首页 > 最新文献

2016 10th International Conference on Intelligent Systems and Control (ISCO)最新文献

英文 中文
Analysis of critical parameters of vegetable oil as an alternate dielectric fluid to mineral oil 植物油作为矿物油替代介质的关键参数分析
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2016.7726885
K. Devi, M. Ravindran, S. S. Kumar
Transformers are essential components of electric Power Generation, Transmission and Distribution. The Majority of Power Transformers depends on liquid dielectrics as an insulating medium and heat transfer. Transformer oil can be replaced by alternate oils like Coconut oil, Pongamia Pinnata oil, Palm oil due to their biodegradability and environment friendly nature. This Paper deals with the individual effect of Natural Esters. Investigations of various parameters like BDV, Viscosity, Flash and Fire Point are done according to their Standards. From the Experimental analysis, the properties of Palm oil are high compared to others. The average breakdown strength of palm oil is higher than mineral oil. Comparing the experimental result, cost and availability, the palm oil may be the best alternate fluid for Transformer.
变压器是发电、输电和配电的重要组成部分。大多数电力变压器依靠液体介质作为绝缘介质和传热。由于变压器油具有可生物降解性和环保性,因此可以用椰子油、凤梨油、棕榈油等替代油来替代。本文讨论了天然酯的个体效应。对BDV、粘度、闪点、着火点等参数进行了测试。从实验分析来看,棕榈油的性能比其他油高。棕榈油的平均击穿强度高于矿物油。比较实验结果、成本和可获得性,棕榈油可能是变压器的最佳替代流体。
{"title":"Analysis of critical parameters of vegetable oil as an alternate dielectric fluid to mineral oil","authors":"K. Devi, M. Ravindran, S. S. Kumar","doi":"10.1109/ISCO.2016.7726885","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7726885","url":null,"abstract":"Transformers are essential components of electric Power Generation, Transmission and Distribution. The Majority of Power Transformers depends on liquid dielectrics as an insulating medium and heat transfer. Transformer oil can be replaced by alternate oils like Coconut oil, Pongamia Pinnata oil, Palm oil due to their biodegradability and environment friendly nature. This Paper deals with the individual effect of Natural Esters. Investigations of various parameters like BDV, Viscosity, Flash and Fire Point are done according to their Standards. From the Experimental analysis, the properties of Palm oil are high compared to others. The average breakdown strength of palm oil is higher than mineral oil. Comparing the experimental result, cost and availability, the palm oil may be the best alternate fluid for Transformer.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129508992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A survey on acquiring integrity of shared data with effective user termination in the cloud 云中有效用户终端获取共享数据完整性的研究
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2016.7726893
N. Shyamambika, N. Thillaiarasu
Cloud computing is a term that refers Internet based development and services. These services are remotely hosted, ubiquitous and commoditized. The problem within the cloud computing includes security, policy access and integrity i.e. data or information correctness. Cloud service suppliers could hoodwink verifiers concerning the incorrectness of shared information so as to save the reputation of its data services and avoid losing money on its data services. This paper, we project a new public auditing mechanism for shared data with economical user revocation within the cloud using a Third Party Auditor. Once the user within the group is revoked, we enable the semi-trusted cloud to re-sign blocks that were signed by the revoked user with proxy signatures. Experimental results show that the cloud can improve the potency of user revocation, and existing users in the group can save a big quantity of computation and communication resources during user revocation. Thus we build use of login with secret key in each time conjointly a security question for the user.
云计算是一个指基于互联网的开发和服务的术语。这些服务是远程托管的、无处不在的、商品化的。云计算中的问题包括安全性、策略访问和完整性,即数据或信息的正确性。云服务供应商可以在共享信息不正确的问题上欺骗验证者,以挽救其数据服务的声誉,避免在其数据服务上损失资金。在本文中,我们设计了一种新的公共审计机制,用于共享数据,并使用第三方审计员在云中经济地撤销用户。一旦组内的用户被撤销,我们启用半可信云,用代理签名重新签署被撤销用户签署的块。实验结果表明,云可以提高用户撤销的效力,并且组内现有用户在用户撤销过程中可以节省大量的计算和通信资源。这样我们在每次使用密钥登录的同时为用户构建了一个安全问题。
{"title":"A survey on acquiring integrity of shared data with effective user termination in the cloud","authors":"N. Shyamambika, N. Thillaiarasu","doi":"10.1109/ISCO.2016.7726893","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7726893","url":null,"abstract":"Cloud computing is a term that refers Internet based development and services. These services are remotely hosted, ubiquitous and commoditized. The problem within the cloud computing includes security, policy access and integrity i.e. data or information correctness. Cloud service suppliers could hoodwink verifiers concerning the incorrectness of shared information so as to save the reputation of its data services and avoid losing money on its data services. This paper, we project a new public auditing mechanism for shared data with economical user revocation within the cloud using a Third Party Auditor. Once the user within the group is revoked, we enable the semi-trusted cloud to re-sign blocks that were signed by the revoked user with proxy signatures. Experimental results show that the cloud can improve the potency of user revocation, and existing users in the group can save a big quantity of computation and communication resources during user revocation. Thus we build use of login with secret key in each time conjointly a security question for the user.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131114585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Battery charger for automotive applications 汽车电池充电器
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2016.7726972
G. Kanimozhi, S. S. Kumar, K. Likhitha
Typical Battery charger mainly consists of two stages: AC to DC stage employing boost or interleaved boost converter where power factor correction is taken care by employing suitable control technique and boosting voltage level to an intermediate dc bus level. The second stage is DC/DC stage where the voltage is regulated according to the battery requirement and provides the galvanic isolation for onboard battery chargers. This paper discusses about battery charger consisting of interleaved ac/dc boost converter with average current mode control technique combined with an isolated DC/DC converter. The first stage involves in making the input power factor acceptable to the standards and regulating dc link bus voltage and the second stage provides galvanic isolation. In addition the dc-dc converter achieves ZVS turn-on, ZCS turn-off for the inverter switches and ZCS turn-on, ZCS turn-off for the rectifier diodes, thus improving the efficiency of the circuit. The prototype is simulated for 200 watts using PSIM 9.1. From the results, the overall efficiency of the battery charger obtained is around 94.7% with improved input power factor of 0.95.
典型的电池充电器主要由两个阶段组成:采用升压或交错升压转换器的交流到直流阶段,其中通过采用适当的控制技术和将电压水平升压到中间直流母线水平来进行功率因数校正。第二阶段是DC/DC阶段,根据电池要求调节电压,并为车载电池充电器提供电隔离。本文讨论了交错交直流升压变换器与平均电流模式控制技术相结合的隔离式dc /dc变换器电池充电器。第一阶段包括使输入功率因数符合标准并调节直流链路母线电压,第二阶段提供电流隔离。此外,dc-dc变换器实现了逆变开关的ZVS通、ZCS关断和整流二极管的ZCS通、ZCS关断,从而提高了电路的效率。使用PSIM 9.1对原型进行了200瓦的模拟。结果表明,该电池充电器的整体效率约为94.7%,输入功率因数改善为0.95。
{"title":"Battery charger for automotive applications","authors":"G. Kanimozhi, S. S. Kumar, K. Likhitha","doi":"10.1109/ISCO.2016.7726972","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7726972","url":null,"abstract":"Typical Battery charger mainly consists of two stages: AC to DC stage employing boost or interleaved boost converter where power factor correction is taken care by employing suitable control technique and boosting voltage level to an intermediate dc bus level. The second stage is DC/DC stage where the voltage is regulated according to the battery requirement and provides the galvanic isolation for onboard battery chargers. This paper discusses about battery charger consisting of interleaved ac/dc boost converter with average current mode control technique combined with an isolated DC/DC converter. The first stage involves in making the input power factor acceptable to the standards and regulating dc link bus voltage and the second stage provides galvanic isolation. In addition the dc-dc converter achieves ZVS turn-on, ZCS turn-off for the inverter switches and ZCS turn-on, ZCS turn-off for the rectifier diodes, thus improving the efficiency of the circuit. The prototype is simulated for 200 watts using PSIM 9.1. From the results, the overall efficiency of the battery charger obtained is around 94.7% with improved input power factor of 0.95.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129566095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Dynamic content distribution using ALIVE system in wireless network 在无线网络中使用ALIVE系统进行动态内容分发
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2016.7727070
Ashwini S. Bonde, P. Borkar, M. Motghare
This paper proposed the efficient distribution of live and scheduled multimedia content to mobile users via a ubiquitous wireless Internet. The objective is to design and develop a dynamic content delivery system that (1) enables content owners to deliver their multimedia content to a large number of heterogeneous receivers, and (2) enables receivers to continuously receive that content, independent of their location and the network they connect to. Previous investigations into this topic have shown that multimedia content can be efficiently distributed through an overlay network that consists of multiple distributed proxy servers. In this paper, we extend this concept to the distribution of live and scheduled multimedia content through multiple aggregators. An aggregator is an intermediary content provider that aggregates live multimedia content from various content sources and delivers it to mobile users through a pool of proxy servers. The availability of the same content through multiple aggregators enables mobile users to switch from one aggregator to another, thus alternately receiving the same content from different aggregators. The service area of an aggregator may be restricted to a certain set of networks, in which case switching to such an aggregator also requires mobile hosts to handoff to a network that is part of the aggregator's service area. To support roaming users, aggregators establish application-level roaming agreements between each other. These agreements enable users to receive channels from multiple aggregators while having a subscription with only a few of them. The system transparently switches mobile hosts from one aggregator to another and executes handoffs on the mobile host's network interfaces. The system switches a mobile host to the aggregator that provides a certain channel in the best configuration, where `best' is defined by the preferences of the end-user. Our analysis consists of two parts: (1) a heuristic analysis of the application and network-level delay components involved in a typical switch and an estimation of their best-case values, and (2) an empirical analysis of the delay introduced by SIP transactions under various 802.11 network conditions. The analysis shows that the ALIVE system usually experiences little delay, except at the very edge of an 802.11 cell. Based on our implementation and measurement work, we conclude that the ALIVE system is a feasible system that provides a clear contribution to the multimedia-everywhere vision.
本文提出了通过无所不在的无线互联网将实时和预定的多媒体内容高效地分发给移动用户。目标是设计和开发一个动态内容交付系统,该系统(1)使内容所有者能够将其多媒体内容交付给大量异构的接收器,并且(2)使接收器能够连续地接收该内容,而不受其位置和所连接的网络的影响。先前对该主题的研究表明,多媒体内容可以通过由多个分布式代理服务器组成的覆盖网络有效地分发。在本文中,我们将这一概念扩展到通过多个聚合器分发实时和预定的多媒体内容。聚合器是一个中间内容提供者,它聚合来自各种内容源的实时多媒体内容,并通过代理服务器池将其交付给移动用户。通过多个聚合器提供相同的内容,使移动用户能够从一个聚合器切换到另一个聚合器,从而交替地从不同的聚合器接收相同的内容。聚合器的服务区域可以被限制到一组特定的网络,在这种情况下,切换到这样的聚合器还需要移动主机切换到作为聚合器服务区域一部分的网络。为了支持漫游用户,聚合器之间建立应用级漫游协议。这些协议允许用户从多个聚合器接收频道,同时只订阅其中的几个聚合器。系统透明地将移动主机从一个聚合器切换到另一个聚合器,并在移动主机的网络接口上执行切换。系统将移动主机切换到以最佳配置提供特定频道的聚合器,其中“最佳”是由最终用户的偏好定义的。我们的分析由两部分组成:(1)对典型交换机中涉及的应用程序和网络级延迟组件进行启发式分析,并估计其最佳情况值;(2)对各种802.11网络条件下SIP事务引入的延迟进行实证分析。分析表明,ALIVE系统通常经历很少的延迟,除了在802.11小区的非常边缘。基于我们的实现和测量工作,我们得出结论,ALIVE系统是一个可行的系统,为多媒体无处不在的愿景提供了明确的贡献。
{"title":"Dynamic content distribution using ALIVE system in wireless network","authors":"Ashwini S. Bonde, P. Borkar, M. Motghare","doi":"10.1109/ISCO.2016.7727070","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7727070","url":null,"abstract":"This paper proposed the efficient distribution of live and scheduled multimedia content to mobile users via a ubiquitous wireless Internet. The objective is to design and develop a dynamic content delivery system that (1) enables content owners to deliver their multimedia content to a large number of heterogeneous receivers, and (2) enables receivers to continuously receive that content, independent of their location and the network they connect to. Previous investigations into this topic have shown that multimedia content can be efficiently distributed through an overlay network that consists of multiple distributed proxy servers. In this paper, we extend this concept to the distribution of live and scheduled multimedia content through multiple aggregators. An aggregator is an intermediary content provider that aggregates live multimedia content from various content sources and delivers it to mobile users through a pool of proxy servers. The availability of the same content through multiple aggregators enables mobile users to switch from one aggregator to another, thus alternately receiving the same content from different aggregators. The service area of an aggregator may be restricted to a certain set of networks, in which case switching to such an aggregator also requires mobile hosts to handoff to a network that is part of the aggregator's service area. To support roaming users, aggregators establish application-level roaming agreements between each other. These agreements enable users to receive channels from multiple aggregators while having a subscription with only a few of them. The system transparently switches mobile hosts from one aggregator to another and executes handoffs on the mobile host's network interfaces. The system switches a mobile host to the aggregator that provides a certain channel in the best configuration, where `best' is defined by the preferences of the end-user. Our analysis consists of two parts: (1) a heuristic analysis of the application and network-level delay components involved in a typical switch and an estimation of their best-case values, and (2) an empirical analysis of the delay introduced by SIP transactions under various 802.11 network conditions. The analysis shows that the ALIVE system usually experiences little delay, except at the very edge of an 802.11 cell. Based on our implementation and measurement work, we conclude that the ALIVE system is a feasible system that provides a clear contribution to the multimedia-everywhere vision.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130044447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Text recognition in bilingual machine printed image documents — Challenges and survey: A review on principal and crucial concerns of text extraction in bilingual printed images 双语机器打印图像文档中的文本识别-挑战与调查:双语打印图像中文本提取的主要和关键问题综述
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2016.7727069
Shalini Puri, S. Singh
In this digital world, accurate text identification and recognition has become an important key area of image document analysis and processing. Textual data, ranging from simple to complex images along with language variations - mono, bi, tri or multilingual scripts, is identified and extracted. This paper is designed to focus the challenges and complex issues of text recognition in bilingual machine printed imaged documents. Major crucial factors are discovered and mentioned which become the bottlenecks in correct and accurate recognition. With this, a hierarchical structure depicting three Classification Schemes (CS) A, B and C of bilingual printed imaged document is shown, where A, B and C are related to the content form, image mining and language or script determination. Some loopholes of OCR working are also discussed. To analyze the existing algorithms and methods, a survey is presented to focus on their critical issues, proposed solutions along with constraints and errors found during text processing. It leads to find out the shortcomings and limitations of different methods. Various specifications and factors found from the techniques are also shown as their characteristics and are compared relatively to distinguish them. It is observed that most of the existing methods are based on the classification schemes CS A-A1 and C-C1 and C2 and are designed for the script identification with 300 dpi gray scale image using SVM classifier.
在这个数字化的世界里,准确的文本识别已经成为图像文档分析与处理的一个重要的关键领域。识别和提取文本数据,从简单到复杂的图像以及语言变化-单语,双语,三语或多语脚本。本文旨在探讨双语机器打印图像文档中文本识别的挑战和复杂问题。发现并提出了主要的关键因素,这些因素成为正确准确识别的瓶颈。据此,给出了双语印刷图像文档a、B、C三种分类方案的层次结构,其中a、B、C分别与内容形式、图像挖掘和语言或脚本确定相关。讨论了OCR工作中的一些漏洞。为了分析现有的算法和方法,本文提出了一项调查,重点讨论了它们的关键问题,提出了解决方案,以及在文本处理过程中发现的约束和错误。从而发现不同方法的缺点和局限性。从技术中发现的各种规格和因素也显示为它们的特征,并进行相对比较以区分它们。可以看出,现有的方法大多是基于CS A-A1和C-C1、C2分类方案,针对300 dpi灰度图像的文字识别设计的SVM分类器。
{"title":"Text recognition in bilingual machine printed image documents — Challenges and survey: A review on principal and crucial concerns of text extraction in bilingual printed images","authors":"Shalini Puri, S. Singh","doi":"10.1109/ISCO.2016.7727069","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7727069","url":null,"abstract":"In this digital world, accurate text identification and recognition has become an important key area of image document analysis and processing. Textual data, ranging from simple to complex images along with language variations - mono, bi, tri or multilingual scripts, is identified and extracted. This paper is designed to focus the challenges and complex issues of text recognition in bilingual machine printed imaged documents. Major crucial factors are discovered and mentioned which become the bottlenecks in correct and accurate recognition. With this, a hierarchical structure depicting three Classification Schemes (CS) A, B and C of bilingual printed imaged document is shown, where A, B and C are related to the content form, image mining and language or script determination. Some loopholes of OCR working are also discussed. To analyze the existing algorithms and methods, a survey is presented to focus on their critical issues, proposed solutions along with constraints and errors found during text processing. It leads to find out the shortcomings and limitations of different methods. Various specifications and factors found from the techniques are also shown as their characteristics and are compared relatively to distinguish them. It is observed that most of the existing methods are based on the classification schemes CS A-A1 and C-C1 and C2 and are designed for the script identification with 300 dpi gray scale image using SVM classifier.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128216065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
PROvacy: Protecting image privacy in social networking sites using reversible data hiding PROvacy:使用可逆数据隐藏保护社交网站中的图像隐私
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2016.7726913
Aswathy Achuthshankar, Aswin Achuthshankar
The crimes in the social networking sites are increasing day by day. One of the main crimes is misusing the image by morphing and using it for blackmailing. Users can view the image and edit the image. On social networking sites, users post their own pictures and these pictures can be viewed by anyone. Anyone can access the image, whether the users are authorized or unauthorized. There is no centralized privacy. This paper deals with how to protect the image's privacy using reversible data hiding. In this technique, the image privacy information is embedded into the image, and only based on this privacy information the users on the social networking sites are able to view the image. By this method we make sure that only authorized users have access to the image.
社交网站上的犯罪日益增多。其中一个主要的犯罪是通过变形和利用它来勒索图像。用户可以查看和编辑图像。在社交网站上,用户上传自己的照片,任何人都可以看到这些照片。任何人都可以访问图像,无论用户是否授权。没有集中的隐私。本文讨论了如何利用可逆数据隐藏来保护图像的隐私。在该技术中,将图像隐私信息嵌入到图像中,并且仅基于该隐私信息,社交网站上的用户才能查看图像。通过这种方法,我们确保只有授权用户才能访问图像。
{"title":"PROvacy: Protecting image privacy in social networking sites using reversible data hiding","authors":"Aswathy Achuthshankar, Aswin Achuthshankar","doi":"10.1109/ISCO.2016.7726913","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7726913","url":null,"abstract":"The crimes in the social networking sites are increasing day by day. One of the main crimes is misusing the image by morphing and using it for blackmailing. Users can view the image and edit the image. On social networking sites, users post their own pictures and these pictures can be viewed by anyone. Anyone can access the image, whether the users are authorized or unauthorized. There is no centralized privacy. This paper deals with how to protect the image's privacy using reversible data hiding. In this technique, the image privacy information is embedded into the image, and only based on this privacy information the users on the social networking sites are able to view the image. By this method we make sure that only authorized users have access to the image.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124250917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dimensional accuracy improvement of part fabricated by low cost 3D open source printer for industrial application 面向工业应用的低成本3D开源打印机制造零件尺寸精度的提高
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2016.7726882
N. Dixit, R. Srivastava, R. Narain
3D open source printer (3D-OSP) based on fused deposition modelling (FDM) technique is one of the newly developed rapid prototyping (RP) process for the fabrication of parts. It has been observed from research finding that the contribution of parameter such as raster width, slice height, and path speed are the most significant to the dimensional accuracy of 3D open source product. In this paper, an attempt has been made to find out the influence of the process parameter along with their interactions on the 3D-OSP. Taguchi parameter design has been used to find out the optimum parameters level to minimize percentage change in length (L1), length (L2) and height (H) of test specimens. Experimental result reveals that there is different optimal parameters level setting for each dimensional characteristic namely change in length (L1), length (L2) and height (H). Therefore, grey relational method is used to obtain optimum factor level of each dimensional characteristic simultaneously. From obtain result it is conclude that appropriate control of machine process parameters improve the dimensional accuracy of parts fabricated by a low cost 3D open source printer for industrial/commercial application.
基于熔融沉积建模(FDM)技术的3D开源打印机(3D- osp)是新兴的零件快速成型(RP)制造技术之一。研究发现,栅格宽度、切片高度、路径速度等参数对三维开源产品尺寸精度的贡献最为显著。本文试图找出工艺参数及其相互作用对3D-OSP的影响。采用田口参数设计,找出了使试件长度(L1)、长度(L2)和高度(H)变化百分比最小的最佳参数水平。实验结果表明,每个维度特征的最优参数水平设置不同,即长度(L1)、长度(L2)和高度(H)的变化,因此,采用灰色关联方法同时获得每个维度特征的最优因子水平。结果表明,适当控制机床工艺参数可提高低成本开源3D打印机加工零件的尺寸精度。
{"title":"Dimensional accuracy improvement of part fabricated by low cost 3D open source printer for industrial application","authors":"N. Dixit, R. Srivastava, R. Narain","doi":"10.1109/ISCO.2016.7726882","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7726882","url":null,"abstract":"3D open source printer (3D-OSP) based on fused deposition modelling (FDM) technique is one of the newly developed rapid prototyping (RP) process for the fabrication of parts. It has been observed from research finding that the contribution of parameter such as raster width, slice height, and path speed are the most significant to the dimensional accuracy of 3D open source product. In this paper, an attempt has been made to find out the influence of the process parameter along with their interactions on the 3D-OSP. Taguchi parameter design has been used to find out the optimum parameters level to minimize percentage change in length (L1), length (L2) and height (H) of test specimens. Experimental result reveals that there is different optimal parameters level setting for each dimensional characteristic namely change in length (L1), length (L2) and height (H). Therefore, grey relational method is used to obtain optimum factor level of each dimensional characteristic simultaneously. From obtain result it is conclude that appropriate control of machine process parameters improve the dimensional accuracy of parts fabricated by a low cost 3D open source printer for industrial/commercial application.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"445 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125770273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Brain controlled home automation system 脑控家庭自动化系统
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2016.7727050
Anupama A. Ghodake, S. Shelke
Brain Computer Interface (BCI) is one of the communication channel used to make an interaction between human brain and digital computer to control/operate the external devices without having any touch of muscular body part. This provides the easiness in operations and also helpful to elder and decibel people. This is useful for people who cannot operate the peripheral devices using our normal muscular body parts. The proposed system aims to control home appliances (like bulb, fan etc.) with the help of Human Attention Level which comes under non-invasive method of brains signal measurement. This attention is being measured by NeuroSky Headset. Attention level values are ranges from 1 to 100. Attention means user's level of mental focus which occurs during intense concentration and directed (but stable) mental activity. So to get attention values user should observe the object (or focus onto the object). For demonstration purpose here are used one bulb and one fan.
脑机接口(Brain - Computer Interface, BCI)是一种无需任何身体肌肉部位的接触,就能实现人脑与数字计算机之间的交互,从而控制/操作外部设备的通信通道。这样操作方便,对老年人和高分贝人群也有帮助。这对那些不能使用正常肌肉部位操作外围设备的人很有用。该系统旨在通过非侵入性的大脑信号测量方法,通过人类注意力水平来控制家用电器(如灯泡,风扇等)。这种关注是由NeuroSky Headset测量的。注意级别的取值范围是1 ~ 100。注意力是指使用者在高度集中和定向(但稳定的)心理活动期间的精神集中程度。因此,为了获得注意力值,用户应该观察对象(或专注于对象)。为了演示,这里使用一个灯泡和一个风扇。
{"title":"Brain controlled home automation system","authors":"Anupama A. Ghodake, S. Shelke","doi":"10.1109/ISCO.2016.7727050","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7727050","url":null,"abstract":"Brain Computer Interface (BCI) is one of the communication channel used to make an interaction between human brain and digital computer to control/operate the external devices without having any touch of muscular body part. This provides the easiness in operations and also helpful to elder and decibel people. This is useful for people who cannot operate the peripheral devices using our normal muscular body parts. The proposed system aims to control home appliances (like bulb, fan etc.) with the help of Human Attention Level which comes under non-invasive method of brains signal measurement. This attention is being measured by NeuroSky Headset. Attention level values are ranges from 1 to 100. Attention means user's level of mental focus which occurs during intense concentration and directed (but stable) mental activity. So to get attention values user should observe the object (or focus onto the object). For demonstration purpose here are used one bulb and one fan.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126358412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Monocular distance estimation using pinhole camera approximation to avoid vehicle crash and back-over accidents 利用针孔相机逼近的单目距离估计避免车辆碰撞和倒车事故
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2016.7727017
R. K. Megalingam, Vignesh Shriram, Bommu Likhith, Gangireddy Rajesh, S. Ghanta
Many accidents happen while driving due to false estimation of the tailgating vehicle's distance and even while backing up or parking the vehicles in a parking lot. It is very important for the driver to know how close the tailgating vehicle. It is equally important to know the vicinity of the other vehicles and objects while parking or taking vehicle from the parking lots. The main objective of this paper is to accurately estimate the distance of a specific object by approximating the camera to be an ideal pinhole camera. In this method we use triangle similarity to estimate the distance after obtaining the focal length (in pixels) of the camera. Using image processing techniques we detect the object for which we want to estimate the distance. We input the known width of the object and using the calculated focal length, the algorithm calculates the distance after identifying the object. The experimental results are very promising that the estimation of the distance of an object using pin hole approximation would be extremely useful in vehicles to avoid accidents.
许多事故发生在驾驶过程中,由于对尾随车辆的距离估计错误,甚至在停车场倒车或停车时也发生了事故。对于驾驶员来说,了解尾随车辆的距离是非常重要的。同样重要的是,在停车或从停车场取车时,了解其他车辆和物体的附近。本文的主要目标是通过将相机近似为理想针孔相机来准确估计特定物体的距离。在该方法中,我们在获得相机的焦距(像素)后,使用三角形相似度来估计距离。使用图像处理技术,我们检测到我们想要估计距离的物体。我们输入已知的物体宽度,并使用计算出的焦距,算法在识别出物体后计算出距离。实验结果表明,利用针孔近似来估计物体的距离对车辆避免事故的发生是非常有用的。
{"title":"Monocular distance estimation using pinhole camera approximation to avoid vehicle crash and back-over accidents","authors":"R. K. Megalingam, Vignesh Shriram, Bommu Likhith, Gangireddy Rajesh, S. Ghanta","doi":"10.1109/ISCO.2016.7727017","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7727017","url":null,"abstract":"Many accidents happen while driving due to false estimation of the tailgating vehicle's distance and even while backing up or parking the vehicles in a parking lot. It is very important for the driver to know how close the tailgating vehicle. It is equally important to know the vicinity of the other vehicles and objects while parking or taking vehicle from the parking lots. The main objective of this paper is to accurately estimate the distance of a specific object by approximating the camera to be an ideal pinhole camera. In this method we use triangle similarity to estimate the distance after obtaining the focal length (in pixels) of the camera. Using image processing techniques we detect the object for which we want to estimate the distance. We input the known width of the object and using the calculated focal length, the algorithm calculates the distance after identifying the object. The experimental results are very promising that the estimation of the distance of an object using pin hole approximation would be extremely useful in vehicles to avoid accidents.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121603073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Modeling and simulation of fuzzy based BLDC fed vertically rotating one DOF robot arm position control system 基于模糊无刷直流馈入垂直旋转一自由度机械臂位置控制系统的建模与仿真
Pub Date : 1900-01-01 DOI: 10.1109/ISCO.2016.7727135
R. Manikandan, R. Arulmozhiyal
Automation grows in recent years for manufacturing industries to increase their productivity. Multiple robotic arms are used for handle the materials to lift in flexible directions. Vertical rotation of 360° single arm is considered in this research for position servo drive with brushless DC motor. The load torque of an arm varies depending upon angular displacement due to gravity, so it required four quadrant operation of drive with robust feedback controller. This paper deals with the design and performance comparison of conventional PID feedback controller with fuzzy based PID controller and suggests the most suitable controller. The design was simulated through MATLAB/SIMULINK to verify the dynamic behaviors of all four modes of quadrants.
近年来,为了提高制造业的生产率,自动化在不断发展。采用多只机械臂操纵物料,使其向灵活的方向升降。本文研究了无刷直流电动机位置伺服驱动中单臂360°垂直旋转的问题。由于重力的作用,机械臂的负载转矩随角位移的变化而变化,因此需要带鲁棒反馈控制器的四象限驱动。本文讨论了传统PID反馈控制器与模糊PID控制器的设计和性能比较,提出了最合适的控制器。通过MATLAB/SIMULINK对设计进行仿真,验证了四种象限模式的动态行为。
{"title":"Modeling and simulation of fuzzy based BLDC fed vertically rotating one DOF robot arm position control system","authors":"R. Manikandan, R. Arulmozhiyal","doi":"10.1109/ISCO.2016.7727135","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7727135","url":null,"abstract":"Automation grows in recent years for manufacturing industries to increase their productivity. Multiple robotic arms are used for handle the materials to lift in flexible directions. Vertical rotation of 360° single arm is considered in this research for position servo drive with brushless DC motor. The load torque of an arm varies depending upon angular displacement due to gravity, so it required four quadrant operation of drive with robust feedback controller. This paper deals with the design and performance comparison of conventional PID feedback controller with fuzzy based PID controller and suggests the most suitable controller. The design was simulated through MATLAB/SIMULINK to verify the dynamic behaviors of all four modes of quadrants.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122206502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2016 10th International Conference on Intelligent Systems and Control (ISCO)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1