成曲线,推导出络合平衡。用电位法测定了以谷氨酸(A)和尿嘧啶(B)为配体的CuII、PbII、HgII、CdII、ZnII、CoII和NiII三元(1:1:1:1)四元(1:1:1)配合物的形成常数。对上述配体的金属配合物的稳定性、溶液结构和定量等方面进行了研究。在37±1°C和离子强度I = 0.1 M NaNO3条件下,测定了所用配体的酸解离常数以及三元和四元配合物的形成常数。考察了不同物质浓度对pH值的影响,并讨论了MA、MB、MAB和M1M2AB型配合物的总体稳定常数的顺序,它们似乎遵循欧文威廉顺序。
{"title":"Computation of multimetalmultiligand complex formation equilibria in aqueous medium involving glutamic acid as primary ligand and Uracil as secondary ligand","authors":"Divya Bartaria, Surabhi Sinha, P. Chandra, V. Krishna","doi":"10.1109/ICCCCM.2013.6648910","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648910","url":null,"abstract":"Metallic complexes of multimetal and multiligand systems are complicated for calculating equilibrium concentrations in solution. Complexation equilibria have been deduced on the basis of speciation curves obtained through SCGOS computer program. The formation constants of ternary(1:1:1) quaternary(1:1:1:1) complexes of CuII, PbII, HgII, CdII, ZnII, CoII and NiII with Glutamic acid(A) and Uracil(B) as ligands have been determined potentiometrically in aqueous medium.Study of metal complexes of said ligands with respect to their stability, solution structure and quantitative aspects has been done. Acid dissociation constants of the ligands used and the formation constants of the ternary and quaternary complexes were determined at 37±1°C and in ionic strength I = 0.1 M NaNO3. Different concentration of species as a function of pH was examined and sequence of overall stability constants for MA, MB, MAB and M1M2AB type of complexes have been discussed which seem to follow Irving William order.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121361073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SWART: Secure Web Application Response Tool 安全的Web应用程序响应工具
Kanika Sharma, Naresh Kumar
Web applications are increasingly used to provide e-services such as online banking, online shopping, and social networking over the internet. With this advancement, the attacks over the web applications have also increased. According to Cenzic 2013 report 99% of web applications are vulnerable tested in 2012 [1]. The root causes behind these vulnerabilities are lack of security awareness, design flaws & implementation bugs. Writing secure code for web application is a complex task as developer emphasis more on implementation of business logic for web application rather than implementing it with secure logic. These vulnerabilities might be exploited by malicious users which can harm the database & reputation of an organization. In this paper we have proposed an Application Intrusion Detection System tool which can detect & prevent web application attacks at the time of occurrence. We have implemented proposed approach with ASP.NET web application and also perform Chi Square test to validate our assumptions. Once completed SWART has future potential to detect and prevent maximum attacks with less complexity.
Web应用程序越来越多地用于通过internet提供电子服务,如在线银行、在线购物和社交网络。随着这一进步,针对web应用程序的攻击也有所增加。根据Cenzic 2013年的报告,99%的web应用程序在2012年的测试中存在漏洞[1]。这些漏洞背后的根本原因是缺乏安全意识、设计缺陷和实现错误。为web应用程序编写安全代码是一项复杂的任务,因为开发人员更多地关注web应用程序的业务逻辑实现,而不是使用安全逻辑实现。这些漏洞可能被恶意用户利用,从而损害组织的数据库和声誉。本文提出了一种应用程序入侵检测系统工具,可以在web应用程序攻击发生时进行检测和预防。我们已经用ASP实现了建议的方法。. NET web应用程序,并执行卡方检验来验证我们的假设。一旦完成,SWART在未来有可能以更低的复杂性检测和防止最大的攻击。
{"title":"SWART: Secure Web Application Response Tool","authors":"Kanika Sharma, Naresh Kumar","doi":"10.1109/ICCCCM.2013.6648920","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648920","url":null,"abstract":"Web applications are increasingly used to provide e-services such as online banking, online shopping, and social networking over the internet. With this advancement, the attacks over the web applications have also increased. According to Cenzic 2013 report 99% of web applications are vulnerable tested in 2012 [1]. The root causes behind these vulnerabilities are lack of security awareness, design flaws & implementation bugs. Writing secure code for web application is a complex task as developer emphasis more on implementation of business logic for web application rather than implementing it with secure logic. These vulnerabilities might be exploited by malicious users which can harm the database & reputation of an organization. In this paper we have proposed an Application Intrusion Detection System tool which can detect & prevent web application attacks at the time of occurrence. We have implemented proposed approach with ASP.NET web application and also perform Chi Square test to validate our assumptions. Once completed SWART has future potential to detect and prevent maximum attacks with less complexity.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126422765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An offensive algorithm for multi-pattern parameterized string matching 多模式参数化字符串匹配的攻击性算法
Swati Tevatia, R. Prasad, D. Rai
Finding a pattern P[0...m-1] in a large body of text T[0...n-1], m≤n, is called pattern matching. One of its variation is parameterized string matching. Two strings are said to parameterized match, if one can be transformed into other via some bijective mapping. The parameterized matching has important applications in software maintenance and plagiarism detection. In this paper, we propose a new algorithm for multi-pattern parameterized string matching problem. This is an extension of quick multiple matching algorithm for exact string matching. Experimental results show that the new algorithm is very fast in practice.
寻找模式P[0…]m-1]在大文本体T[0…]n-1], m≤n,称为模式匹配。它的一种变体是参数化字符串匹配。如果一个字符串可以通过双射映射转换为另一个字符串,则称两个字符串为参数化匹配。参数化匹配在软件维护和剽窃检测中有着重要的应用。本文提出了一种新的多模式参数化字符串匹配算法。这是对精确字符串匹配的快速多重匹配算法的扩展。实验结果表明,该算法在实际应用中具有较快的速度。
{"title":"An offensive algorithm for multi-pattern parameterized string matching","authors":"Swati Tevatia, R. Prasad, D. Rai","doi":"10.1109/ICCCCM.2013.6648922","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648922","url":null,"abstract":"Finding a pattern P[0...m-1] in a large body of text T[0...n-1], m≤n, is called pattern matching. One of its variation is parameterized string matching. Two strings are said to parameterized match, if one can be transformed into other via some bijective mapping. The parameterized matching has important applications in software maintenance and plagiarism detection. In this paper, we propose a new algorithm for multi-pattern parameterized string matching problem. This is an extension of quick multiple matching algorithm for exact string matching. Experimental results show that the new algorithm is very fast in practice.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123418943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A robust third order sliding mode control of rigid underactuated robotic manipulator 刚性欠驱动机械臂的鲁棒三阶滑模控制
Manjusha Bhave, S. Janardhanan, L. Dewan
Robotic manipulators are widely used in space applications. It is a very tough task to handle actuator failure. Purposely, the system could also be designed to be underactuated to lower the weight and power consumption and make it cost effective. Higher order sliding mode control could prove to be a good control philosophy for controlling such underactuated systems. In the present work a strategy of choosing sliding function for tracking control of end effector in underactuated manipulator has been demonstrated by designing the third order sliding mode control and finite time convergence to sliding surface has also been achieved.
机械臂在空间应用中得到了广泛的应用。执行机构故障的处理是一项非常艰巨的任务。有意地,该系统也可以设计为欠驱动,以降低重量和功耗,使其具有成本效益。高阶滑模控制可以被证明是控制这类欠驱动系统的良好控制理念。本文通过设计三阶滑模控制,证明了欠驱动机械臂末端执行器跟踪控制的滑动函数选择策略,并实现了滑模控制向滑动曲面的有限时间收敛。
{"title":"A robust third order sliding mode control of rigid underactuated robotic manipulator","authors":"Manjusha Bhave, S. Janardhanan, L. Dewan","doi":"10.1109/ICCCCM.2013.6648907","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648907","url":null,"abstract":"Robotic manipulators are widely used in space applications. It is a very tough task to handle actuator failure. Purposely, the system could also be designed to be underactuated to lower the weight and power consumption and make it cost effective. Higher order sliding mode control could prove to be a good control philosophy for controlling such underactuated systems. In the present work a strategy of choosing sliding function for tracking control of end effector in underactuated manipulator has been demonstrated by designing the third order sliding mode control and finite time convergence to sliding surface has also been achieved.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134258213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Minimum variance functional filtering for multirate sampled systems 多速率采样系统的最小方差函数滤波
N. Satyanarayana, S. Janardhanan
In this paper, we propose a new method of minimum-variance functional filtering for a class of sampled-data systems. The proposed method is based on multirate sampling of the plant output. This work includes the formulation of multirate output model for continuous-time system having noise in plant dynamics and measurement and necessary and sufficient conditions are given for existence of functional with minimal number of output samples. Numerical example is given to illustrate the procedure and its merits.
本文针对一类采样数据系统,提出了一种新的最小方差函数滤波方法。所提出的方法是基于装置输出的多速率采样。本文建立了具有噪声的连续时间系统的多速率输出模型,给出了输出样本数最少的泛函存在的充分必要条件。通过数值算例说明了该方法及其优点。
{"title":"Minimum variance functional filtering for multirate sampled systems","authors":"N. Satyanarayana, S. Janardhanan","doi":"10.1109/ICCCCM.2013.6648906","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648906","url":null,"abstract":"In this paper, we propose a new method of minimum-variance functional filtering for a class of sampled-data systems. The proposed method is based on multirate sampling of the plant output. This work includes the formulation of multirate output model for continuous-time system having noise in plant dynamics and measurement and necessary and sufficient conditions are given for existence of functional with minimal number of output samples. Numerical example is given to illustrate the procedure and its merits.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125230090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1