Pub Date : 1900-01-01DOI: 10.1109/ISCO.2016.7726885
K. Devi, M. Ravindran, S. S. Kumar
Transformers are essential components of electric Power Generation, Transmission and Distribution. The Majority of Power Transformers depends on liquid dielectrics as an insulating medium and heat transfer. Transformer oil can be replaced by alternate oils like Coconut oil, Pongamia Pinnata oil, Palm oil due to their biodegradability and environment friendly nature. This Paper deals with the individual effect of Natural Esters. Investigations of various parameters like BDV, Viscosity, Flash and Fire Point are done according to their Standards. From the Experimental analysis, the properties of Palm oil are high compared to others. The average breakdown strength of palm oil is higher than mineral oil. Comparing the experimental result, cost and availability, the palm oil may be the best alternate fluid for Transformer.
{"title":"Analysis of critical parameters of vegetable oil as an alternate dielectric fluid to mineral oil","authors":"K. Devi, M. Ravindran, S. S. Kumar","doi":"10.1109/ISCO.2016.7726885","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7726885","url":null,"abstract":"Transformers are essential components of electric Power Generation, Transmission and Distribution. The Majority of Power Transformers depends on liquid dielectrics as an insulating medium and heat transfer. Transformer oil can be replaced by alternate oils like Coconut oil, Pongamia Pinnata oil, Palm oil due to their biodegradability and environment friendly nature. This Paper deals with the individual effect of Natural Esters. Investigations of various parameters like BDV, Viscosity, Flash and Fire Point are done according to their Standards. From the Experimental analysis, the properties of Palm oil are high compared to others. The average breakdown strength of palm oil is higher than mineral oil. Comparing the experimental result, cost and availability, the palm oil may be the best alternate fluid for Transformer.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129508992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2016.7726893
N. Shyamambika, N. Thillaiarasu
Cloud computing is a term that refers Internet based development and services. These services are remotely hosted, ubiquitous and commoditized. The problem within the cloud computing includes security, policy access and integrity i.e. data or information correctness. Cloud service suppliers could hoodwink verifiers concerning the incorrectness of shared information so as to save the reputation of its data services and avoid losing money on its data services. This paper, we project a new public auditing mechanism for shared data with economical user revocation within the cloud using a Third Party Auditor. Once the user within the group is revoked, we enable the semi-trusted cloud to re-sign blocks that were signed by the revoked user with proxy signatures. Experimental results show that the cloud can improve the potency of user revocation, and existing users in the group can save a big quantity of computation and communication resources during user revocation. Thus we build use of login with secret key in each time conjointly a security question for the user.
{"title":"A survey on acquiring integrity of shared data with effective user termination in the cloud","authors":"N. Shyamambika, N. Thillaiarasu","doi":"10.1109/ISCO.2016.7726893","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7726893","url":null,"abstract":"Cloud computing is a term that refers Internet based development and services. These services are remotely hosted, ubiquitous and commoditized. The problem within the cloud computing includes security, policy access and integrity i.e. data or information correctness. Cloud service suppliers could hoodwink verifiers concerning the incorrectness of shared information so as to save the reputation of its data services and avoid losing money on its data services. This paper, we project a new public auditing mechanism for shared data with economical user revocation within the cloud using a Third Party Auditor. Once the user within the group is revoked, we enable the semi-trusted cloud to re-sign blocks that were signed by the revoked user with proxy signatures. Experimental results show that the cloud can improve the potency of user revocation, and existing users in the group can save a big quantity of computation and communication resources during user revocation. Thus we build use of login with secret key in each time conjointly a security question for the user.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131114585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2016.7726972
G. Kanimozhi, S. S. Kumar, K. Likhitha
Typical Battery charger mainly consists of two stages: AC to DC stage employing boost or interleaved boost converter where power factor correction is taken care by employing suitable control technique and boosting voltage level to an intermediate dc bus level. The second stage is DC/DC stage where the voltage is regulated according to the battery requirement and provides the galvanic isolation for onboard battery chargers. This paper discusses about battery charger consisting of interleaved ac/dc boost converter with average current mode control technique combined with an isolated DC/DC converter. The first stage involves in making the input power factor acceptable to the standards and regulating dc link bus voltage and the second stage provides galvanic isolation. In addition the dc-dc converter achieves ZVS turn-on, ZCS turn-off for the inverter switches and ZCS turn-on, ZCS turn-off for the rectifier diodes, thus improving the efficiency of the circuit. The prototype is simulated for 200 watts using PSIM 9.1. From the results, the overall efficiency of the battery charger obtained is around 94.7% with improved input power factor of 0.95.
{"title":"Battery charger for automotive applications","authors":"G. Kanimozhi, S. S. Kumar, K. Likhitha","doi":"10.1109/ISCO.2016.7726972","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7726972","url":null,"abstract":"Typical Battery charger mainly consists of two stages: AC to DC stage employing boost or interleaved boost converter where power factor correction is taken care by employing suitable control technique and boosting voltage level to an intermediate dc bus level. The second stage is DC/DC stage where the voltage is regulated according to the battery requirement and provides the galvanic isolation for onboard battery chargers. This paper discusses about battery charger consisting of interleaved ac/dc boost converter with average current mode control technique combined with an isolated DC/DC converter. The first stage involves in making the input power factor acceptable to the standards and regulating dc link bus voltage and the second stage provides galvanic isolation. In addition the dc-dc converter achieves ZVS turn-on, ZCS turn-off for the inverter switches and ZCS turn-on, ZCS turn-off for the rectifier diodes, thus improving the efficiency of the circuit. The prototype is simulated for 200 watts using PSIM 9.1. From the results, the overall efficiency of the battery charger obtained is around 94.7% with improved input power factor of 0.95.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129566095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2016.7727070
Ashwini S. Bonde, P. Borkar, M. Motghare
This paper proposed the efficient distribution of live and scheduled multimedia content to mobile users via a ubiquitous wireless Internet. The objective is to design and develop a dynamic content delivery system that (1) enables content owners to deliver their multimedia content to a large number of heterogeneous receivers, and (2) enables receivers to continuously receive that content, independent of their location and the network they connect to. Previous investigations into this topic have shown that multimedia content can be efficiently distributed through an overlay network that consists of multiple distributed proxy servers. In this paper, we extend this concept to the distribution of live and scheduled multimedia content through multiple aggregators. An aggregator is an intermediary content provider that aggregates live multimedia content from various content sources and delivers it to mobile users through a pool of proxy servers. The availability of the same content through multiple aggregators enables mobile users to switch from one aggregator to another, thus alternately receiving the same content from different aggregators. The service area of an aggregator may be restricted to a certain set of networks, in which case switching to such an aggregator also requires mobile hosts to handoff to a network that is part of the aggregator's service area. To support roaming users, aggregators establish application-level roaming agreements between each other. These agreements enable users to receive channels from multiple aggregators while having a subscription with only a few of them. The system transparently switches mobile hosts from one aggregator to another and executes handoffs on the mobile host's network interfaces. The system switches a mobile host to the aggregator that provides a certain channel in the best configuration, where `best' is defined by the preferences of the end-user. Our analysis consists of two parts: (1) a heuristic analysis of the application and network-level delay components involved in a typical switch and an estimation of their best-case values, and (2) an empirical analysis of the delay introduced by SIP transactions under various 802.11 network conditions. The analysis shows that the ALIVE system usually experiences little delay, except at the very edge of an 802.11 cell. Based on our implementation and measurement work, we conclude that the ALIVE system is a feasible system that provides a clear contribution to the multimedia-everywhere vision.
{"title":"Dynamic content distribution using ALIVE system in wireless network","authors":"Ashwini S. Bonde, P. Borkar, M. Motghare","doi":"10.1109/ISCO.2016.7727070","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7727070","url":null,"abstract":"This paper proposed the efficient distribution of live and scheduled multimedia content to mobile users via a ubiquitous wireless Internet. The objective is to design and develop a dynamic content delivery system that (1) enables content owners to deliver their multimedia content to a large number of heterogeneous receivers, and (2) enables receivers to continuously receive that content, independent of their location and the network they connect to. Previous investigations into this topic have shown that multimedia content can be efficiently distributed through an overlay network that consists of multiple distributed proxy servers. In this paper, we extend this concept to the distribution of live and scheduled multimedia content through multiple aggregators. An aggregator is an intermediary content provider that aggregates live multimedia content from various content sources and delivers it to mobile users through a pool of proxy servers. The availability of the same content through multiple aggregators enables mobile users to switch from one aggregator to another, thus alternately receiving the same content from different aggregators. The service area of an aggregator may be restricted to a certain set of networks, in which case switching to such an aggregator also requires mobile hosts to handoff to a network that is part of the aggregator's service area. To support roaming users, aggregators establish application-level roaming agreements between each other. These agreements enable users to receive channels from multiple aggregators while having a subscription with only a few of them. The system transparently switches mobile hosts from one aggregator to another and executes handoffs on the mobile host's network interfaces. The system switches a mobile host to the aggregator that provides a certain channel in the best configuration, where `best' is defined by the preferences of the end-user. Our analysis consists of two parts: (1) a heuristic analysis of the application and network-level delay components involved in a typical switch and an estimation of their best-case values, and (2) an empirical analysis of the delay introduced by SIP transactions under various 802.11 network conditions. The analysis shows that the ALIVE system usually experiences little delay, except at the very edge of an 802.11 cell. Based on our implementation and measurement work, we conclude that the ALIVE system is a feasible system that provides a clear contribution to the multimedia-everywhere vision.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130044447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2016.7727069
Shalini Puri, S. Singh
In this digital world, accurate text identification and recognition has become an important key area of image document analysis and processing. Textual data, ranging from simple to complex images along with language variations - mono, bi, tri or multilingual scripts, is identified and extracted. This paper is designed to focus the challenges and complex issues of text recognition in bilingual machine printed imaged documents. Major crucial factors are discovered and mentioned which become the bottlenecks in correct and accurate recognition. With this, a hierarchical structure depicting three Classification Schemes (CS) A, B and C of bilingual printed imaged document is shown, where A, B and C are related to the content form, image mining and language or script determination. Some loopholes of OCR working are also discussed. To analyze the existing algorithms and methods, a survey is presented to focus on their critical issues, proposed solutions along with constraints and errors found during text processing. It leads to find out the shortcomings and limitations of different methods. Various specifications and factors found from the techniques are also shown as their characteristics and are compared relatively to distinguish them. It is observed that most of the existing methods are based on the classification schemes CS A-A1 and C-C1 and C2 and are designed for the script identification with 300 dpi gray scale image using SVM classifier.
{"title":"Text recognition in bilingual machine printed image documents — Challenges and survey: A review on principal and crucial concerns of text extraction in bilingual printed images","authors":"Shalini Puri, S. Singh","doi":"10.1109/ISCO.2016.7727069","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7727069","url":null,"abstract":"In this digital world, accurate text identification and recognition has become an important key area of image document analysis and processing. Textual data, ranging from simple to complex images along with language variations - mono, bi, tri or multilingual scripts, is identified and extracted. This paper is designed to focus the challenges and complex issues of text recognition in bilingual machine printed imaged documents. Major crucial factors are discovered and mentioned which become the bottlenecks in correct and accurate recognition. With this, a hierarchical structure depicting three Classification Schemes (CS) A, B and C of bilingual printed imaged document is shown, where A, B and C are related to the content form, image mining and language or script determination. Some loopholes of OCR working are also discussed. To analyze the existing algorithms and methods, a survey is presented to focus on their critical issues, proposed solutions along with constraints and errors found during text processing. It leads to find out the shortcomings and limitations of different methods. Various specifications and factors found from the techniques are also shown as their characteristics and are compared relatively to distinguish them. It is observed that most of the existing methods are based on the classification schemes CS A-A1 and C-C1 and C2 and are designed for the script identification with 300 dpi gray scale image using SVM classifier.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128216065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2016.7726913
Aswathy Achuthshankar, Aswin Achuthshankar
The crimes in the social networking sites are increasing day by day. One of the main crimes is misusing the image by morphing and using it for blackmailing. Users can view the image and edit the image. On social networking sites, users post their own pictures and these pictures can be viewed by anyone. Anyone can access the image, whether the users are authorized or unauthorized. There is no centralized privacy. This paper deals with how to protect the image's privacy using reversible data hiding. In this technique, the image privacy information is embedded into the image, and only based on this privacy information the users on the social networking sites are able to view the image. By this method we make sure that only authorized users have access to the image.
{"title":"PROvacy: Protecting image privacy in social networking sites using reversible data hiding","authors":"Aswathy Achuthshankar, Aswin Achuthshankar","doi":"10.1109/ISCO.2016.7726913","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7726913","url":null,"abstract":"The crimes in the social networking sites are increasing day by day. One of the main crimes is misusing the image by morphing and using it for blackmailing. Users can view the image and edit the image. On social networking sites, users post their own pictures and these pictures can be viewed by anyone. Anyone can access the image, whether the users are authorized or unauthorized. There is no centralized privacy. This paper deals with how to protect the image's privacy using reversible data hiding. In this technique, the image privacy information is embedded into the image, and only based on this privacy information the users on the social networking sites are able to view the image. By this method we make sure that only authorized users have access to the image.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124250917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2016.7726882
N. Dixit, R. Srivastava, R. Narain
3D open source printer (3D-OSP) based on fused deposition modelling (FDM) technique is one of the newly developed rapid prototyping (RP) process for the fabrication of parts. It has been observed from research finding that the contribution of parameter such as raster width, slice height, and path speed are the most significant to the dimensional accuracy of 3D open source product. In this paper, an attempt has been made to find out the influence of the process parameter along with their interactions on the 3D-OSP. Taguchi parameter design has been used to find out the optimum parameters level to minimize percentage change in length (L1), length (L2) and height (H) of test specimens. Experimental result reveals that there is different optimal parameters level setting for each dimensional characteristic namely change in length (L1), length (L2) and height (H). Therefore, grey relational method is used to obtain optimum factor level of each dimensional characteristic simultaneously. From obtain result it is conclude that appropriate control of machine process parameters improve the dimensional accuracy of parts fabricated by a low cost 3D open source printer for industrial/commercial application.
{"title":"Dimensional accuracy improvement of part fabricated by low cost 3D open source printer for industrial application","authors":"N. Dixit, R. Srivastava, R. Narain","doi":"10.1109/ISCO.2016.7726882","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7726882","url":null,"abstract":"3D open source printer (3D-OSP) based on fused deposition modelling (FDM) technique is one of the newly developed rapid prototyping (RP) process for the fabrication of parts. It has been observed from research finding that the contribution of parameter such as raster width, slice height, and path speed are the most significant to the dimensional accuracy of 3D open source product. In this paper, an attempt has been made to find out the influence of the process parameter along with their interactions on the 3D-OSP. Taguchi parameter design has been used to find out the optimum parameters level to minimize percentage change in length (L1), length (L2) and height (H) of test specimens. Experimental result reveals that there is different optimal parameters level setting for each dimensional characteristic namely change in length (L1), length (L2) and height (H). Therefore, grey relational method is used to obtain optimum factor level of each dimensional characteristic simultaneously. From obtain result it is conclude that appropriate control of machine process parameters improve the dimensional accuracy of parts fabricated by a low cost 3D open source printer for industrial/commercial application.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"445 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125770273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2016.7727050
Anupama A. Ghodake, S. Shelke
Brain Computer Interface (BCI) is one of the communication channel used to make an interaction between human brain and digital computer to control/operate the external devices without having any touch of muscular body part. This provides the easiness in operations and also helpful to elder and decibel people. This is useful for people who cannot operate the peripheral devices using our normal muscular body parts. The proposed system aims to control home appliances (like bulb, fan etc.) with the help of Human Attention Level which comes under non-invasive method of brains signal measurement. This attention is being measured by NeuroSky Headset. Attention level values are ranges from 1 to 100. Attention means user's level of mental focus which occurs during intense concentration and directed (but stable) mental activity. So to get attention values user should observe the object (or focus onto the object). For demonstration purpose here are used one bulb and one fan.
{"title":"Brain controlled home automation system","authors":"Anupama A. Ghodake, S. Shelke","doi":"10.1109/ISCO.2016.7727050","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7727050","url":null,"abstract":"Brain Computer Interface (BCI) is one of the communication channel used to make an interaction between human brain and digital computer to control/operate the external devices without having any touch of muscular body part. This provides the easiness in operations and also helpful to elder and decibel people. This is useful for people who cannot operate the peripheral devices using our normal muscular body parts. The proposed system aims to control home appliances (like bulb, fan etc.) with the help of Human Attention Level which comes under non-invasive method of brains signal measurement. This attention is being measured by NeuroSky Headset. Attention level values are ranges from 1 to 100. Attention means user's level of mental focus which occurs during intense concentration and directed (but stable) mental activity. So to get attention values user should observe the object (or focus onto the object). For demonstration purpose here are used one bulb and one fan.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126358412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2016.7727017
R. K. Megalingam, Vignesh Shriram, Bommu Likhith, Gangireddy Rajesh, S. Ghanta
Many accidents happen while driving due to false estimation of the tailgating vehicle's distance and even while backing up or parking the vehicles in a parking lot. It is very important for the driver to know how close the tailgating vehicle. It is equally important to know the vicinity of the other vehicles and objects while parking or taking vehicle from the parking lots. The main objective of this paper is to accurately estimate the distance of a specific object by approximating the camera to be an ideal pinhole camera. In this method we use triangle similarity to estimate the distance after obtaining the focal length (in pixels) of the camera. Using image processing techniques we detect the object for which we want to estimate the distance. We input the known width of the object and using the calculated focal length, the algorithm calculates the distance after identifying the object. The experimental results are very promising that the estimation of the distance of an object using pin hole approximation would be extremely useful in vehicles to avoid accidents.
{"title":"Monocular distance estimation using pinhole camera approximation to avoid vehicle crash and back-over accidents","authors":"R. K. Megalingam, Vignesh Shriram, Bommu Likhith, Gangireddy Rajesh, S. Ghanta","doi":"10.1109/ISCO.2016.7727017","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7727017","url":null,"abstract":"Many accidents happen while driving due to false estimation of the tailgating vehicle's distance and even while backing up or parking the vehicles in a parking lot. It is very important for the driver to know how close the tailgating vehicle. It is equally important to know the vicinity of the other vehicles and objects while parking or taking vehicle from the parking lots. The main objective of this paper is to accurately estimate the distance of a specific object by approximating the camera to be an ideal pinhole camera. In this method we use triangle similarity to estimate the distance after obtaining the focal length (in pixels) of the camera. Using image processing techniques we detect the object for which we want to estimate the distance. We input the known width of the object and using the calculated focal length, the algorithm calculates the distance after identifying the object. The experimental results are very promising that the estimation of the distance of an object using pin hole approximation would be extremely useful in vehicles to avoid accidents.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121603073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ISCO.2016.7727135
R. Manikandan, R. Arulmozhiyal
Automation grows in recent years for manufacturing industries to increase their productivity. Multiple robotic arms are used for handle the materials to lift in flexible directions. Vertical rotation of 360° single arm is considered in this research for position servo drive with brushless DC motor. The load torque of an arm varies depending upon angular displacement due to gravity, so it required four quadrant operation of drive with robust feedback controller. This paper deals with the design and performance comparison of conventional PID feedback controller with fuzzy based PID controller and suggests the most suitable controller. The design was simulated through MATLAB/SIMULINK to verify the dynamic behaviors of all four modes of quadrants.
{"title":"Modeling and simulation of fuzzy based BLDC fed vertically rotating one DOF robot arm position control system","authors":"R. Manikandan, R. Arulmozhiyal","doi":"10.1109/ISCO.2016.7727135","DOIUrl":"https://doi.org/10.1109/ISCO.2016.7727135","url":null,"abstract":"Automation grows in recent years for manufacturing industries to increase their productivity. Multiple robotic arms are used for handle the materials to lift in flexible directions. Vertical rotation of 360° single arm is considered in this research for position servo drive with brushless DC motor. The load torque of an arm varies depending upon angular displacement due to gravity, so it required four quadrant operation of drive with robust feedback controller. This paper deals with the design and performance comparison of conventional PID feedback controller with fuzzy based PID controller and suggests the most suitable controller. The design was simulated through MATLAB/SIMULINK to verify the dynamic behaviors of all four modes of quadrants.","PeriodicalId":320699,"journal":{"name":"2016 10th International Conference on Intelligent Systems and Control (ISCO)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122206502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}