首页 > 最新文献

2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)最新文献

英文 中文
Eight Bit Full Adder Design Using Fifteen Transistors With Novel Five Transistors XNOR Gate 采用15个晶体管的8位全加法器设计,采用新颖的5个晶体管XNOR门
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9080002
P. Sritha, P. Geethamani
Here, a new hybrid 8-bit full adder configuration utilizing both correlative metal-oxide-semiconductor (CMOS) reason and transmission gate judgment is described. The plan was first executed for 1 bit and after that stretched out for 32 bit likewise yet in this paper, the structure was actualized for 8-bit. The circuit was executed utilizing Cadence Virtuoso tools in 45-nm technology at 1.2-V and 1.8-V. Execution parameters for example power, delay, and transistor count up of the full adder contrasted and the officially existing paper. For 1.2-V supply at 45-nm technology, the normal power utilization 31.523nW was observed to be amazingly low with low defer 9.995ns resultant as of the predetermined inclusion of very frail CMOS inverters combined with well-built transmission gates designed for 1-bit. The plan was additionally stretched out for actualizing 8-bit full adder at 1.2-V (1.8-V) along with experimental towards only 241.0nW (556.1nW) power and −1.747ps (9.217ps) delay at 45-nm technology. Proposed full adder has been contrasted and the previously detailed circuits and the power utilization indicate better outcomes by enhancing XNOR gate.
本文介绍了一种利用相关金属氧化物半导体(CMOS)推理和传输门判断的新型混合8位全加法器结构。该计划最初执行为1位,之后扩展为32位,但在本文中,该结构被实现为8位。该电路使用Cadence Virtuoso工具在1.2 v和1.8 v的45纳米技术下执行。执行参数如功率、延时、晶体管计数等与正式存在的加法器进行了对比。对于45纳米技术的1.2 v电源,正常功率利用率31.523nW被观察到惊人的低,低延迟9.995ns,这是由于预定包含非常脆弱的CMOS逆变器和精心设计的1位传输门。此外,该计划还扩展了在1.2 v (1.8 v)下实现8位全加法器,并在45纳米技术下实现241.0nW (556.1nW)功率和- 1.747ps (9.217ps)延迟的实验。对所提出的全加法器进行了对比,结果表明通过增强XNOR门可以获得更好的结果。
{"title":"Eight Bit Full Adder Design Using Fifteen Transistors With Novel Five Transistors XNOR Gate","authors":"P. Sritha, P. Geethamani","doi":"10.1109/ICACCE46606.2019.9080002","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9080002","url":null,"abstract":"Here, a new hybrid 8-bit full adder configuration utilizing both correlative metal-oxide-semiconductor (CMOS) reason and transmission gate judgment is described. The plan was first executed for 1 bit and after that stretched out for 32 bit likewise yet in this paper, the structure was actualized for 8-bit. The circuit was executed utilizing Cadence Virtuoso tools in 45-nm technology at 1.2-V and 1.8-V. Execution parameters for example power, delay, and transistor count up of the full adder contrasted and the officially existing paper. For 1.2-V supply at 45-nm technology, the normal power utilization 31.523nW was observed to be amazingly low with low defer 9.995ns resultant as of the predetermined inclusion of very frail CMOS inverters combined with well-built transmission gates designed for 1-bit. The plan was additionally stretched out for actualizing 8-bit full adder at 1.2-V (1.8-V) along with experimental towards only 241.0nW (556.1nW) power and −1.747ps (9.217ps) delay at 45-nm technology. Proposed full adder has been contrasted and the previously detailed circuits and the power utilization indicate better outcomes by enhancing XNOR gate.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126303963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber security threats in industrial control systems and protection 工业控制系统中的网络安全威胁及防护
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079981
Mounesh Marali, S. Sudarsan, Ashok Gogioneni
Industrial automation and control systems are increasingly based on open communication protocols and platforms that are also commonly used in corporate IT environments and interconnected to enable integration with business applications, they become increasingly exposed to the internet. As seen in the past with WannaCry and NotPetya, it's more likely common malware will cause the most damage in the long run. These threats are expected to increase simply since the fundamental gaps in protecting the operational technology (OT) over information technology (IT) widening. As OT becomes increasingly exposed to internet, it tends to become weak spot to cyber threats as any other connected systems. This is basically because of OT components aligned on the same hardware, software, communication protocols including operating systems that run IT components, such as networks, client, server machines & other connected devices. At the same time, reusable development and deployment of interconnected systems and their communication networks become vulnerable to cyber-attacks. This paper explores cyber security issues in industrial control systems that are built on open communication platforms and networks. Specially emphasized on attacker's objectives, electronics methods and possible countermeasures for IT systems. The paper also describes various OT security-relevant characteristics distinct from the office IT systems and relevant implementation approaches at multiple system layers to protect from cyber-attacks. Finally, paper illustrates few application level security concepts with case studies focusing configuration and operation of industrial process control system.
工业自动化和控制系统越来越多地基于开放的通信协议和平台,这些协议和平台也经常用于企业IT环境,并相互连接以实现与业务应用程序的集成,它们越来越多地暴露于互联网。就像过去的WannaCry和NotPetya一样,从长远来看,普通恶意软件更有可能造成最大的破坏。由于在保护操作技术(OT)和信息技术(IT)方面的根本差距扩大,预计这些威胁将会增加。随着OT越来越多地暴露于互联网,它往往会像任何其他连接系统一样成为网络威胁的弱点。这主要是因为OT组件在相同的硬件、软件、通信协议上对齐,包括运行IT组件的操作系统,如网络、客户端、服务器机器和其他连接设备。与此同时,互联系统及其通信网络的可重用开发和部署变得容易受到网络攻击。本文探讨了建立在开放通信平台和网络上的工业控制系统的网络安全问题。特别强调攻击者的目标,电子方法和IT系统可能的对策。本文还描述了不同于办公室IT系统的各种OT安全相关特征,以及在多个系统层上防止网络攻击的相关实现方法。最后,以工业过程控制系统的配置和运行为重点,用实例阐述了几个应用层的安全概念。
{"title":"Cyber security threats in industrial control systems and protection","authors":"Mounesh Marali, S. Sudarsan, Ashok Gogioneni","doi":"10.1109/ICACCE46606.2019.9079981","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079981","url":null,"abstract":"Industrial automation and control systems are increasingly based on open communication protocols and platforms that are also commonly used in corporate IT environments and interconnected to enable integration with business applications, they become increasingly exposed to the internet. As seen in the past with WannaCry and NotPetya, it's more likely common malware will cause the most damage in the long run. These threats are expected to increase simply since the fundamental gaps in protecting the operational technology (OT) over information technology (IT) widening. As OT becomes increasingly exposed to internet, it tends to become weak spot to cyber threats as any other connected systems. This is basically because of OT components aligned on the same hardware, software, communication protocols including operating systems that run IT components, such as networks, client, server machines & other connected devices. At the same time, reusable development and deployment of interconnected systems and their communication networks become vulnerable to cyber-attacks. This paper explores cyber security issues in industrial control systems that are built on open communication platforms and networks. Specially emphasized on attacker's objectives, electronics methods and possible countermeasures for IT systems. The paper also describes various OT security-relevant characteristics distinct from the office IT systems and relevant implementation approaches at multiple system layers to protect from cyber-attacks. Finally, paper illustrates few application level security concepts with case studies focusing configuration and operation of industrial process control system.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115812046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Estimation of maximum range for underwater optical communication using PIN and avalanche photodetectors 利用PIN和雪崩光电探测器估算水下光通信的最大距离
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079984
M. Das, P. Arjun, A. Bhaskaran, P. S. Aravind, T. Aswin, Viswas Sadasivan
This paper presents an estimate of underwater optical communication (UWOC) range, using PIN and avalanche photodetectors (APDs). In this simulation-based study, the maximum range while transmitting high-quality video at 6Mbps speed is estimated as 520m in Pure Sea water, 65m in Clear Ocean and 44m in Coastal waters, when using a 100mW laser and APD. The channel here is modeled to include the effect of attenuation and noise. This work quantifies the benefits of using an adaptive system where the wavelength (blue, blue-green and green) of transmission and modulation scheme is changed based on water transmission. Wavelength adaptation according to varying water transmission was found to provide 16 to 40dB advantage in SNR, compared to a system with fixed wavelength, in different waters. A recommendation for wavelength adaptable transmitter design is made based on this. This study assumes the current state of the art in commercially available components.
本文利用PIN码和雪崩光电探测器(apd)对水下光通信(UWOC)距离进行了估计。在这项基于仿真的研究中,使用100mW激光和APD,在Pure Sea water中,以6Mbps的速度传输高质量视频的最大距离估计为520米,Clear Ocean中为65米,Coastal water中为44米。这里的通道建模包括衰减和噪声的影响。这项工作量化了使用自适应系统的好处,其中传输和调制方案的波长(蓝色,蓝绿和绿色)根据水传输而改变。研究发现,与固定波长系统相比,在不同的水域,根据不同的水透射率进行波长自适应,可以提供16到40dB的信噪比优势。在此基础上提出了波长自适应发射机的设计建议。本研究假设了目前商用组件的最新状态。
{"title":"Estimation of maximum range for underwater optical communication using PIN and avalanche photodetectors","authors":"M. Das, P. Arjun, A. Bhaskaran, P. S. Aravind, T. Aswin, Viswas Sadasivan","doi":"10.1109/ICACCE46606.2019.9079984","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079984","url":null,"abstract":"This paper presents an estimate of underwater optical communication (UWOC) range, using PIN and avalanche photodetectors (APDs). In this simulation-based study, the maximum range while transmitting high-quality video at 6Mbps speed is estimated as 520m in Pure Sea water, 65m in Clear Ocean and 44m in Coastal waters, when using a 100mW laser and APD. The channel here is modeled to include the effect of attenuation and noise. This work quantifies the benefits of using an adaptive system where the wavelength (blue, blue-green and green) of transmission and modulation scheme is changed based on water transmission. Wavelength adaptation according to varying water transmission was found to provide 16 to 40dB advantage in SNR, compared to a system with fixed wavelength, in different waters. A recommendation for wavelength adaptable transmitter design is made based on this. This study assumes the current state of the art in commercially available components.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114662616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Symbol Error Rate Performance of Hybrid DF/AF Relaying Protocol Using Particle Swarm Optimization Based Power Allocation 基于粒子群算法的混合DF/AF中继协议误码率性能研究
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079970
K. Ali, P. Sampath, C. Poongodi
Cooperative communications technique receive a lot of interest, to combat frequency selectivity fading of wireless channels. Cooperative protocols are used to increase the total capacity, Signal to Noise Ratio (SNR) and reduced the Symbol Error Rate (SER) in wireless communication systems. The performance of Particle Swarm Optimization (PSO) based Power Allocation (PA) for Proposed Hybrid Decode and Forward (DF)/Amplify and Forward (AF) Relaying Protocol using Maximal Ratio Combining (MRC) technique with Mary-Phase Shift Keying (M-PSK) Modulation over Rayleigh fading and Rician fading is presented in this paper. The results are compared with exiting AF and DF relaying protocols. Hybrid DF/AF Relaying Protocol achieves reduced SER compared to the existing AF and DF relaying protocol.
为了对抗无线信道的频率选择性衰落,合作通信技术受到了广泛的关注。在无线通信系统中,协作协议用于提高总容量、提高信噪比和降低码元误码率。本文研究了基于粒子群优化(PSO)的功率分配算法在瑞利衰落和瑞利衰落条件下采用最大比组合(MRC)技术和多相移键控(M-PSK)调制的混合解码和前向(DF)/放大和前向(AF)中继协议中的性能。结果与现有的AF和DF中继协议进行了比较。与现有的AF和DF中继协议相比,混合DF/AF中继协议实现了更低的SER。
{"title":"Symbol Error Rate Performance of Hybrid DF/AF Relaying Protocol Using Particle Swarm Optimization Based Power Allocation","authors":"K. Ali, P. Sampath, C. Poongodi","doi":"10.1109/ICACCE46606.2019.9079970","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079970","url":null,"abstract":"Cooperative communications technique receive a lot of interest, to combat frequency selectivity fading of wireless channels. Cooperative protocols are used to increase the total capacity, Signal to Noise Ratio (SNR) and reduced the Symbol Error Rate (SER) in wireless communication systems. The performance of Particle Swarm Optimization (PSO) based Power Allocation (PA) for Proposed Hybrid Decode and Forward (DF)/Amplify and Forward (AF) Relaying Protocol using Maximal Ratio Combining (MRC) technique with Mary-Phase Shift Keying (M-PSK) Modulation over Rayleigh fading and Rician fading is presented in this paper. The results are compared with exiting AF and DF relaying protocols. Hybrid DF/AF Relaying Protocol achieves reduced SER compared to the existing AF and DF relaying protocol.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121891832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing USB ports of real-time Cyber Physical Systems 保护实时网络物理系统的USB端口
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079997
P. Bhargavi, Alan Joy, T. Sukumara, U. Eranna
With the advent of VLSI, complex circuits can be implemented on a small single chip leading to the development of embedded devices that perform dedicated functions most commonly deployed as Cyber Physical System (CPS) today. Security of real-time cyber physical systems is of great concern these days as attacking a single device in a network may cause all the devices in the network to be affected and the result of attack may be severe as these devices may need to respond in real time. Most of the CPS are built with USB ports which are extensively used for connectivity. It is possible for a proximate attacker to exploit the vulnerabilities in the devices through USB ports. Since merely powering-on a system and connecting a USB device provides it with access to kernel, the security of the device is at stake. For the real time cyber physical systems providing critical functionality, even a typical reboot may be of concern depending on its functionality. Hence these devices are to be thoroughly tested against any vulnerabilities and necessary measures are taken at initial stages of development. This paper covers experiences with fuzzing implemented using both Facedancer21 and umap tool and exploiting the driver vulnerability with invalid endpoint number using Facedancer21. The drivers that are vulnerable were disabled in the target host and the experiment was repeated and the target was found to be resistant to the attacks as the drivers responsible for the system crash were not loading during the enumeration process, thus securing the USB ports.
随着VLSI的出现,复杂的电路可以在一个小的单芯片上实现,从而导致嵌入式设备的发展,这些嵌入式设备执行专用功能,最常部署为网络物理系统(CPS)。由于攻击网络中的单个设备可能会导致网络中的所有设备受到影响,并且这些设备可能需要实时响应,因此攻击的结果可能会很严重,因此实时网络物理系统的安全性受到了人们的高度关注。大多数CPS都带有USB端口,广泛用于连接。直接攻击者有可能通过USB端口利用设备中的漏洞。由于仅仅启动系统并连接USB设备就可以访问内核,因此设备的安全性受到威胁。对于提供关键功能的实时网络物理系统,根据其功能,即使是典型的重新启动也可能令人担忧。因此,这些设备必须经过彻底的测试,以防止任何漏洞,并在开发的初始阶段采取必要的措施。本文介绍了使用Facedancer21和umap工具实现模糊测试的经验,以及使用Facedancer21利用无效端点编号的驱动程序漏洞。在目标主机中禁用易受攻击的驱动程序,重复实验,发现目标在枚举过程中没有加载导致系统崩溃的驱动程序,从而保护USB端口,从而抵抗攻击。
{"title":"Securing USB ports of real-time Cyber Physical Systems","authors":"P. Bhargavi, Alan Joy, T. Sukumara, U. Eranna","doi":"10.1109/ICACCE46606.2019.9079997","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079997","url":null,"abstract":"With the advent of VLSI, complex circuits can be implemented on a small single chip leading to the development of embedded devices that perform dedicated functions most commonly deployed as Cyber Physical System (CPS) today. Security of real-time cyber physical systems is of great concern these days as attacking a single device in a network may cause all the devices in the network to be affected and the result of attack may be severe as these devices may need to respond in real time. Most of the CPS are built with USB ports which are extensively used for connectivity. It is possible for a proximate attacker to exploit the vulnerabilities in the devices through USB ports. Since merely powering-on a system and connecting a USB device provides it with access to kernel, the security of the device is at stake. For the real time cyber physical systems providing critical functionality, even a typical reboot may be of concern depending on its functionality. Hence these devices are to be thoroughly tested against any vulnerabilities and necessary measures are taken at initial stages of development. This paper covers experiences with fuzzing implemented using both Facedancer21 and umap tool and exploiting the driver vulnerability with invalid endpoint number using Facedancer21. The drivers that are vulnerable were disabled in the target host and the experiment was repeated and the target was found to be resistant to the attacks as the drivers responsible for the system crash were not loading during the enumeration process, thus securing the USB ports.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125553396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Economic Analysis of Bi-Directional Net-meters with Orientation and Positioning of Solar Module 太阳能组件定向定位双向网表的经济分析
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079961
R. Nagananthini, G. Nithya, S. Bhuvanesh
In this paper, the methodologies and worldwide impact of the net meter are discussed with the points to be considered in positioning the solar panel for maximizing the self-consumption. In addition, the net metering policies associated with its financial factors are discussed. The depletion of fossil fuels drags the world to the paramount use of available renewable energy sources for power production in small and medium scales. In this, the power production using solar energy is playing a vital role as it is safe and pollution free. The solar PV system has made a good impact in different countries and it's fast-paced in the last two decades because of the increase in demand for electric power. Apart from the utility service to generate power by Solar PV power plants in large scale, this idea has been an attraction to the peoples and results in implementing the Solar PV in their building roofs to generate their own power in small scale. The rooftop solar PV systems made the consumers to support their residential load during the power failure, consuming less power from the grid and in advance, it can feed the excess power to the grid. By delivering the power to the grid the consumer becomes prosumer and experience economic return equal to the power delivered to the grid. Bidirectional net energy meters are useful for the consumers to keep in track of the amount of power that is transmitted to the grid (Solar power generated in excess) and received by the consumer (power received from the utility center). The main outcome of this net metering from the consumer side is the reduced total tariff when they fed the excess power to the grid.-Researches are being developed in the area of minimizing the losses, and maximum consumption with low cost affordable to build Zero Energy Buildings. In some parts of the USA, the government has come forward for free installation of the rooftop solar PV system in their people's house as awareness and receiving their excess power at a considerable rate. Without this Net metering technology, the utility cannot consume power from the consumer.
在本文中,讨论了净仪表的方法和全球影响,以及在定位太阳能电池板以最大化自我消耗时应考虑的要点。此外,还讨论了与其财务因素相关的净计量政策。化石燃料的枯竭使世界主要使用现有的可再生能源进行中小型规模的电力生产。在这方面,利用太阳能发电因其安全、无污染而起着至关重要的作用。太阳能光伏系统在不同的国家产生了良好的影响,在过去的二十年里,由于对电力需求的增加,它的发展速度很快。除了通过太阳能光伏电站大规模发电的公用事业服务外,这个想法已经吸引了人们,并导致在他们的建筑屋顶上实施太阳能光伏发电,以小规模地产生自己的电力。屋顶太阳能光伏系统使用户能够在停电期间支持其住宅负荷,减少了从电网中消耗的电力,并可以提前将多余的电力馈送电网。通过向电网输送电力,消费者成为产消者,并体验到与向电网输送的电力相等的经济回报。双向净电能表对用户跟踪传输到电网的电量(太阳能发电过剩)和用户接收的电量(从公用事业中心接收的电量)很有用。从消费者方面来看,这种净计量的主要结果是,当他们将多余的电力输送到电网时,总电价降低了。-正在进行研究,以尽量减少损失,并以低成本负担得起的最大消耗来建造零能耗建筑。在美国的一些地区,政府已经提出在他们的房子里免费安装屋顶太阳能光伏系统,因为他们意识到并以相当大的速度接收他们的过剩电力。如果没有这种净计量技术,公用事业就不能从消费者那里消耗电力。
{"title":"Economic Analysis of Bi-Directional Net-meters with Orientation and Positioning of Solar Module","authors":"R. Nagananthini, G. Nithya, S. Bhuvanesh","doi":"10.1109/ICACCE46606.2019.9079961","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079961","url":null,"abstract":"In this paper, the methodologies and worldwide impact of the net meter are discussed with the points to be considered in positioning the solar panel for maximizing the self-consumption. In addition, the net metering policies associated with its financial factors are discussed. The depletion of fossil fuels drags the world to the paramount use of available renewable energy sources for power production in small and medium scales. In this, the power production using solar energy is playing a vital role as it is safe and pollution free. The solar PV system has made a good impact in different countries and it's fast-paced in the last two decades because of the increase in demand for electric power. Apart from the utility service to generate power by Solar PV power plants in large scale, this idea has been an attraction to the peoples and results in implementing the Solar PV in their building roofs to generate their own power in small scale. The rooftop solar PV systems made the consumers to support their residential load during the power failure, consuming less power from the grid and in advance, it can feed the excess power to the grid. By delivering the power to the grid the consumer becomes prosumer and experience economic return equal to the power delivered to the grid. Bidirectional net energy meters are useful for the consumers to keep in track of the amount of power that is transmitted to the grid (Solar power generated in excess) and received by the consumer (power received from the utility center). The main outcome of this net metering from the consumer side is the reduced total tariff when they fed the excess power to the grid.-Researches are being developed in the area of minimizing the losses, and maximum consumption with low cost affordable to build Zero Energy Buildings. In some parts of the USA, the government has come forward for free installation of the rooftop solar PV system in their people's house as awareness and receiving their excess power at a considerable rate. Without this Net metering technology, the utility cannot consume power from the consumer.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121554815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Survey on Energy-Efficient Routing Protocols with QoS Assurances for Wireless Sensor Networks 无线传感器网络中具有QoS保证的高能效路由协议研究
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9080007
N. Kanthimathi, N. Saranya, V. Baranidharan
Wireless sensor networks consist of huge nodes with sensing, computing and communication capabilities. The unique quality of a routing protocol is known by its minimized energy consumption, improved QoS which also prolongs the network life time. In this paper the routing protocols are recorded into three primary categories, route discovery model, network model and data delivery model. The routing protocols that fall in the first category can be named as proactive, reactive and hybrid. The routing protocols that fall under a the subsequent category are grouped as flat, hierarchical and location based. The routing protocols belonging to the third category can be parallely classified into two categories as transceiver protocol model and accuracy protocol model. Further transceiver protocol model has sub categories like negotiation, coherent based, query based. Sub categories of accuracy protocol model are QoS based protocol and multipath based protocol. The paper also plays up the merits and performance comparison of each routing technique.
无线传感器网络由具有传感、计算和通信能力的巨大节点组成。路由协议的独特品质在于其最小化的能量消耗,改进的QoS也延长了网络的生存时间。本文将路由协议分为三大类:路由发现模型、网络模型和数据传递模型。属于第一类的路由协议可以命名为主动路由协议、被动路由协议和混合路由协议。属于下一个类别的路由协议被分组为平面的、分层的和基于位置的。第三类路由协议可并行分为收发协议模型和精度协议模型两类。进一步的收发协议模型有协商、基于相干、基于查询等子类别。精度协议模型的子类有基于QoS的协议和基于多路径的协议。文中还介绍了各种路由技术的优点和性能比较。
{"title":"A Survey on Energy-Efficient Routing Protocols with QoS Assurances for Wireless Sensor Networks","authors":"N. Kanthimathi, N. Saranya, V. Baranidharan","doi":"10.1109/ICACCE46606.2019.9080007","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9080007","url":null,"abstract":"Wireless sensor networks consist of huge nodes with sensing, computing and communication capabilities. The unique quality of a routing protocol is known by its minimized energy consumption, improved QoS which also prolongs the network life time. In this paper the routing protocols are recorded into three primary categories, route discovery model, network model and data delivery model. The routing protocols that fall in the first category can be named as proactive, reactive and hybrid. The routing protocols that fall under a the subsequent category are grouped as flat, hierarchical and location based. The routing protocols belonging to the third category can be parallely classified into two categories as transceiver protocol model and accuracy protocol model. Further transceiver protocol model has sub categories like negotiation, coherent based, query based. Sub categories of accuracy protocol model are QoS based protocol and multipath based protocol. The paper also plays up the merits and performance comparison of each routing technique.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122765741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comprehensive Study of Medical Image Analysis 医学图像分析的综合研究
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079996
Gitanjali Ganpatrao Nikam, Shuchi Singh, Priya Singh, Radhika Sarraf
Modern medicine has become reliant on medical imaging. The application of computer has proved to be an emerging technique in medical imaging and medical image analysis. Each level of analysis requires an effective algorithm as well as methods in order to generate an accurate and reliable result. Different modalities, such as X-Ray, Magnetic resonance imaging (MRI), Ultrasound, Computed tomography (CT), etc. are used for both diagnoses as well as therapeutic purposes in which it provides as much information about the patient as possible. Medical image processing includes image fusion, matching or warping which is the task of image registration. Medical image analysis includes Image enhancement, segmentation, quantification, registration, which is the most predominant ways to analyze the image. There are various difficulties in medical image processing and subsequent stages like image enhancement and its restoration; segmentation of features; registration and fusion of multimodality images; classification of medical images; image features measurement and analysis and assessment of measurement and development of integrated medical imaging systems for the medical field. In this paper, the techniques used in medical image analysis have been reviewed and discussed extensively. The vital goal of this review is to identify the current state of the art of medical image analysis methods as a reference paradigm in order to accelerate the performance of existing methods.
现代医学越来越依赖于医学成像。计算机在医学成像和医学图像分析中的应用已成为一项新兴技术。每个层次的分析都需要有效的算法和方法,以产生准确可靠的结果。不同的模式,如x射线,磁共振成像(MRI),超声波,计算机断层扫描(CT)等,用于诊断和治疗目的,其中它提供了尽可能多的关于病人的信息。医学图像处理包括图像融合、匹配或翘曲,其中翘曲是图像配准的任务。医学图像分析包括图像增强、分割、量化、配准等,是医学图像分析的主要方法。在医学图像处理及其后续阶段,如图像增强和恢复中存在各种困难;特征分割;多模态图像的配准与融合;医学图像分类;影像特征的测量与分析与评估是综合医学影像测量系统的发展方向。本文对医学图像分析中使用的技术进行了综述和广泛的讨论。本综述的重要目标是确定医学图像分析方法的当前状态作为参考范例,以加速现有方法的性能。
{"title":"A Comprehensive Study of Medical Image Analysis","authors":"Gitanjali Ganpatrao Nikam, Shuchi Singh, Priya Singh, Radhika Sarraf","doi":"10.1109/ICACCE46606.2019.9079996","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079996","url":null,"abstract":"Modern medicine has become reliant on medical imaging. The application of computer has proved to be an emerging technique in medical imaging and medical image analysis. Each level of analysis requires an effective algorithm as well as methods in order to generate an accurate and reliable result. Different modalities, such as X-Ray, Magnetic resonance imaging (MRI), Ultrasound, Computed tomography (CT), etc. are used for both diagnoses as well as therapeutic purposes in which it provides as much information about the patient as possible. Medical image processing includes image fusion, matching or warping which is the task of image registration. Medical image analysis includes Image enhancement, segmentation, quantification, registration, which is the most predominant ways to analyze the image. There are various difficulties in medical image processing and subsequent stages like image enhancement and its restoration; segmentation of features; registration and fusion of multimodality images; classification of medical images; image features measurement and analysis and assessment of measurement and development of integrated medical imaging systems for the medical field. In this paper, the techniques used in medical image analysis have been reviewed and discussed extensively. The vital goal of this review is to identify the current state of the art of medical image analysis methods as a reference paradigm in order to accelerate the performance of existing methods.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133643661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big Data Retrieval using HDFS with LZO Compression 基于LZO压缩的HDFS大数据检索
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079993
T. Prasanth, K. Aarthi, M. Gunasekaran
Any type of organization depends on accurate data analytics to make better decisions. Users of these organizations request access from different resources like processes or executors. When processing this request of users, the data retrieval speed is low and also data is inaccurate for some conditions. To solve this issue, a system may be proposed having Hadoop Distributed File system (HDFS) with Lempel-Ziv-Oberhumer(LZO). The first step in the proposed technique is to retrieve and mine the data from respective database. The next step is to cluster the extracted data and optimize it using HDFS and LZO compression method. In the last step, if the compressed data is found similar to user requested data, the final data has to be visualized to the user. The proposed retrieving process in big data gives better performance and reduced execution time.
任何类型的组织都依赖于准确的数据分析来做出更好的决策。这些组织的用户从不同的资源(如流程或执行者)请求访问。在处理用户的这一请求时,数据检索速度较慢,而且在某些情况下数据不准确。为了解决这个问题,一个系统可能会被提议使用具有LZO (Lempel-Ziv-Oberhumer)特性的HDFS (Hadoop Distributed File system)。该技术的第一步是从各自的数据库中检索和挖掘数据。下一步是将提取的数据进行聚类,并使用HDFS和LZO压缩方法进行优化。在最后一步中,如果发现压缩数据与用户请求的数据相似,则必须将最终数据可视化给用户。提出的大数据检索流程具有更好的性能和更短的执行时间。
{"title":"Big Data Retrieval using HDFS with LZO Compression","authors":"T. Prasanth, K. Aarthi, M. Gunasekaran","doi":"10.1109/ICACCE46606.2019.9079993","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079993","url":null,"abstract":"Any type of organization depends on accurate data analytics to make better decisions. Users of these organizations request access from different resources like processes or executors. When processing this request of users, the data retrieval speed is low and also data is inaccurate for some conditions. To solve this issue, a system may be proposed having Hadoop Distributed File system (HDFS) with Lempel-Ziv-Oberhumer(LZO). The first step in the proposed technique is to retrieve and mine the data from respective database. The next step is to cluster the extracted data and optimize it using HDFS and LZO compression method. In the last step, if the compressed data is found similar to user requested data, the final data has to be visualized to the user. The proposed retrieving process in big data gives better performance and reduced execution time.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114267978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient Minutiae Matching Algorithm for Fingerprint Recognition 指纹识别的高效细节匹配算法
Pub Date : 2019-04-01 DOI: 10.1109/ICACCE46606.2019.9079971
K. Nirmalakumari, H. Rajaguru, P. Rajkumar
Recognition of human fingerprint verifies the match among two fingerprints in an automatic way and it is applied in various fields. The fingerprints are unique and its pattern will remain the same for the lifetime. The minutiae points represent the features of fingerprint that aids in the authentication of fingerprints. The main aim of this paper is to improve a scheme for verification of fingerprint by means of feature extraction and matching techniques. The initial step is preprocessing that involves image enhancement and binarization processes for the poor quality input fingerprint images. The fingerprint verification involves two main steps namely minutiae extraction and minutiae matching. The false minutiae points are to be removed and only efficient minutiae points are to be considered for further process. In this work, two publically available fingerprint datasets are utilized and the accuracy of fingerprint recognition is evaluated using the performance measures namely False Matching Ratio (FMR), False Non Matching Ratio (FNMR) and Threshold. From the results, it is clear that our work provides better results in fingerprint recognition.
人体指纹识别是一种自动验证两枚指纹是否匹配的方法,被广泛应用于各个领域。指纹是独一无二的,它的图案将永远保持不变。指纹细节点代表指纹的特征,有助于指纹的认证。本文的主要目的是改进一种基于特征提取和匹配技术的指纹验证方案。首先是预处理,包括对质量较差的输入指纹图像进行图像增强和二值化处理。指纹验证主要包括特征提取和特征匹配两个步骤。假的细节点将被移除,只有有效的细节点将被考虑用于进一步的处理。在这项工作中,利用两个公开可用的指纹数据集,并使用虚假匹配率(FMR),虚假不匹配率(FNMR)和阈值等性能指标来评估指纹识别的准确性。从结果来看,我们的工作在指纹识别方面提供了更好的结果。
{"title":"Efficient Minutiae Matching Algorithm for Fingerprint Recognition","authors":"K. Nirmalakumari, H. Rajaguru, P. Rajkumar","doi":"10.1109/ICACCE46606.2019.9079971","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079971","url":null,"abstract":"Recognition of human fingerprint verifies the match among two fingerprints in an automatic way and it is applied in various fields. The fingerprints are unique and its pattern will remain the same for the lifetime. The minutiae points represent the features of fingerprint that aids in the authentication of fingerprints. The main aim of this paper is to improve a scheme for verification of fingerprint by means of feature extraction and matching techniques. The initial step is preprocessing that involves image enhancement and binarization processes for the poor quality input fingerprint images. The fingerprint verification involves two main steps namely minutiae extraction and minutiae matching. The false minutiae points are to be removed and only efficient minutiae points are to be considered for further process. In this work, two publically available fingerprint datasets are utilized and the accuracy of fingerprint recognition is evaluated using the performance measures namely False Matching Ratio (FMR), False Non Matching Ratio (FNMR) and Threshold. From the results, it is clear that our work provides better results in fingerprint recognition.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114413520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1