首页 > 最新文献

2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)最新文献

英文 中文
Experimental investigation and analysis on solar cell efficiency with thermoelectric cooler 热电冷却器对太阳能电池效率的实验研究与分析
N. P. Kumar, J. Shree, K. Vanithamani
Monocrystalline solar cells are the oldest, most efficient and dependable ways to produce electricity from the Sun, and these cells are temperature sensitive. This paper studies the relatively new method of cooling Monocrystalline solar cell with the arrangement of Thermoelectric cooler (TEC) at the back of the solar cell. The objective of thermoelectric cooler and cold plate arrangement is to maintain the operating temperature of solar cell. The experimental results are quite significant and efficiency enhancement is observed. The steady state thermal analysis of the model is done in ANSYS Fluent 6.3.26
单晶太阳能电池是最古老、最有效、最可靠的太阳能发电方式,而且这些电池对温度敏感。本文研究了在太阳能电池背面布置热电冷却器(TEC)冷却单晶太阳能电池的一种较新的方法。热电冷却器和冷板布置的目的是维持太阳能电池的工作温度。实验结果非常显著,并观察到效率的提高。在ANSYS Fluent 6.3.26中对模型进行稳态热分析
{"title":"Experimental investigation and analysis on solar cell efficiency with thermoelectric cooler","authors":"N. P. Kumar, J. Shree, K. Vanithamani","doi":"10.1109/EESCO.2015.7254045","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7254045","url":null,"abstract":"Monocrystalline solar cells are the oldest, most efficient and dependable ways to produce electricity from the Sun, and these cells are temperature sensitive. This paper studies the relatively new method of cooling Monocrystalline solar cell with the arrangement of Thermoelectric cooler (TEC) at the back of the solar cell. The objective of thermoelectric cooler and cold plate arrangement is to maintain the operating temperature of solar cell. The experimental results are quite significant and efficiency enhancement is observed. The steady state thermal analysis of the model is done in ANSYS Fluent 6.3.26","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123493756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design, simulation and implementation of two phase interleaved bi-directional DC-DC converter 两相交错双向DC-DC变换器的设计、仿真与实现
M. Shah, J. Sutaria, Chirag Chauhan
The bi-directional DC-DC converter has many applications, such as in hybrid vehicles, solar inverters, in power supplies for microprocessors etc. A bi-directional dc-dc converter can be alternately operated as a step down converter in one direction of energy flow and as step up converter in reverse direction of energy flow, which is from source to load and load to source. A high power supply using a single converter is not preferred as it leads to high ripple in output voltage and current, thus requiring large value of inductor and filter capacitor. To overcome these limitations multiphase interleaving technique is used in bi-directional DC-DC converters i.e. connecting the converters in parallel with the switching instants equally distributed among them. This paper presents the simulation and implementation of two phase bi-directional dc-dc converter.
双向DC-DC变换器在混合动力汽车、太阳能逆变器、微处理器电源等方面有着广泛的应用。双向dc-dc变换器可以在能量流的一个方向上交替工作为降压变换器,在能量流的反方向上交替工作为升压变换器,即从源到负载和负载到源。使用单个变换器的高电源不可取,因为它会导致输出电压和电流的高纹波,从而需要大值的电感和滤波电容。为了克服这些限制,在双向DC-DC变换器中使用多相交错技术,即将变换器并联并均匀分布在它们之间的开关瞬间。本文介绍了两相双向dc-dc变换器的仿真与实现。
{"title":"Design, simulation and implementation of two phase interleaved bi-directional DC-DC converter","authors":"M. Shah, J. Sutaria, Chirag Chauhan","doi":"10.1109/EESCO.2015.7254027","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7254027","url":null,"abstract":"The bi-directional DC-DC converter has many applications, such as in hybrid vehicles, solar inverters, in power supplies for microprocessors etc. A bi-directional dc-dc converter can be alternately operated as a step down converter in one direction of energy flow and as step up converter in reverse direction of energy flow, which is from source to load and load to source. A high power supply using a single converter is not preferred as it leads to high ripple in output voltage and current, thus requiring large value of inductor and filter capacitor. To overcome these limitations multiphase interleaving technique is used in bi-directional DC-DC converters i.e. connecting the converters in parallel with the switching instants equally distributed among them. This paper presents the simulation and implementation of two phase bi-directional dc-dc converter.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134288394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Sliding Window Tone Reservation using smart gradient projection method for PAPR reduction of FBMC signals 基于智能梯度投影的FBMC信号PAPR降频滑动窗保留
V. S. Kumar, S. Anuradha
The Filter Bank Multicarrier (FBMC) modulation scheme has recently seen renewed interest and is being considered as a viable alternative to orthogonal frequency division multiplexing (OFDM). FBMC however suffers from the same high peak-to-average power ratio (PAPR) drawback as OFDM systems. Conventional OFDM PAPR reduction techniques cannot be directly applied to FBMC due to the overlapping nature of FBMC symbols. A novel technique is proposed to limit the peak factor of a multicarrier signal based on Sliding Window Tone Reservation. The peak-reducing signal is forced to have the constraints of SW-TR, so that when added to the original signal, the peak factor is reduced without increasing the BER and the out-of-band radiation. The proposed method has low computational complexity requirements and is fastconverging. Simulation results show that, the proposed technique outperforms a conventional FBMC SW-TR method by 1.6 dB in PAPR reduction at a clip probability of 10−3 on the 2nd iteration.
滤波器组多载波(FBMC)调制方案最近重新引起了人们的兴趣,并被认为是正交频分复用(OFDM)的可行替代方案。然而,FBMC具有与OFDM系统相同的高峰值平均功率比(PAPR)缺点。由于FBMC符号的重叠特性,传统的OFDM PAPR降低技术不能直接应用于FBMC。提出了一种基于滑动窗音调保留的多载波信号峰值因子限制方法。将降峰信号强制具有SW-TR的约束,使其加入原始信号时,在不增加BER和带外辐射的情况下,降低了峰值因子。该方法计算复杂度低,收敛速度快。仿真结果表明,在第二次迭代时,该方法比传统的FBMC SW-TR方法减少了1.6 dB的PAPR,夹波概率为10−3。
{"title":"Sliding Window Tone Reservation using smart gradient projection method for PAPR reduction of FBMC signals","authors":"V. S. Kumar, S. Anuradha","doi":"10.1109/EESCO.2015.7253695","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253695","url":null,"abstract":"The Filter Bank Multicarrier (FBMC) modulation scheme has recently seen renewed interest and is being considered as a viable alternative to orthogonal frequency division multiplexing (OFDM). FBMC however suffers from the same high peak-to-average power ratio (PAPR) drawback as OFDM systems. Conventional OFDM PAPR reduction techniques cannot be directly applied to FBMC due to the overlapping nature of FBMC symbols. A novel technique is proposed to limit the peak factor of a multicarrier signal based on Sliding Window Tone Reservation. The peak-reducing signal is forced to have the constraints of SW-TR, so that when added to the original signal, the peak factor is reduced without increasing the BER and the out-of-band radiation. The proposed method has low computational complexity requirements and is fastconverging. Simulation results show that, the proposed technique outperforms a conventional FBMC SW-TR method by 1.6 dB in PAPR reduction at a clip probability of 10−3 on the 2nd iteration.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121858852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Precoded space time block code for spatial modulation 用于空间调制的预编码空时块码
Sonali Lagnajita, Srinivas Ramavath
Spatial modulation (SM), which uses the spatial dimension to transmit information and removes ICI completely between transmit antennas, is a promising transmission schemes that has been proposed for multi input multi output systems. In this paper a novel scheme called “precoded STBC for Spatial modulation” is proposed, which accumulates the benefits of both the schemes by eradicating its drawbacks. In this proposed scheme DFT codebook based precoding technique is used which intensively decrease the pair wise error probability of STBC code with improving system performance. Hence the combination of precoding STBC with SM employs the transmission of data on antenna indices with high spectral efficiency and with low probability of error by exploiting CSI at transmitter side. The simulation result justifies our theoretical analysis and demonstrates the performance advantages of the proposed precoded STBC-SM over STBC, Precoded STBC and STBC-SM.
空间调制(SM)利用空间维度来传输信息,完全消除发射天线之间的ICI,是多输入多输出系统中提出的一种很有前途的传输方案。本文提出了一种新的“空间调制预编码STBC”方案,该方案消除了两种方案的缺点,综合了两种方案的优点。该方案采用基于DFT码本的预编码技术,大大降低了STBC码的对错概率,提高了系统性能。因此,预编码STBC与SM相结合,利用发射端的CSI,以高频谱效率和低误差概率在天线指标上传输数据。仿真结果验证了我们的理论分析,并证明了所提出的预编码STBC- sm相对于STBC、预编码STBC和STBC- sm的性能优势。
{"title":"Precoded space time block code for spatial modulation","authors":"Sonali Lagnajita, Srinivas Ramavath","doi":"10.1109/EESCO.2015.7253971","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253971","url":null,"abstract":"Spatial modulation (SM), which uses the spatial dimension to transmit information and removes ICI completely between transmit antennas, is a promising transmission schemes that has been proposed for multi input multi output systems. In this paper a novel scheme called “precoded STBC for Spatial modulation” is proposed, which accumulates the benefits of both the schemes by eradicating its drawbacks. In this proposed scheme DFT codebook based precoding technique is used which intensively decrease the pair wise error probability of STBC code with improving system performance. Hence the combination of precoding STBC with SM employs the transmission of data on antenna indices with high spectral efficiency and with low probability of error by exploiting CSI at transmitter side. The simulation result justifies our theoretical analysis and demonstrates the performance advantages of the proposed precoded STBC-SM over STBC, Precoded STBC and STBC-SM.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131199292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neuro-Genetic and CCM based biometrical authentication through side-view of human-face 基于神经遗传学和CCM的人脸侧视生物识别认证
R. Raja, T. S. Sinha, R. P. Dubey
This paper presents the biometrical authentication process of any subject from side-view of human-face. Relevant geometric features of the human-face have been extracted using genetic-algorithm and connected component method from side-view of the human-face image. The present paper incorporates the frontal face images only for the formation of corpus. But for the biometrical authentication, side-view of the face has been analysed and connected component of face are calculated using neuro-genetic approach. Neuro-genetic means the combination of artificial neural network and genetic algorithm. The work has been carried out in two phases. In the first phase, formation of the FACE_MODEL as a corpus and calculation of connected component using frontal face images of the different subjects have been done. In the second phase, the model or the corpus has been used at the back-end for biometrical authentication using a proposed algorithm called NGBABA (Neuro-Genetic based Approach for Biometrical Authentication) and number of connected component of face is calculated using NGBBFSA (Neuro-Genetic Based Breadth First Search Algorithms). The authentication process has been carried out with the help of an unknown zero-degree (parallel to x-axis) oriented image. Hence relevant geometrical features and connected component with reducing orientation in image from ninety-degree to lower degree with 10-degree change have been matched with the corpus. The classification process of acceptance and rejection has been done after best-fit matching. The proposed algorithm has been tested with 10 subjects of varying age groups. The result has been found very satisfactory with the data sets.
本文从人脸侧面介绍了任意主体的生物特征认证过程。利用遗传算法和连通分量法从人脸侧面图像中提取人脸的相关几何特征。本文仅为形成语料库而采用正面人脸图像。而在生物识别认证中,则采用神经遗传的方法对人脸的侧视图进行分析,并计算人脸的连接分量。神经遗传是指人工神经网络与遗传算法的结合。这项工作分两个阶段进行。第一阶段,利用不同被试的正面人脸图像,构建FACE_MODEL作为语料库,并计算连接分量;在第二阶段,该模型或语料库在后端使用一种称为NGBABA(基于神经遗传的生物特征认证方法)的算法进行生物特征认证,并使用NGBBFSA(基于神经遗传的广度优先搜索算法)计算面部连接组件的数量。认证过程是在一个未知的零度(平行于x轴)定向图像的帮助下进行的。从而将图像中相关的几何特征和方向从90度降至更低的10度变化的连通分量与语料库进行匹配。在最佳拟合匹配后,进行了接受和拒绝的分类处理。该算法已在10个不同年龄组的受试者中进行了测试。结果与数据集非常吻合。
{"title":"Neuro-Genetic and CCM based biometrical authentication through side-view of human-face","authors":"R. Raja, T. S. Sinha, R. P. Dubey","doi":"10.1109/EESCO.2015.7253642","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253642","url":null,"abstract":"This paper presents the biometrical authentication process of any subject from side-view of human-face. Relevant geometric features of the human-face have been extracted using genetic-algorithm and connected component method from side-view of the human-face image. The present paper incorporates the frontal face images only for the formation of corpus. But for the biometrical authentication, side-view of the face has been analysed and connected component of face are calculated using neuro-genetic approach. Neuro-genetic means the combination of artificial neural network and genetic algorithm. The work has been carried out in two phases. In the first phase, formation of the FACE_MODEL as a corpus and calculation of connected component using frontal face images of the different subjects have been done. In the second phase, the model or the corpus has been used at the back-end for biometrical authentication using a proposed algorithm called NGBABA (Neuro-Genetic based Approach for Biometrical Authentication) and number of connected component of face is calculated using NGBBFSA (Neuro-Genetic Based Breadth First Search Algorithms). The authentication process has been carried out with the help of an unknown zero-degree (parallel to x-axis) oriented image. Hence relevant geometrical features and connected component with reducing orientation in image from ninety-degree to lower degree with 10-degree change have been matched with the corpus. The classification process of acceptance and rejection has been done after best-fit matching. The proposed algorithm has been tested with 10 subjects of varying age groups. The result has been found very satisfactory with the data sets.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114787997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A computer vision based framework for visual gun detection using SURF 基于计算机视觉的SURF视觉炮检测框架
R. Tiwari, G. Verma
Today's automatic visual surveillance is prime need for security and this paper presents first step in the direction of automatic visual gun detection. The objective of our paper is to develop a framework for visual gun detection for automatic surveillance. The proposed framework exploits the color based segmentation to eliminate unrelated object from an image using K-mean clustering algorithm. Speeded up robust features (SURF) interest point detector is used to locate the object (gun) in the segmented images. Our framework is robust enough in terms of scale, rotation, affine and occlusion. We have implemented and tested the system over sample images of gun, collected by us. We got promising performance of our system to detect a gun. Further, our system performs very well under different appearance of images. Thus our system is rotation, scale and shape invariant.
自动视觉监控是当今安防的首要需求,本文提出了自动视觉枪支检测方向的第一步。本文的目的是开发一个用于自动监视的视觉枪支检测框架。该框架利用k均值聚类算法,利用基于颜色的分割去除图像中不相关的目标。利用快速鲁棒特征(SURF)兴趣点检测器对分割图像中的目标(枪)进行定位。我们的框架在尺度、旋转、仿射和遮挡方面足够健壮。我们已经在我们收集的枪支样本图像上实现并测试了该系统。我们的系统在探测枪支方面有很好的表现。此外,我们的系统在不同的图像外观下表现良好。因此我们的系统是旋转、尺度和形状不变的。
{"title":"A computer vision based framework for visual gun detection using SURF","authors":"R. Tiwari, G. Verma","doi":"10.1109/EESCO.2015.7253863","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253863","url":null,"abstract":"Today's automatic visual surveillance is prime need for security and this paper presents first step in the direction of automatic visual gun detection. The objective of our paper is to develop a framework for visual gun detection for automatic surveillance. The proposed framework exploits the color based segmentation to eliminate unrelated object from an image using K-mean clustering algorithm. Speeded up robust features (SURF) interest point detector is used to locate the object (gun) in the segmented images. Our framework is robust enough in terms of scale, rotation, affine and occlusion. We have implemented and tested the system over sample images of gun, collected by us. We got promising performance of our system to detect a gun. Further, our system performs very well under different appearance of images. Thus our system is rotation, scale and shape invariant.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128130671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Simulation and comparison between hybrid active power filter and shunt active power filter 混合型有源滤波器与并联型有源滤波器的仿真与比较
D. Dobariya, P. Upadhyay
The shunt active power filters (SAPFs) and hybrid active power filter (HAPF) is used for practical solution to solve the electric power quality, (EPQ) issues. The emerging power-electronic devices and the new developments in digital signal processing (DSP), have made possible its practical use. The active power filters can compensate the nonlinear load current of electrical systems: harmonics, reactive power, imbalances, etc. In this paper simulation and comparison between shunt active power filter and hybrid combination of shunt active power filter and shunt passive power filter is presented. FFT (Fast Fourier Transform) analysis and waveforms are presented for both filters. The superior performance of hybrid active power filter is also presented.
并联有源滤波器(sapf)和混合有源滤波器(HAPF)是解决电能质量(EPQ)问题的实用方案。新兴的电力电子器件和数字信号处理(DSP)的新发展,使其实际应用成为可能。有源滤波器可以补偿电力系统的非线性负载电流:谐波、无功、不平衡等。本文对并联型有源电力滤波器和并联型有源电力滤波器与并联型无源电力滤波器的混合组合进行了仿真和比较。给出了两种滤波器的快速傅立叶变换分析和波形。文中还介绍了混合有源电力滤波器的优越性能。
{"title":"Simulation and comparison between hybrid active power filter and shunt active power filter","authors":"D. Dobariya, P. Upadhyay","doi":"10.1109/EESCO.2015.7253908","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253908","url":null,"abstract":"The shunt active power filters (SAPFs) and hybrid active power filter (HAPF) is used for practical solution to solve the electric power quality, (EPQ) issues. The emerging power-electronic devices and the new developments in digital signal processing (DSP), have made possible its practical use. The active power filters can compensate the nonlinear load current of electrical systems: harmonics, reactive power, imbalances, etc. In this paper simulation and comparison between shunt active power filter and hybrid combination of shunt active power filter and shunt passive power filter is presented. FFT (Fast Fourier Transform) analysis and waveforms are presented for both filters. The superior performance of hybrid active power filter is also presented.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126234037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Two factor authentication using Visual Cryptography and Digital Envelope in Kerberos Kerberos中基于视觉密码和数字信封的双因素身份验证
Naman S. Khandelwal, Pariza Kamboj
Impersonation is the obvious security risk in an undefended distributed network. An adversary pretends to be a client and can have illicit access to the server. To counter this threat, user authentication is used which is treated as the first line of defense in a networked environment. The most popular and widely used authentication protocol is Kerberos. Kerberos is the de facto standard, used to authenticate users mutually by the use of trusted third party. But this strong protocol is vulnerable to various security attacks. This paper gives an overview of Kerberos protocol and its existing security problems. To enhance security and combat security attacks, it also describes a novel approach of incorporating the features of Visual Cryptography and Digital Envelope into Kerberos. Using Visual cryptography, we have added one more layer of security by considering a secret share as one of the factor of providing mutual authentication. While the session key is securely distributed by using the concept of Digital envelope in which user's private key is considered as another factor of authentication. Thus, our proposed scheme makes the Kerberos protocol highly robust, secure and efficient.
在不设防的分布式网络中,冒充是明显的安全风险。攻击者伪装成客户端,可以非法访问服务器。为了应对这种威胁,使用了用户身份验证,这被视为网络环境中的第一道防线。最流行和广泛使用的身份验证协议是Kerberos。Kerberos是事实上的标准,用于通过受信任的第三方相互验证用户。但是这种强大的协议容易受到各种安全攻击。本文概述了Kerberos协议及其存在的安全问题。为了增强安全性和对抗安全攻击,它还描述了一种将可视化加密和数字信封的特性合并到Kerberos中的新方法。通过使用可视化加密,我们将秘密共享视为提供相互身份验证的因素之一,从而增加了一层安全性。采用数字信封的概念,将用户的私钥作为另一个身份验证因素,实现会话密钥的安全分发。因此,我们提出的方案使Kerberos协议具有高度的鲁棒性、安全性和高效性。
{"title":"Two factor authentication using Visual Cryptography and Digital Envelope in Kerberos","authors":"Naman S. Khandelwal, Pariza Kamboj","doi":"10.1109/EESCO.2015.7253638","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253638","url":null,"abstract":"Impersonation is the obvious security risk in an undefended distributed network. An adversary pretends to be a client and can have illicit access to the server. To counter this threat, user authentication is used which is treated as the first line of defense in a networked environment. The most popular and widely used authentication protocol is Kerberos. Kerberos is the de facto standard, used to authenticate users mutually by the use of trusted third party. But this strong protocol is vulnerable to various security attacks. This paper gives an overview of Kerberos protocol and its existing security problems. To enhance security and combat security attacks, it also describes a novel approach of incorporating the features of Visual Cryptography and Digital Envelope into Kerberos. Using Visual cryptography, we have added one more layer of security by considering a secret share as one of the factor of providing mutual authentication. While the session key is securely distributed by using the concept of Digital envelope in which user's private key is considered as another factor of authentication. Thus, our proposed scheme makes the Kerberos protocol highly robust, secure and efficient.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122278271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Contemporary trends in privacy preserving collaborative data mining- A survey 保护隐私的协作数据挖掘的当代趋势——调查
A. Shah, R. Gulati
Growing concerns amongst the competitors for maintaining the privacy of their customer's information has increased in recent years. Multiple parties desire to collaborate to conduct data mining without breaching privacy of each contributing party. Organizations, both public and private, publish sensitive micro data for research and/or trend analysis. The main confront for developing a secured framework is a consideration for privacy as well as efficiency and complications amongst the collaborating parties for generating standardization. The paper surveys various techniques applied for Privacy Preserving Collaborative Data Mining and summarizes the demerits of the same.
近年来,竞争对手越来越关注维护客户信息隐私的问题。多方希望在不侵犯每一方隐私的情况下合作进行数据挖掘。公共和私人组织都会发布敏感的微观数据,用于研究和/或趋势分析。开发安全框架的主要问题是要考虑隐私、效率和协作各方之间的复杂性,以生成标准化。本文综述了用于保护隐私的协作数据挖掘的各种技术,并总结了它们的缺点。
{"title":"Contemporary trends in privacy preserving collaborative data mining- A survey","authors":"A. Shah, R. Gulati","doi":"10.1109/EESCO.2015.7254044","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7254044","url":null,"abstract":"Growing concerns amongst the competitors for maintaining the privacy of their customer's information has increased in recent years. Multiple parties desire to collaborate to conduct data mining without breaching privacy of each contributing party. Organizations, both public and private, publish sensitive micro data for research and/or trend analysis. The main confront for developing a secured framework is a consideration for privacy as well as efficiency and complications amongst the collaborating parties for generating standardization. The paper surveys various techniques applied for Privacy Preserving Collaborative Data Mining and summarizes the demerits of the same.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115619160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Epileptic seizure detection using HHT and SVM 基于HHT和SVM的癫痫发作检测
R. Chaurasiya, K. Jain, Shalini Goutam, Manisha
The reliability and efficiency of classification strategies required to segregate between the categories of healthy patients and those suffering from epilepsy is of paramount importance. The erratic occurrence of epileptic seizures has stimulated the automatic seizure detection in EEG recordings. In this work, classification of EEG signals has been carried out using Hilbert Huang Transform (HHT) and Support Vector Machine (SVM). In this approach, the HHT based Time Frequency Representation (TFR) has been considered as Time Frequency Image (TFI). The time frequency image is segmented in accordance with the frequency bands of the rhythms. Also respective histograms of gray scale sub images are represented. Extraction of statistical features such as mean, variance, skewness and kurtosis of pixel intensity in the histogram is implemented. SVM with radial basis function (RBF) kernel has been employed for classification of seizure and non -seizure EEG signals.
区分健康患者和癫痫患者类别所需的分类策略的可靠性和效率至关重要。癫痫发作的不稳定发生刺激了脑电图记录中癫痫发作的自动检测。在这项工作中,使用希尔伯特黄变换(HHT)和支持向量机(SVM)对脑电信号进行分类。在这种方法中,基于HHT的时频表示(TFR)被认为是时频图像(TFI)。根据节奏的频带对时频图像进行分割。并给出了各灰度子图像的直方图。实现了直方图中像素强度的均值、方差、偏度和峰度等统计特征的提取。采用径向基函数核支持向量机(SVM)对癫痫发作和非癫痫发作脑电信号进行分类。
{"title":"Epileptic seizure detection using HHT and SVM","authors":"R. Chaurasiya, K. Jain, Shalini Goutam, Manisha","doi":"10.1109/EESCO.2015.7253660","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253660","url":null,"abstract":"The reliability and efficiency of classification strategies required to segregate between the categories of healthy patients and those suffering from epilepsy is of paramount importance. The erratic occurrence of epileptic seizures has stimulated the automatic seizure detection in EEG recordings. In this work, classification of EEG signals has been carried out using Hilbert Huang Transform (HHT) and Support Vector Machine (SVM). In this approach, the HHT based Time Frequency Representation (TFR) has been considered as Time Frequency Image (TFI). The time frequency image is segmented in accordance with the frequency bands of the rhythms. Also respective histograms of gray scale sub images are represented. Extraction of statistical features such as mean, variance, skewness and kurtosis of pixel intensity in the histogram is implemented. SVM with radial basis function (RBF) kernel has been employed for classification of seizure and non -seizure EEG signals.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"59 3-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120917724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1