首页 > 最新文献

2017 IEEE 7th International Advance Computing Conference (IACC)最新文献

英文 中文
Morphological Pattern Spectrum Based Image Manipulation Detection 基于形态模式谱的图像处理检测
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0127
Nayana Nayak, P. Hegde, Anusha, P. Nayak, P. S. Venugopala, T. Kumaki
This paper presents an image histogram-based image manipulation detection method in android. The method consists of using a mathematical morphological-based algorithm to extract pictorial feature information from an original digital image. This will be useful in situations where it is important to find evidence of specific events such as investigation of crimes or simply image comparison. The morphological pattern spectrum was implemented in android platform using Java and OpenCV. Analysis of manipulated images indicated that the proposed detection method was able to clearly identify the differences from the original images. The results show that the proposed technique has sufficient ability to distinguish the very slight manipulation of upto one pixel size.
本文提出了一种基于图像直方图的android图像处理检测方法。该方法使用基于数学形态学的算法从原始数字图像中提取图像特征信息。这在寻找特定事件的证据很重要的情况下是有用的,例如调查犯罪或简单的图像比较。形态学模式谱在android平台上使用Java和OpenCV实现。经过处理后的图像分析表明,所提出的检测方法能够清晰地识别出与原始图像的差异。结果表明,所提出的技术有足够的能力来区分非常轻微的操作,高达一个像素大小。
{"title":"Morphological Pattern Spectrum Based Image Manipulation Detection","authors":"Nayana Nayak, P. Hegde, Anusha, P. Nayak, P. S. Venugopala, T. Kumaki","doi":"10.1109/IACC.2017.0127","DOIUrl":"https://doi.org/10.1109/IACC.2017.0127","url":null,"abstract":"This paper presents an image histogram-based image manipulation detection method in android. The method consists of using a mathematical morphological-based algorithm to extract pictorial feature information from an original digital image. This will be useful in situations where it is important to find evidence of specific events such as investigation of crimes or simply image comparison. The morphological pattern spectrum was implemented in android platform using Java and OpenCV. Analysis of manipulated images indicated that the proposed detection method was able to clearly identify the differences from the original images. The results show that the proposed technique has sufficient ability to distinguish the very slight manipulation of upto one pixel size.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114660261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mamdani Fuzzy Inference Based Hierarchical Cost Effective Routing (MFIHR) in WSNs 基于Mamdani模糊推理的wsn分层成本有效路由(MFIHR)
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0089
Arabinda Nanda, A. Rath
The cost effective routing is one of major operations in WSNs. The Mamdani fuzzy inference system used to select the chance of a sensor node to become a cluster head (CH) on the basis of input parameter distance and energy of sensor nodes. The heuristic search algorithm A* is used to find the minimum path length from source to sink node. The aggregated data packets are routed from source CH node to sink node on the selected path.
低成本路由是无线传感器网络的主要工作之一。Mamdani模糊推理系统基于传感器节点的输入参数距离和能量来选择传感器节点成为簇头的概率。采用启发式搜索算法A*求源节点到汇聚节点的最小路径长度。聚合后的数据包按照选择的路径从源CH节点路由到汇聚节点。
{"title":"Mamdani Fuzzy Inference Based Hierarchical Cost Effective Routing (MFIHR) in WSNs","authors":"Arabinda Nanda, A. Rath","doi":"10.1109/IACC.2017.0089","DOIUrl":"https://doi.org/10.1109/IACC.2017.0089","url":null,"abstract":"The cost effective routing is one of major operations in WSNs. The Mamdani fuzzy inference system used to select the chance of a sensor node to become a cluster head (CH) on the basis of input parameter distance and energy of sensor nodes. The heuristic search algorithm A* is used to find the minimum path length from source to sink node. The aggregated data packets are routed from source CH node to sink node on the selected path.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134282828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Intelligent Load Frequency Control for Two Area System 二区系统的智能负载频率控制
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0083
T.V. Divya Jyothi, N. Lavanya, C. B. Shankar, T. Sudhakar
Our power system is interconnected one where no of generators are connected together and run in unison manner to meet the demand. The lopsidedness between Generation & demand must be within a few micro seconds to avert frequency discrepant, which lead to problems in stability and security of power system. Control of frequency is paramount to counterbalance the power system by oversee the changes in frequency and load. In this paper three techniques are proposed for load frequency control, those are Ziegler-Nichols, Genetic algorithm(GA),LinearMatrixInequalities(L MI). Among them Ziegler Nichols is a tralatitious technique remaining two are advance techniques. The above techniques are validated through simulations.
我们的电力系统是相互连接的,没有发电机连接在一起,并以一致的方式运行,以满足需求。发电与需求之间的不平衡必须控制在几微秒内,以避免出现频率偏差,从而影响电力系统的稳定性和安全性。通过监测频率和负荷的变化,频率控制对平衡电力系统至关重要。本文提出了Ziegler-Nichols、遗传算法(GA)和线性矩阵不等式(lmi)三种负载频率控制技术。其中齐格勒-尼科尔斯是一种传统技术,其余两种是先进技术。通过仿真验证了上述技术的有效性。
{"title":"An Intelligent Load Frequency Control for Two Area System","authors":"T.V. Divya Jyothi, N. Lavanya, C. B. Shankar, T. Sudhakar","doi":"10.1109/IACC.2017.0083","DOIUrl":"https://doi.org/10.1109/IACC.2017.0083","url":null,"abstract":"Our power system is interconnected one where no of generators are connected together and run in unison manner to meet the demand. The lopsidedness between Generation & demand must be within a few micro seconds to avert frequency discrepant, which lead to problems in stability and security of power system. Control of frequency is paramount to counterbalance the power system by oversee the changes in frequency and load. In this paper three techniques are proposed for load frequency control, those are Ziegler-Nichols, Genetic algorithm(GA),LinearMatrixInequalities(L MI). Among them Ziegler Nichols is a tralatitious technique remaining two are advance techniques. The above techniques are validated through simulations.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121911953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Method for Minimizing Unnecessary Handoff in 802.11 一种减少802.11中不必要切换的新方法
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0082
Vaishali Chauhan, Naresh Pal, R. Raju, Sandeep Joshi, Roheet Bhatnagar
In a mobile wireless network, the unnecessary handoff is the main issue that effects the performance of the network. A handoff occurs when the Received Signal Strength (RSS) is less than the threshold RSS and the new RSS (from neighbors Access point) is more than the present RSS. Earlier the handoff decision algorithms consider RSS only which results in an increase in handoff counting or handoff rate but in a wireless communication system, the signal strength varies due to scattering, shadowing and reflection because of obstacles in the network region. This variation in RSS leads to unnecessary handoff. In this paper, a new method for handoff decision is proposed to reduce the unnecessary handoff. With simulation results or mathematical analysis 25% unnecessary handoff reduced.
在移动无线网络中,不必要的切换是影响网络性能的主要问题。当接收信号强度(RSS)小于阈值RSS并且新RSS(来自邻居接入点)大于当前RSS时,发生切换。早先的切换决策算法只考虑RSS,这会导致切换次数或切换率的增加,但在无线通信系统中,由于网络区域的障碍物,信号强度会因散射、阴影和反射而变化。RSS中的这种变化会导致不必要的切换。本文提出了一种新的切换决策方法,以减少不必要的切换。通过模拟结果或数学分析,减少了25%不必要的切换。
{"title":"A New Method for Minimizing Unnecessary Handoff in 802.11","authors":"Vaishali Chauhan, Naresh Pal, R. Raju, Sandeep Joshi, Roheet Bhatnagar","doi":"10.1109/IACC.2017.0082","DOIUrl":"https://doi.org/10.1109/IACC.2017.0082","url":null,"abstract":"In a mobile wireless network, the unnecessary handoff is the main issue that effects the performance of the network. A handoff occurs when the Received Signal Strength (RSS) is less than the threshold RSS and the new RSS (from neighbors Access point) is more than the present RSS. Earlier the handoff decision algorithms consider RSS only which results in an increase in handoff counting or handoff rate but in a wireless communication system, the signal strength varies due to scattering, shadowing and reflection because of obstacles in the network region. This variation in RSS leads to unnecessary handoff. In this paper, a new method for handoff decision is proposed to reduce the unnecessary handoff. With simulation results or mathematical analysis 25% unnecessary handoff reduced.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"36 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124193204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Analysis of Power-Aware Node-Disjoint Multipath Source Routing in Mobile Ad Hoc Networks 移动Ad Hoc网络中功率感知节点分离多径源路由性能分析
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0084
M. Bheemalingaiah, M. Naidu, D. Rao, P. Vishvapathi
Since 2000, Mobile Ad Hoc Networks are treated as the emerging filed in the wireless communication. They comprise only mobile nodes that use wireless transmission and can be set anywhere and anytime because they eliminate complexity of infrastructure and central admission. The Mobile Ad Hoc Networks are extensively used in different fields such as emergency situations, military applications and mobile communications. The routing is the major issue in the field of MANET due to the mobility nature and lack of infrastructure of the network. The different routing protocols have been proposed to address the routing issue. The development of multipath routing for mobile ad hoc network by considering the performance metrics with standard simulator is an important research area. Hence in this paper, we have chosen Power-aware Node-disjoint Multipath Source Routing (PNDMSR) to implement and analyze its performance with respective to Multipath Dynamic Source Routing (MDSR) by using various quantitative performance metrics like, routing control overhead, throughput, packet delivery ratio, packet loss and energy efficiency by varying various parameters like network's size, mobility of node, pause time, data rate and load. The main objective of the PNDMSR is selecting energy aware node-disjoint multipath from source to destination by optimizing the overhead using node's cost and it increases the network of lifetime.
自2000年以来,移动自组织网络被视为无线通信的新兴领域。它们只包括使用无线传输的移动节点,可以随时随地设置,因为它们消除了基础设施和中央许可的复杂性。移动自组织网络广泛应用于紧急情况、军事应用和移动通信等不同领域。由于网络的移动性和基础设施的缺乏,路由问题一直是MANET领域的主要问题。已经提出了不同的路由协议来解决路由问题。考虑标准模拟器性能指标的移动自组网多径路由的开发是一个重要的研究领域。因此,在本文中,我们选择了功率感知节点分离多路径源路由(PNDMSR)来实现和分析其相对于多路径动态源路由(MDSR)的性能,通过改变网络大小,节点的移动性,暂停时间,数据速率和负载等各种参数,使用各种定量性能指标,如路由控制开销,吞吐量,数据包投递率,数据包丢失和能源效率。PNDMSR的主要目标是通过利用节点的成本优化开销,选择能量感知的从源到目的的节点不相交多路径,从而提高网络的生存期。
{"title":"Performance Analysis of Power-Aware Node-Disjoint Multipath Source Routing in Mobile Ad Hoc Networks","authors":"M. Bheemalingaiah, M. Naidu, D. Rao, P. Vishvapathi","doi":"10.1109/IACC.2017.0084","DOIUrl":"https://doi.org/10.1109/IACC.2017.0084","url":null,"abstract":"Since 2000, Mobile Ad Hoc Networks are treated as the emerging filed in the wireless communication. They comprise only mobile nodes that use wireless transmission and can be set anywhere and anytime because they eliminate complexity of infrastructure and central admission. The Mobile Ad Hoc Networks are extensively used in different fields such as emergency situations, military applications and mobile communications. The routing is the major issue in the field of MANET due to the mobility nature and lack of infrastructure of the network. The different routing protocols have been proposed to address the routing issue. The development of multipath routing for mobile ad hoc network by considering the performance metrics with standard simulator is an important research area. Hence in this paper, we have chosen Power-aware Node-disjoint Multipath Source Routing (PNDMSR) to implement and analyze its performance with respective to Multipath Dynamic Source Routing (MDSR) by using various quantitative performance metrics like, routing control overhead, throughput, packet delivery ratio, packet loss and energy efficiency by varying various parameters like network's size, mobility of node, pause time, data rate and load. The main objective of the PNDMSR is selecting energy aware node-disjoint multipath from source to destination by optimizing the overhead using node's cost and it increases the network of lifetime.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130204572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Cost-Based Database Scaling 基于成本的数据库扩展
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0182
V. Oruganti
Scaling database is one of the important aspects of testing the database engines. Traditionally, scaling performed in the most of the databases is with respect to the size of the database. That is, given a scaling factor, the row cardinality of each relation is scaled up by a factor. In this paper, we describe a new method of scaling database called cost based scaling. The cost is the time taken to execute a query workload on scaled database. The goal of cost based scaling is to scale the database so that time taken for executing queries on scaled database is some multiple of time for executing the queries on original database. This cost based scaling can be used as an alternative to the traditional size based scaling for testing the database engines.
扩展数据库是测试数据库引擎的一个重要方面。传统上,在大多数数据库中执行的伸缩是与数据库的大小有关的。也就是说,给定一个缩放因子,每个关系的行基数按一个因子进行缩放。本文提出了一种基于成本的数据库扩展方法。成本是在扩展数据库上执行查询工作负载所花费的时间。基于成本的扩展的目标是扩展数据库,以便在扩展后的数据库上执行查询所需的时间是在原始数据库上执行查询所需时间的若干倍。这种基于成本的扩展可以替代传统的基于大小的扩展,用于测试数据库引擎。
{"title":"Cost-Based Database Scaling","authors":"V. Oruganti","doi":"10.1109/IACC.2017.0182","DOIUrl":"https://doi.org/10.1109/IACC.2017.0182","url":null,"abstract":"Scaling database is one of the important aspects of testing the database engines. Traditionally, scaling performed in the most of the databases is with respect to the size of the database. That is, given a scaling factor, the row cardinality of each relation is scaled up by a factor. In this paper, we describe a new method of scaling database called cost based scaling. The cost is the time taken to execute a query workload on scaled database. The goal of cost based scaling is to scale the database so that time taken for executing queries on scaled database is some multiple of time for executing the queries on original database. This cost based scaling can be used as an alternative to the traditional size based scaling for testing the database engines.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121049557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vehicle Identification Based on the Model 基于模型的车辆识别
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0122
T. Sridevi, P. Swapna, K. Harinath
Now a day's vehicle recognition has become a wide area of research. Vehicle recognition has several applications such as in automatic parking, toll gate management etc., Because of numerous applications, vehicle recognition in computer vision has become a research area in Intelligent Transport System (ITS). There are many different vehicles from different manufacturers which are increasing day by day. Analyzing the attributes of these vehicles and recognizing different vehicles is a complex task. The main objective of this project is vehicle identification. Vehicles can be identified by performing recognition of its iconic license plate but the License Plate Recognition System does not work when license plate is manipulated, missing or covered. Another important attribute of a vehicle is its logo which contains important information about the car and as it cannot be changed easily. Logo plays an important role in recognition of vehicles. Here vehicle recognition is concentrated based on logos in order to give the manufacturers name or brand. Vehicle recognition is performed by extracting logo using ROI selection. Then by using gray level co-occurrence matrix feature extraction method features are extracted and classification is performed based on probabilistic neural network.
如今,车辆识别已成为一个广泛的研究领域。车辆识别在自动泊车、收费站管理等方面有着广泛的应用,计算机视觉中的车辆识别已成为智能交通系统(ITS)的一个研究领域。有许多不同的车辆来自不同的制造商,日益增加。分析这些车辆的属性并识别不同的车辆是一项复杂的任务。这个项目的主要目标是车辆识别。车辆可以通过识别其标志性车牌来识别,但车牌识别系统在车牌被操纵、丢失或覆盖时不起作用。汽车的另一个重要属性是它的标志,它包含了关于汽车的重要信息,因为它不能轻易改变。标志在车辆识别中起着重要的作用。在这里,车辆识别主要基于徽标,以便给出制造商的名称或品牌。利用ROI选择提取徽标,实现车辆识别。然后采用灰度共现矩阵特征提取方法提取特征并基于概率神经网络进行分类。
{"title":"Vehicle Identification Based on the Model","authors":"T. Sridevi, P. Swapna, K. Harinath","doi":"10.1109/IACC.2017.0122","DOIUrl":"https://doi.org/10.1109/IACC.2017.0122","url":null,"abstract":"Now a day's vehicle recognition has become a wide area of research. Vehicle recognition has several applications such as in automatic parking, toll gate management etc., Because of numerous applications, vehicle recognition in computer vision has become a research area in Intelligent Transport System (ITS). There are many different vehicles from different manufacturers which are increasing day by day. Analyzing the attributes of these vehicles and recognizing different vehicles is a complex task. The main objective of this project is vehicle identification. Vehicles can be identified by performing recognition of its iconic license plate but the License Plate Recognition System does not work when license plate is manipulated, missing or covered. Another important attribute of a vehicle is its logo which contains important information about the car and as it cannot be changed easily. Logo plays an important role in recognition of vehicles. Here vehicle recognition is concentrated based on logos in order to give the manufacturers name or brand. Vehicle recognition is performed by extracting logo using ROI selection. Then by using gray level co-occurrence matrix feature extraction method features are extracted and classification is performed based on probabilistic neural network.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121645725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Big Data Privacy Using Fully Homomorphic Non-Deterministic Encryption 使用完全同态非确定性加密的大数据隐私
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0041
Tejas Patil, G. Patnaik, A. T. Bhole
Big data is a large amount of digital information. Now days, data security is a challenging issue that touches several areas along with computers and communication. The security of data which stored online has become a main concern. Several attackers play with confidentiality of the user. Cryptography is a approach that provide data security to the user. Despite of huge efforts to protect sensitive data, hackers typically manage to steal it. Computing with encrypted data is strategies for safeguarding confidential data. The partial homomorphic encryption is specialized for only one operation on the encrypted data. For example the Pailliers encryption scheme performs only one mathematical operation on encrypted numerical data and is successful to compute the sum of encrypted values. The Pailliers encryption scheme is unable to do multiple mathematical operations on encrypted numerical data. The proposed encryption algorithm computes more than one mathematical operation on encrypted numerical data thereby further protecting the encrypted sensitive information.
大数据是指大量的数字信息。如今,数据安全是一个具有挑战性的问题,涉及到计算机和通信的几个领域。存储在网上的数据的安全性已成为一个主要问题。一些攻击者利用用户的机密性。密码学是一种为用户提供数据安全性的方法。尽管在保护敏感数据方面付出了巨大的努力,但黑客通常还是能窃取到这些数据。使用加密数据进行计算是保护机密数据的策略。部分同态加密专门用于对加密数据的一次操作。例如,Pailliers加密方案仅对加密的数字数据执行一次数学运算,并成功地计算出加密值的总和。paillier加密方案不能对加密的数值数据进行多次数学运算。所提出的加密算法对加密的数字数据计算多个数学运算,从而进一步保护加密的敏感信息。
{"title":"Big Data Privacy Using Fully Homomorphic Non-Deterministic Encryption","authors":"Tejas Patil, G. Patnaik, A. T. Bhole","doi":"10.1109/IACC.2017.0041","DOIUrl":"https://doi.org/10.1109/IACC.2017.0041","url":null,"abstract":"Big data is a large amount of digital information. Now days, data security is a challenging issue that touches several areas along with computers and communication. The security of data which stored online has become a main concern. Several attackers play with confidentiality of the user. Cryptography is a approach that provide data security to the user. Despite of huge efforts to protect sensitive data, hackers typically manage to steal it. Computing with encrypted data is strategies for safeguarding confidential data. The partial homomorphic encryption is specialized for only one operation on the encrypted data. For example the Pailliers encryption scheme performs only one mathematical operation on encrypted numerical data and is successful to compute the sum of encrypted values. The Pailliers encryption scheme is unable to do multiple mathematical operations on encrypted numerical data. The proposed encryption algorithm computes more than one mathematical operation on encrypted numerical data thereby further protecting the encrypted sensitive information.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122845323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance Enhancement of Permanent Magnet Brushless DC Motor Using Multilevel Inverter 用多电平逆变器提高永磁无刷直流电动机的性能
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0103
B. Kalyani, Venu Madhav Mukkavilli, G. Naik
This report furnishes the brushless DC motor (BLDC) performance when fed by multi level inverter is compared with voltage source inverter (VSI) fed BLDC motor. Total harmonic distortion (THD) of stator currents and back EMF's of BLDC Motor for these two inverter topologies are compared. Over past years for high power and medium voltage control applications multi level inverters are employed. To obtain higher levels of voltage different types of multilevel inverters are used. Among them, Cascaded H-bridge multi level inverters are mostly used due to its advantages over other. Here experimental results of a voltage source inverter fed BLDC motor performance are compared with cascaded H-bridge multilevel inverter driven BLDC motor performance.
本文比较了采用多电平逆变器供电的无刷直流电动机与电压源逆变器供电的无刷直流电动机的性能。比较了两种逆变器拓扑结构下无刷直流电机定子电流和反电动势的总谐波畸变(THD)。在过去的几年里,大功率和中压控制应用采用了多电平逆变器。为了获得更高的电压水平,使用了不同类型的多电平逆变器。其中,级联h桥多电平逆变器由于其优点被广泛使用。本文将电压源逆变器驱动的无刷直流电机性能与级联h桥多电平逆变器驱动的无刷直流电机性能进行了实验比较。
{"title":"Performance Enhancement of Permanent Magnet Brushless DC Motor Using Multilevel Inverter","authors":"B. Kalyani, Venu Madhav Mukkavilli, G. Naik","doi":"10.1109/IACC.2017.0103","DOIUrl":"https://doi.org/10.1109/IACC.2017.0103","url":null,"abstract":"This report furnishes the brushless DC motor (BLDC) performance when fed by multi level inverter is compared with voltage source inverter (VSI) fed BLDC motor. Total harmonic distortion (THD) of stator currents and back EMF's of BLDC Motor for these two inverter topologies are compared. Over past years for high power and medium voltage control applications multi level inverters are employed. To obtain higher levels of voltage different types of multilevel inverters are used. Among them, Cascaded H-bridge multi level inverters are mostly used due to its advantages over other. Here experimental results of a voltage source inverter fed BLDC motor performance are compared with cascaded H-bridge multilevel inverter driven BLDC motor performance.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123932648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Wiener Model Based System Identification Based on CRPSO Algorithm 基于Wiener模型的CRPSO算法系统辨识
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0168
P. Pal, R. Kar, D. Mandal, S. Ghoshal
An efficient and accurate method has been proposed in this manuscript to identify a Output Error (OE) structure based Wiener model with Craziness based Particle Swarm Optimization (CRPSO) algorithm. The accuracy and the precision of the identification scheme have been justified with the achieved bias and variance values, respectively, of the estimated parameters. Mean square error (MSE) of the output is considered as the performance measures or the fitness for the CRPSO algorithm. The various statistical measures associated with MSE confirm the superior performance of the proposed CRPSO based identification of the Hammerstein system. Accurate identification of the parameters associated with the linear as well as nonlinear block with the noisy environment ensures the robustness and stability of the overall system.
本文提出了一种利用基于疯狂度的粒子群优化(CRPSO)算法对基于输出误差(OE)结构的Wiener模型进行高效、准确识别的方法。分别用估计参数的偏差值和方差值验证了识别方案的准确性和精度。输出的均方误差(MSE)被认为是CRPSO算法的性能指标或适应度。与MSE相关的各种统计测量证实了所提出的基于CRPSO的Hammerstein系统识别的优越性能。准确识别与噪声环境下的线性和非线性块相关的参数,保证了整个系统的鲁棒性和稳定性。
{"title":"Wiener Model Based System Identification Based on CRPSO Algorithm","authors":"P. Pal, R. Kar, D. Mandal, S. Ghoshal","doi":"10.1109/IACC.2017.0168","DOIUrl":"https://doi.org/10.1109/IACC.2017.0168","url":null,"abstract":"An efficient and accurate method has been proposed in this manuscript to identify a Output Error (OE) structure based Wiener model with Craziness based Particle Swarm Optimization (CRPSO) algorithm. The accuracy and the precision of the identification scheme have been justified with the achieved bias and variance values, respectively, of the estimated parameters. Mean square error (MSE) of the output is considered as the performance measures or the fitness for the CRPSO algorithm. The various statistical measures associated with MSE confirm the superior performance of the proposed CRPSO based identification of the Hammerstein system. Accurate identification of the parameters associated with the linear as well as nonlinear block with the noisy environment ensures the robustness and stability of the overall system.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131310200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 IEEE 7th International Advance Computing Conference (IACC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1