首页 > 最新文献

2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)最新文献

英文 中文
A novel approach for detecting facial image spoofing using local ternary pattern 一种利用局部三元模式检测人脸图像欺骗的新方法
M. Diviya, Susmita Mishra
Biometrie spoofing is widely understood as the ability to fool a biometric system in recognizing an illegitimate user as a genuine one. To keep a goodlevel of security, reliable spoofing detection tools are necessary. Immense growth of technology permitted the use of biometrics in diverse fields such as forensics, access control, surveillance or online commerce. The new biometric paradigm has transformed passwords and cards into human as the best key. The proposed approach considers facial texture as a feature. Further the microtextural features of the facial images are extracted using Local Ternary Pattern approach and the extracted Local Ternary patterns are converted into upper pattern and lower pattern. Further the patterns are used to generate histograms. The feature histograms are fed into SVM classifier to classify the features from which the outlier is detected i.e whether any spoofing is done with the image or it is a real image.
生物识别欺骗被广泛理解为欺骗生物识别系统将非法用户识别为真实用户的能力。为了保持良好的安全性,可靠的欺骗检测工具是必要的。技术的巨大发展使生物识别技术得以在取证、访问控制、监控或在线商务等不同领域得到应用。新的生物识别范式将密码和卡片变成了最好的钥匙。该方法将面部纹理作为特征。采用局部三元模式方法提取人脸图像的微纹理特征,并将提取的局部三元模式转换为上模式和下模式。此外,这些模式还用于生成直方图。将特征直方图输入SVM分类器,对检测到离群值的特征进行分类,即图像是否被欺骗或是否为真实图像。
{"title":"A novel approach for detecting facial image spoofing using local ternary pattern","authors":"M. Diviya, Susmita Mishra","doi":"10.1109/ICONSTEM.2016.7560924","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560924","url":null,"abstract":"Biometrie spoofing is widely understood as the ability to fool a biometric system in recognizing an illegitimate user as a genuine one. To keep a goodlevel of security, reliable spoofing detection tools are necessary. Immense growth of technology permitted the use of biometrics in diverse fields such as forensics, access control, surveillance or online commerce. The new biometric paradigm has transformed passwords and cards into human as the best key. The proposed approach considers facial texture as a feature. Further the microtextural features of the facial images are extracted using Local Ternary Pattern approach and the extracted Local Ternary patterns are converted into upper pattern and lower pattern. Further the patterns are used to generate histograms. The feature histograms are fed into SVM classifier to classify the features from which the outlier is detected i.e whether any spoofing is done with the image or it is a real image.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"1 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133135145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Computerized filling station management system 电脑化加油站管理系统
R. Gnanavel, P Deepak, B. P. Kumaar, Jason Bakthakumar
In the current scenario, replacing the human efforts into automated digitalized mechanism has become a vast growing factor. Human race has become far more independent than they were in the past. Every field has reached their goal of user friendly, in which the actions of a person are controlled by software. However, this is not applied in most of the petrol bunks. Normally in petrol bunks there is a Human to Human interaction. Our project is to overcome this phenomenon by bringing the interaction between Human and Software. By following this mechanism, we can avoid all the errors that a human does and also avoid the cheating activities that a culprit laborer performs in his work. Our project idea is to make the entire process performed by human laborer in a Filling Station into automated digitalized mechanism to avoid small errors and cheats that can be performed by the laborer to their owners. Our system consists of RFID READER to be placed in the Filling Station and all the vehicles must be provided with RFID TAGS. When the RFID READER senses the RFID TAG that holds the customer id, it sends the id to the centralized server, verifies the ID and opens the gate, the database in the centralized server consist of all banking details of the customer that can be fetched automatically after the confirmation of the user for the cost of the fuel. At present using RFID technology in automating the filling station including the transaction process have created the idea that it is not secure, so we use advanced cryptographic techniques like Secure Socket Layer (SSL) cryptography. AES - Advanced Encryption Standard Symmetric Cryptography to make sure that the process is secured and efficient. All the customer's ID details and total amount of fuel dispensed from the filling station will also be stored in a separate database for the filling station owner's view and also sent to user's registered mobile number using GSM technology.
在目前的情况下,用自动化的数字化机制取代人力已经成为一个巨大的增长因素。人类比过去更加独立了。每个领域都达到了用户友好的目标,即人的行为由软件控制。然而,这并不适用于大多数加油站。通常在加油站会有人与人之间的互动。我们的项目是通过引入人与软件之间的交互来克服这一现象。通过遵循这一机制,我们可以避免人类所犯的所有错误,也可以避免罪犯劳动者在工作中进行的欺骗活动。我们的项目理念是将人工在加油站完成的整个过程变成自动化的数字化机制,以避免人工对主人犯下的小错误和欺骗。我们的系统由RFID阅读器组成,放置在加油站,所有车辆都必须配备RFID标签。当RFID READER感知到持有客户id的RFID TAG时,它将id发送到集中服务器,验证id并打开大门,集中服务器中的数据库包含客户的所有银行详细信息,这些详细信息可以在用户确认燃油费用后自动获取。目前在加油站自动化中使用RFID技术,包括交易过程,存在不安全的想法,因此我们采用了安全套接字层(SSL)加密等先进的加密技术。AES -高级加密标准对称加密,以确保过程的安全性和有效性。所有客户的ID详细信息和加油站的燃油总量也将存储在一个单独的数据库中,供加油站所有者查看,并通过GSM技术发送到用户的注册手机号码。
{"title":"Computerized filling station management system","authors":"R. Gnanavel, P Deepak, B. P. Kumaar, Jason Bakthakumar","doi":"10.1109/ICONSTEM.2016.7560919","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560919","url":null,"abstract":"In the current scenario, replacing the human efforts into automated digitalized mechanism has become a vast growing factor. Human race has become far more independent than they were in the past. Every field has reached their goal of user friendly, in which the actions of a person are controlled by software. However, this is not applied in most of the petrol bunks. Normally in petrol bunks there is a Human to Human interaction. Our project is to overcome this phenomenon by bringing the interaction between Human and Software. By following this mechanism, we can avoid all the errors that a human does and also avoid the cheating activities that a culprit laborer performs in his work. Our project idea is to make the entire process performed by human laborer in a Filling Station into automated digitalized mechanism to avoid small errors and cheats that can be performed by the laborer to their owners. Our system consists of RFID READER to be placed in the Filling Station and all the vehicles must be provided with RFID TAGS. When the RFID READER senses the RFID TAG that holds the customer id, it sends the id to the centralized server, verifies the ID and opens the gate, the database in the centralized server consist of all banking details of the customer that can be fetched automatically after the confirmation of the user for the cost of the fuel. At present using RFID technology in automating the filling station including the transaction process have created the idea that it is not secure, so we use advanced cryptographic techniques like Secure Socket Layer (SSL) cryptography. AES - Advanced Encryption Standard Symmetric Cryptography to make sure that the process is secured and efficient. All the customer's ID details and total amount of fuel dispensed from the filling station will also be stored in a separate database for the filling station owner's view and also sent to user's registered mobile number using GSM technology.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116891499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Checking falseness in outsourced data storage systems 检查外包数据存储系统的错误
D. Jayashree, K. Sivagami, T. Anju, G. Lavanya, S. Malini
Mobile Applications of cloud play stores have a tremendous growth nowadays. Numerous applications are available to schedule our day to day activities, checking emails, making conference calls, connect using social network and so on. As the technology grows the fraudulence of applications has also increased. Some Application developers use tricky measures to rank their applications in the top Applications list. For this purpose, a fraud detection mechanism is proposed to help the user about the false outsourced data that is the fraud applications. The detection mechanism is based on the aggregation of the download history, reviews, ratings and active periods of the mobile application. By means of this mechanism the factor of satisfiablity is ensured for the users and the genuine application developers.
如今,云游戏商店的移动应用程序有了巨大的增长。有许多应用程序可以用来安排我们的日常活动,检查电子邮件,召开电话会议,使用社交网络等。随着技术的发展,应用程序的欺诈性也在增加。一些应用程序开发人员使用复杂的方法将他们的应用程序排在应用程序列表的前列。为此,提出了一种欺诈检测机制,以帮助用户识别欺诈应用程序中的虚假外包数据。检测机制是基于手机应用的下载历史、评论、评级和活跃期的聚合。通过这种机制,确保了用户和真正的应用程序开发人员的满意度因素。
{"title":"Checking falseness in outsourced data storage systems","authors":"D. Jayashree, K. Sivagami, T. Anju, G. Lavanya, S. Malini","doi":"10.1109/ICONSTEM.2016.7560920","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560920","url":null,"abstract":"Mobile Applications of cloud play stores have a tremendous growth nowadays. Numerous applications are available to schedule our day to day activities, checking emails, making conference calls, connect using social network and so on. As the technology grows the fraudulence of applications has also increased. Some Application developers use tricky measures to rank their applications in the top Applications list. For this purpose, a fraud detection mechanism is proposed to help the user about the false outsourced data that is the fraud applications. The detection mechanism is based on the aggregation of the download history, reviews, ratings and active periods of the mobile application. By means of this mechanism the factor of satisfiablity is ensured for the users and the genuine application developers.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130856774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An energy efficient grid based routing in mobile sink based wireless sensor networks 基于移动汇聚的无线传感器网络中基于节能网格的路由
Niraj B. Nake, P. Chatur
Wireless sensor network is a popular and an emerging area of research for scientists. The network consists of a large number of devices called as sensor nodes or motes which are deployed over a particular area or region. Each node is well equipped with energy so as to interact actively in a network and participate in a data exchange over networks. The nodes in a network can be static or dynamic and they can send their data to a base station called as sink node. The mobility of a base station node will help effectively in optimizing energy efficiency and to increase lifetime of a network. A Grid based approach makes the division of entire sensor network field into several numbers of clusters also called as cells. A cluster head is chosen among each cluster which will be responsible in making an optimal path so as to communicate with mobile base station node. As the sink node is moving along the sensor field the route will be automatically updated which will require only minimum number of motes to update their packet delivery path towards sink node. The sink node can be moved with variable speed to add more flexibility in a network. Also, the participating nodes can send the data with variable transmission data rates so as to increase the lifetime of a network. We propose these two parameters so as to make the existing communication more efficient and flexible.
无线传感器网络是科学家们研究的一个热门的新兴领域。网络由大量被称为传感器节点的设备组成,这些设备部署在特定的区域或区域。每个节点都有充足的能量,可以在网络中主动交互,参与网络上的数据交换。网络中的节点可以是静态的,也可以是动态的,它们可以将数据发送到一个称为汇聚节点的基站。基站节点的移动性将有助于有效地优化能源效率和增加网络的使用寿命。基于网格的方法将整个传感器网络域划分为若干个簇,也称为单元。在每个簇中选择一个簇头,该簇头负责优选出与移动基站节点通信的最优路径。当汇聚节点沿着传感器域移动时,路由将自动更新,这将只需要最小数量的mote来更新它们到汇聚节点的数据包传递路径。汇聚节点可以以可变速度移动,从而在网络中增加更多的灵活性。此外,参与节点可以以可变的传输数据速率发送数据,以增加网络的生命周期。我们提出这两个参数是为了使现有的通信更加高效和灵活。
{"title":"An energy efficient grid based routing in mobile sink based wireless sensor networks","authors":"Niraj B. Nake, P. Chatur","doi":"10.1109/ICONSTEM.2016.7560872","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560872","url":null,"abstract":"Wireless sensor network is a popular and an emerging area of research for scientists. The network consists of a large number of devices called as sensor nodes or motes which are deployed over a particular area or region. Each node is well equipped with energy so as to interact actively in a network and participate in a data exchange over networks. The nodes in a network can be static or dynamic and they can send their data to a base station called as sink node. The mobility of a base station node will help effectively in optimizing energy efficiency and to increase lifetime of a network. A Grid based approach makes the division of entire sensor network field into several numbers of clusters also called as cells. A cluster head is chosen among each cluster which will be responsible in making an optimal path so as to communicate with mobile base station node. As the sink node is moving along the sensor field the route will be automatically updated which will require only minimum number of motes to update their packet delivery path towards sink node. The sink node can be moved with variable speed to add more flexibility in a network. Also, the participating nodes can send the data with variable transmission data rates so as to increase the lifetime of a network. We propose these two parameters so as to make the existing communication more efficient and flexible.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132098186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Role analysis for profile generation in heterogeneous social network 异构社会网络中人物档案生成的角色分析
R. Nishanthi, S. Karthika
The social network is a powerful data structure allowing the study of relationship information between entities. The existing methods only rely on analyzing homogeneous social network assuming only a single type of node and relation. Though, real world complex networks are not so. Usually it is a heterogeneous social network which assumes a network with different types of nodes and relation. A Multi Relational Network (MRN) is used to describe the nodes and links in the form of a directional semantic graph where each node is related with more than one relationship with others. The profile for each node can be generated based on the relation sequence of each node. To analyze the relation of node in the heterogeneous social network, role analysis is done in the profile creation. The evaluations are conducted on a real-world movie dataset with promising results.
社交网络是一个强大的数据结构,允许研究实体之间的关系信息。现有的方法只依赖于分析同质的社会网络,假设只有单一类型的节点和关系。然而,现实世界的复杂网络并非如此。它通常是一个异构的社会网络,具有不同类型的节点和关系。多关系网络(MRN)用于以方向语义图的形式描述节点和链接,其中每个节点与其他节点之间存在多个关系。可以根据每个节点的关系顺序生成每个节点的概要文件。为了分析异构社会网络中节点之间的关系,在配置文件创建过程中进行了角色分析。这些评估是在真实世界的电影数据集上进行的,结果很有希望。
{"title":"Role analysis for profile generation in heterogeneous social network","authors":"R. Nishanthi, S. Karthika","doi":"10.1109/ICONSTEM.2016.7560913","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560913","url":null,"abstract":"The social network is a powerful data structure allowing the study of relationship information between entities. The existing methods only rely on analyzing homogeneous social network assuming only a single type of node and relation. Though, real world complex networks are not so. Usually it is a heterogeneous social network which assumes a network with different types of nodes and relation. A Multi Relational Network (MRN) is used to describe the nodes and links in the form of a directional semantic graph where each node is related with more than one relationship with others. The profile for each node can be generated based on the relation sequence of each node. To analyze the relation of node in the heterogeneous social network, role analysis is done in the profile creation. The evaluations are conducted on a real-world movie dataset with promising results.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133746035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling, analysis and control of INOSLC (Improved Negative Output Super-Lift Luo Converter) using PI controller 利用PI控制器对INOSLC(改进型负输出超升力罗变换器)进行建模、分析和控制
J. B. Robin, V. Chamundeeswari
The proposed paper conveys the working of Improved Negative Output Super-Lift Luo converter (INOSLC) which is a modified version of Negative Output Super-lift Luo Converter(NOSLC). NOSLC is a type of DC-DC converter in which the negative output voltage increases in ten to hundred times the input voltage. INOSLC produces still high output than NOSLC with less number of charging components employed. Though the modified version produces enhanced output, it shows lot of non-linearities in it with supply and load changes. To meet the load demand and to have a good regulation at its output, the Proportional - Integral(PI) Controller is proposed here. The values of Kp and Ti in PI were tuned using Zeigler-Nichols Tuning method and are applied in the transfer function of the controller. The proposed converter is modelled and simulated using MATLAB and the simulation results are verified and validated with the theoretical calculations.
本文介绍了一种改进型负输出超升力罗变换器(INOSLC)的工作原理,它是负输出超升力罗变换器(NOSLC)的改进版本。NOSLC是一种DC-DC变换器,其负输出电压增加到输入电压的十倍到百倍。INOSLC产生的输出仍然比NOSLC高,使用的充电组件数量较少。改进后的系统虽然输出增强,但随着供电和负荷的变化,系统表现出很大的非线性。为了满足负载的需求,并使其输出具有良好的调节性,本文提出了比例积分(PI)控制器。采用Zeigler-Nichols整定方法对PI中的Kp和Ti值进行整定,并应用于控制器的传递函数中。利用MATLAB对所提出的变换器进行了建模和仿真,并通过理论计算对仿真结果进行了验证。
{"title":"Modeling, analysis and control of INOSLC (Improved Negative Output Super-Lift Luo Converter) using PI controller","authors":"J. B. Robin, V. Chamundeeswari","doi":"10.1109/ICONSTEM.2016.7560867","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560867","url":null,"abstract":"The proposed paper conveys the working of Improved Negative Output Super-Lift Luo converter (INOSLC) which is a modified version of Negative Output Super-lift Luo Converter(NOSLC). NOSLC is a type of DC-DC converter in which the negative output voltage increases in ten to hundred times the input voltage. INOSLC produces still high output than NOSLC with less number of charging components employed. Though the modified version produces enhanced output, it shows lot of non-linearities in it with supply and load changes. To meet the load demand and to have a good regulation at its output, the Proportional - Integral(PI) Controller is proposed here. The values of Kp and Ti in PI were tuned using Zeigler-Nichols Tuning method and are applied in the transfer function of the controller. The proposed converter is modelled and simulated using MATLAB and the simulation results are verified and validated with the theoretical calculations.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115186080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A comparative analysis on multilevel inverter with and without harmonics injection method 采用和不采用谐波注入法的多电平逆变器的对比分析
K. Pandian, P. Rajesh, J. Vinodhini
In this paper, a comparative analysis of with and without injecting the harmonics in switching techniques for multilevel inverter was carried out. The multilevel inverter are said to be the power converter systems where the by controlling the power semiconductor sources properly a controlled multistep voltage waveform will generate. The first approach on multilevel inverter is carried out in Simulink by taking the sink without harmonics injection. The second approach injecting the harmonics in the multilevel inverter. These both are compared on the basis of their quality improve in output voltage and also the total harmonic reduction. This paper aims to extend the well developed knowledge about the performance of harmonic analysis. Simulation result for with and without harmonic injection method was carried out using MATLAB/Simulink.
本文对多电平逆变器的开关技术进行了谐波注入与非谐波注入的对比分析。多电平逆变器被认为是一种功率变换器系统,其中通过适当地控制功率半导体源将产生可控的多阶电压波形。第一种方法是在Simulink中采用无谐波注入的sink实现多电平逆变器。第二种方法是在多电平逆变器中注入谐波。在输出电压质量提高和总谐波降低的基础上,对两者进行了比较。本文旨在扩展有关谐波分析性能的成熟知识。利用MATLAB/Simulink对谐波注入法和无谐波注入法进行了仿真。
{"title":"A comparative analysis on multilevel inverter with and without harmonics injection method","authors":"K. Pandian, P. Rajesh, J. Vinodhini","doi":"10.1109/ICONSTEM.2016.7560869","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560869","url":null,"abstract":"In this paper, a comparative analysis of with and without injecting the harmonics in switching techniques for multilevel inverter was carried out. The multilevel inverter are said to be the power converter systems where the by controlling the power semiconductor sources properly a controlled multistep voltage waveform will generate. The first approach on multilevel inverter is carried out in Simulink by taking the sink without harmonics injection. The second approach injecting the harmonics in the multilevel inverter. These both are compared on the basis of their quality improve in output voltage and also the total harmonic reduction. This paper aims to extend the well developed knowledge about the performance of harmonic analysis. Simulation result for with and without harmonic injection method was carried out using MATLAB/Simulink.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114625755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open loop and closed loop comparision for single phase Cyclo converter (PID controller) 单相环控变换器(PID控制器)开环与闭环比较
K. Kamalesh, Polakamma Sriram Prasad Reddy, J. Vinodhini
This paper compares the open loop and closed loop system for a single phase Cyclo converter. This paper compares the characteristics like mechanical, speed and torque characteristics of the open loop and closed loop system. In this paper PWM technique is employed along with cyclo converter using IGBT which increases the performance and control of the system. Special advantage of using IGBT in this topology to increases the dynamic characteristics and reduces the total harmonic distortion. The filters are used to reduce the primary harmonics of the system and the secondary or the higher level harmonics. The output for open loop and closed loop was carried out by using MATLAB Simulink. This appear proves the dramatic changes in cycloconverter when comparing with open loop and closed loop using PID controller.
本文对单相环控变换器的开环系统和闭环系统进行了比较。本文比较了开环和闭环系统的机械特性、速度特性和转矩特性。本文采用PWM技术和IGBT环控变换器,提高了系统的性能和控制性能。在这种拓扑结构中使用IGBT的特殊优点是提高了动态特性,降低了总谐波失真。滤波器用于降低系统的一次谐波和二次谐波或更高阶的谐波。利用MATLAB Simulink进行开环和闭环输出。这证明了与采用PID控制的开环和闭环相比,环变换器的变化是巨大的。
{"title":"Open loop and closed loop comparision for single phase Cyclo converter (PID controller)","authors":"K. Kamalesh, Polakamma Sriram Prasad Reddy, J. Vinodhini","doi":"10.1109/ICONSTEM.2016.7560868","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560868","url":null,"abstract":"This paper compares the open loop and closed loop system for a single phase Cyclo converter. This paper compares the characteristics like mechanical, speed and torque characteristics of the open loop and closed loop system. In this paper PWM technique is employed along with cyclo converter using IGBT which increases the performance and control of the system. Special advantage of using IGBT in this topology to increases the dynamic characteristics and reduces the total harmonic distortion. The filters are used to reduce the primary harmonics of the system and the secondary or the higher level harmonics. The output for open loop and closed loop was carried out by using MATLAB Simulink. This appear proves the dramatic changes in cycloconverter when comparing with open loop and closed loop using PID controller.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124937547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mitigating insider data theft attacks in the cloud 减轻云中的内部数据盗窃攻击
R. Kowsik, L. Vignesh
Cloud computing promises to significantly change the way we use computers and access and store our personal and busi-ness information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. We propose a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user's real data. Experiments conducted in a local file setting provide evidence that this approach may provide unprecedented levels of user data security in a Cloud environment.
云计算承诺将显著改变我们使用计算机以及访问和存储个人和商业信息的方式。随着这些新的计算和通信范式的出现,出现了新的数据安全挑战。加密等现有数据保护机制无法防止数据盗窃攻击,尤其是由云提供商内部人员实施的攻击。我们提出了一种使用进攻性诱饵技术来保护云中的数据的不同方法。我们监控云中的数据访问并检测异常的数据访问模式。当怀疑未经授权的访问并使用挑战问题进行验证时,我们通过向攻击者返回大量诱饵信息来发起虚假信息攻击。这可以防止滥用用户的真实数据。在本地文件设置中进行的实验证明,这种方法可以在云环境中提供前所未有的用户数据安全级别。
{"title":"Mitigating insider data theft attacks in the cloud","authors":"R. Kowsik, L. Vignesh","doi":"10.1109/ICONSTEM.2016.7560956","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560956","url":null,"abstract":"Cloud computing promises to significantly change the way we use computers and access and store our personal and busi-ness information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. We propose a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user's real data. Experiments conducted in a local file setting provide evidence that this approach may provide unprecedented levels of user data security in a Cloud environment.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125021996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
27 Level/IGBT asymmetrical multilevel inverter using PWM for locomotives 机车用PWM的27电平/IGBT非对称多电平逆变器
J. Vinodhini, R. Babu
This paper presents a new twenty seven level cascaded H-bridge multi level inverter for locomotives. This proposed multi level inverter can overcome the need for a large number of electronic switches when the number of level increased. This proposed topology increases the efficiency of the inverter by reducing the switching losses using pulse width modulation technique. Recently in Japan they developed an advanced inverter drive system for bullet trains. By comparing all multilevel inverter topologies this proposed topology can achieve economic voltage control in locomotives which can reduce the total harmonic distortion in both electronic devices and traction motor in general. The proposed multilevel inverter and total harmonic distortion results with MATLAB software was described in this paper.
介绍了一种新型机车用27电平级联h桥多电平逆变器。本文提出的多电平逆变器可以克服电平增加时需要大量电子开关的问题。该拓扑结构利用脉宽调制技术降低了开关损耗,提高了逆变器的效率。最近在日本,他们为子弹头列车开发了一种先进的逆变驱动系统。通过对所有多电平逆变器拓扑结构的比较,本文提出的拓扑结构能够实现机车的经济电压控制,从而降低机车电子设备和牵引电机的总谐波畸变。本文描述了用MATLAB软件实现的多电平逆变器和总谐波畸变结果。
{"title":"27 Level/IGBT asymmetrical multilevel inverter using PWM for locomotives","authors":"J. Vinodhini, R. Babu","doi":"10.1109/ICONSTEM.2016.7560871","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560871","url":null,"abstract":"This paper presents a new twenty seven level cascaded H-bridge multi level inverter for locomotives. This proposed multi level inverter can overcome the need for a large number of electronic switches when the number of level increased. This proposed topology increases the efficiency of the inverter by reducing the switching losses using pulse width modulation technique. Recently in Japan they developed an advanced inverter drive system for bullet trains. By comparing all multilevel inverter topologies this proposed topology can achieve economic voltage control in locomotives which can reduce the total harmonic distortion in both electronic devices and traction motor in general. The proposed multilevel inverter and total harmonic distortion results with MATLAB software was described in this paper.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133583699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1