首页 > 最新文献

2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)最新文献

英文 中文
A new approach to develop a template based load model that can dynamically adopt different types of non-linear loads 提出了一种基于模板的荷载模型的新方法,该模型可以动态地接受不同类型的非线性荷载
S. M. Salam, M. J. Uddin, Saif Hannan
In modern days, residential and commercial users use various types of loads most of which produce huge harmonics. Though most of the people are using more energy efficient power equipment's due to high costing of electric power consumption, but they have a little concern on power quality. A comprehensive study is required to find out the evaluation of the effects of the nonlinear loads of different combination on the overall power quality of a distributed network. There are different indices for power quality that would be maintained in utilities to ensure harmless operation of the power supply network including generators, transmission lines and transformers. In this paper, our focus is to develop an integrated load model that can dynamically adopt different types of loads so that we can conclude theoretically on the power quality parameters on any combination of load.
在现代,住宅和商业用户使用各种类型的负载,其中大多数产生巨大的谐波。虽然由于电力消耗成本高,大多数人都在使用更节能的电力设备,但他们对电能质量的关注却很少。如何评价不同组合的非线性负荷对分布式网络整体电能质量的影响,需要进行全面的研究。为了确保包括发电机、输电线路和变压器在内的供电网络的无害化运行,公用事业中需要保持不同的电能质量指标。在本文中,我们的重点是建立一个可以动态地采用不同类型负载的集成负载模型,从而从理论上得出任何负载组合下的电能质量参数。
{"title":"A new approach to develop a template based load model that can dynamically adopt different types of non-linear loads","authors":"S. M. Salam, M. J. Uddin, Saif Hannan","doi":"10.1109/ECACE.2017.7912996","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912996","url":null,"abstract":"In modern days, residential and commercial users use various types of loads most of which produce huge harmonics. Though most of the people are using more energy efficient power equipment's due to high costing of electric power consumption, but they have a little concern on power quality. A comprehensive study is required to find out the evaluation of the effects of the nonlinear loads of different combination on the overall power quality of a distributed network. There are different indices for power quality that would be maintained in utilities to ensure harmless operation of the power supply network including generators, transmission lines and transformers. In this paper, our focus is to develop an integrated load model that can dynamically adopt different types of loads so that we can conclude theoretically on the power quality parameters on any combination of load.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134408172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Gaussian mixture based boosted classification scheme for imbalanced and oversampled data 一种基于高斯混合的非平衡和过采样数据增强分类方案
B. Pal, Mahit Kumar Paul
Dataset with imbalanced class distribution used to abate classification performance for most of the standard classifier learning algorithms. Moreover, some application area consists of scarcity of labeled training data where clustering is most prominent way to support classification process. Gaussian Mixture Model (GMM) being able to approximate arbitrary probability distribution, is a dominant tool for classification in such cases by means of clustering. An ensemble approach is presented in this paper considering GMM as a weak learner to boost the GMMs in a semi supervised manner via Adaptive Boosting technique. This paper, firstly investigates how much K-means and GMM suffers from uneven class distribution in data. Later experiment on benchmark imbalanced datasets with different imbalance ratio and over sampled datasets using Synthetic Minority Over-sampling Technique (SMOTE) has been carried out for proposed approach. For each case cluster forest has been used as an attribute selection technique. Efficacy of the proposed Boosted GMM approach compared to standard clustering approaches like K means and GMM is exhibited from empirical analysis.
类分布不平衡的数据集用于降低大多数标准分类器学习算法的分类性能。此外,一些应用领域缺乏标记训练数据,聚类是支持分类过程的最突出方法。高斯混合模型(Gaussian Mixture Model, GMM)能够近似任意概率分布,是这种情况下通过聚类进行分类的主要工具。本文提出了一种集成方法,将GMM作为弱学习器,利用自适应增强技术对GMM进行半监督增强。本文首先考察了K-means和GMM在数据中受类分布不均匀的影响程度。随后,利用合成少数派过采样技术(SMOTE)对不同失衡比例的基准不平衡数据集和过采样数据集进行了实验。对于每种情况,集群森林都被用作属性选择技术。与K均值和GMM等标准聚类方法相比,本文提出的增强GMM方法的有效性得到了实证分析。
{"title":"A Gaussian mixture based boosted classification scheme for imbalanced and oversampled data","authors":"B. Pal, Mahit Kumar Paul","doi":"10.1109/ECACE.2017.7912938","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912938","url":null,"abstract":"Dataset with imbalanced class distribution used to abate classification performance for most of the standard classifier learning algorithms. Moreover, some application area consists of scarcity of labeled training data where clustering is most prominent way to support classification process. Gaussian Mixture Model (GMM) being able to approximate arbitrary probability distribution, is a dominant tool for classification in such cases by means of clustering. An ensemble approach is presented in this paper considering GMM as a weak learner to boost the GMMs in a semi supervised manner via Adaptive Boosting technique. This paper, firstly investigates how much K-means and GMM suffers from uneven class distribution in data. Later experiment on benchmark imbalanced datasets with different imbalance ratio and over sampled datasets using Synthetic Minority Over-sampling Technique (SMOTE) has been carried out for proposed approach. For each case cluster forest has been used as an attribute selection technique. Efficacy of the proposed Boosted GMM approach compared to standard clustering approaches like K means and GMM is exhibited from empirical analysis.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133114904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Frequency analysis of a ZVS parallel quasi resonant inverter for a solar based induction heating system 太阳能感应加热系统ZVS并联准谐振逆变器频率分析
Saila Ishrat Annie, K. M. Salim, Zaima Tasneem, Mohammad Rejwan Uddin
This paper proposes the design of an efficient zero voltage switching parallel quasi resonant inverter for small scale industrial and domestic applications using solar energy as the dc input and induction heating technology. The resonant inverter is designed using PSIM software and the designed model is verified using the PROTEUS software which operates for a frequency around 20KHz under ZVS condition for different equivalent heating workpiece resistance. The resonant frequency can be varied over a range by altering the duty cycle values. The detail design of the resonant inverter using PSIM and PROTEUS along with the simulation results of ZVS condition and data analysis are presented in this paper.
本文提出了一种采用太阳能作为直流输入和感应加热技术的高效零电压开关并联准谐振逆变器的设计方案。利用PSIM软件设计了谐振式逆变器,并利用PROTEUS软件对所设计的模型进行了验证,在ZVS条件下,不同等效加热工件电阻的工作频率在20KHz左右。通过改变占空比值,可以在一定范围内改变谐振频率。文中给出了基于PSIM和PROTEUS的谐振逆变器的详细设计,并给出了ZVS工况的仿真结果和数据分析。
{"title":"Frequency analysis of a ZVS parallel quasi resonant inverter for a solar based induction heating system","authors":"Saila Ishrat Annie, K. M. Salim, Zaima Tasneem, Mohammad Rejwan Uddin","doi":"10.1109/ECACE.2017.7912924","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912924","url":null,"abstract":"This paper proposes the design of an efficient zero voltage switching parallel quasi resonant inverter for small scale industrial and domestic applications using solar energy as the dc input and induction heating technology. The resonant inverter is designed using PSIM software and the designed model is verified using the PROTEUS software which operates for a frequency around 20KHz under ZVS condition for different equivalent heating workpiece resistance. The resonant frequency can be varied over a range by altering the duty cycle values. The detail design of the resonant inverter using PSIM and PROTEUS along with the simulation results of ZVS condition and data analysis are presented in this paper.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122859644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Securing AOMDV protocol in mobile adhoc network with elliptic curve cryptography 用椭圆曲线加密技术保护移动自组网中的AOMDV协议
Jeenat Sultana, Tasnuva Ahmed
Mobile Adhoc Network (MANET) is comprised of mobile nodes where each mobile node acts as both router and terminal. While acting as a router a reliable routing protocol is chosen ensuring the packet to reach its destination and an agent is responsible for the transmission of packet while acting as a terminal. In this paper, we implemented secure packet transmission in mobile adhoc network (MANET) through Adhoc On Demand Multipath Distance Vector (AOMDV) routing protocol. AOMDV, a multipath extension of AODV (Adhoc On Demand Distance Vector) routing protocol, is more reliable than its parent protocol, though not completely restraint from attacks. To keep the packets secure in an adversary environment with multiple attackers is the main objective. Elliptic Curve Cryptography (ECC) has been chosen to secure the packets against blackhole attack. Elliptic Curve Cryptography provides security with smaller key size compared to other public-key encryption. We configured three different types of environment using NS-2.35 which is a discrete event network simulator; a secure environment without malicious activity, a hostile environment with blackhole attackers and with ECC implementation by the agent and analyzed their performance.
移动自组网(MANET)由多个移动节点组成,每个移动节点同时充当路由器和终端。当作为路由器时,选择可靠的路由协议以确保数据包到达目的地,代理作为终端时负责数据包的传输。在本文中,我们通过adhoc按需多路径距离矢量(AOMDV)路由协议实现了移动自组网(MANET)中的安全分组传输。AOMDV是AODV (Adhoc On Demand Distance Vector)路由协议的多路径扩展,它比它的父协议更可靠,尽管不能完全防止攻击。在有多个攻击者的敌对环境中保持数据包的安全是主要目标。选择椭圆曲线加密(ECC)来保护数据包免受黑洞攻击。与其他公钥加密相比,椭圆曲线加密以更小的密钥大小提供安全性。我们使用离散事件网络模拟器NS-2.35配置了三种不同类型的环境;在没有恶意活动的安全环境、有黑洞攻击者的敌对环境和代理实现ECC的环境下,分析了它们的性能。
{"title":"Securing AOMDV protocol in mobile adhoc network with elliptic curve cryptography","authors":"Jeenat Sultana, Tasnuva Ahmed","doi":"10.1109/ECACE.2017.7912964","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912964","url":null,"abstract":"Mobile Adhoc Network (MANET) is comprised of mobile nodes where each mobile node acts as both router and terminal. While acting as a router a reliable routing protocol is chosen ensuring the packet to reach its destination and an agent is responsible for the transmission of packet while acting as a terminal. In this paper, we implemented secure packet transmission in mobile adhoc network (MANET) through Adhoc On Demand Multipath Distance Vector (AOMDV) routing protocol. AOMDV, a multipath extension of AODV (Adhoc On Demand Distance Vector) routing protocol, is more reliable than its parent protocol, though not completely restraint from attacks. To keep the packets secure in an adversary environment with multiple attackers is the main objective. Elliptic Curve Cryptography (ECC) has been chosen to secure the packets against blackhole attack. Elliptic Curve Cryptography provides security with smaller key size compared to other public-key encryption. We configured three different types of environment using NS-2.35 which is a discrete event network simulator; a secure environment without malicious activity, a hostile environment with blackhole attackers and with ECC implementation by the agent and analyzed their performance.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124064415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Edge-based transformation and entropy coding for lossless image compression 基于边缘变换和熵编码的无损图像压缩
Md. Ahasan Kabir, M. Mondal
In the digital world, the size of images is an important challenge when dealing with the storage and transmission requirements. Compression is one of the fundamental techniques to address this problem. A number of transform based compression techniques are discussed in the literature and some are used in practice. In this paper, we propose an edge-based image transformation method which will be used with an entropy encoding technique to greatly reduce image size without loss in content. In the first stage of the proposed transform scheme, the intensity difference of neighboring pixels is calculated in the horizontal or vertical direction depending on the presence of a horizontal or vertical edge. In the second stage, the intensity differences are used to form two matrixes — one containing the absolute intensity difference and the other having the polarity of the differences. Next, Huffman or Arithmetic entropy coding is applied on the generated matrixes. The proposed edge-based transformation and entropy coding (ETEC) scheme is compared to the existing lossless compression techniques: Joint Photographic Experts Group Lossless (JPEG-LS) and Set Partitioning in Hierarchical Trees (SPIHT). Simulation results show that the proposed ETEC scheme can provide better compression compared to JPEG-LS and SPIHT algorithms for pixelated images that are used for data communication between a computer screen and a camera.
在数字世界中,在处理存储和传输要求时,图像的大小是一个重要的挑战。压缩是解决这个问题的基本技术之一。文献中讨论了许多基于变换的压缩技术,其中一些在实践中得到了应用。在本文中,我们提出了一种基于边缘的图像变换方法,该方法将与熵编码技术相结合,在不损失图像内容的情况下大大减小图像尺寸。在所提出的变换方案的第一阶段,根据水平或垂直边缘的存在,在水平或垂直方向上计算相邻像素的强度差。在第二阶段,利用强度差形成两个矩阵,一个包含绝对强度差,另一个具有差异的极性。然后,对生成的矩阵应用霍夫曼或算术熵编码。将提出的基于边缘的变换和熵编码(ETEC)方案与现有的无损压缩技术:联合图像专家组无损压缩(JPEG-LS)和分层树集分割(SPIHT)进行了比较。仿真结果表明,对于用于计算机屏幕和摄像机之间数据通信的像素化图像,与JPEG-LS和SPIHT算法相比,提出的ETEC方案可以提供更好的压缩效果。
{"title":"Edge-based transformation and entropy coding for lossless image compression","authors":"Md. Ahasan Kabir, M. Mondal","doi":"10.1109/ECACE.2017.7912997","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912997","url":null,"abstract":"In the digital world, the size of images is an important challenge when dealing with the storage and transmission requirements. Compression is one of the fundamental techniques to address this problem. A number of transform based compression techniques are discussed in the literature and some are used in practice. In this paper, we propose an edge-based image transformation method which will be used with an entropy encoding technique to greatly reduce image size without loss in content. In the first stage of the proposed transform scheme, the intensity difference of neighboring pixels is calculated in the horizontal or vertical direction depending on the presence of a horizontal or vertical edge. In the second stage, the intensity differences are used to form two matrixes — one containing the absolute intensity difference and the other having the polarity of the differences. Next, Huffman or Arithmetic entropy coding is applied on the generated matrixes. The proposed edge-based transformation and entropy coding (ETEC) scheme is compared to the existing lossless compression techniques: Joint Photographic Experts Group Lossless (JPEG-LS) and Set Partitioning in Hierarchical Trees (SPIHT). Simulation results show that the proposed ETEC scheme can provide better compression compared to JPEG-LS and SPIHT algorithms for pixelated images that are used for data communication between a computer screen and a camera.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128769830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A TDMA based EM controlled multi-channel MAC protocol for underwater sensor networks 一种基于TDMA的水下传感器网络电磁控制多通道MAC协议
Md. Ibrahim Ibne Alam, Md. Farhad Hossain
Successful wireless communications in underwater with high throughput possess a great challenge still today. Due to the unique environment in underwater, medium access protocols (MAC) for terrestrial networks are not suitable for such environment. High attenuation of electromagnetic (EM) wave in water makes acoustic wave a more appropriate choice for communication in underwater. However, the low available bandwidth, high propagation delays and spatial-temporal uncertainty of the nodes make the MAC protocols with acoustic channel a vast area for research. In this paper, we propose a novel multi-channel MAC protocol for underwater sensor networks (UWSNs) employing both acoustic and EM waves. The proposed MAC protocol has a single EM based control channel which is used for managing the node data transmission times and confirmation messages. On the other hand, multiple acoustic channels are used as the data communication channels. In the proposed protocol, time division multiple access (TDMA) technique is used for control channel to prevent any collision between control signals of the nodes. Because of the nature of zero collision in the control channel, the whole MAC scheme remains in a collision-less state. Extensive simulations are carried out for evaluating the performance of the proposed MAC protocol demonstrating its validity.
成功的水下高吞吐量无线通信在今天仍然面临着巨大的挑战。由于水下环境的特殊性,地面网络的介质接入协议(MAC)并不适合这种环境。水中电磁波的高衰减特性使声波成为水下通信更合适的选择。然而,低可用带宽、高传播时延和节点的时空不确定性使得声道MAC协议成为一个广阔的研究领域。本文提出了一种基于声波和电磁波的水下传感器网络(UWSNs)多通道MAC协议。提出的MAC协议具有单一的基于EM的控制通道,用于管理节点数据传输时间和确认消息。另一方面,采用多个声学通道作为数据通信通道。在该协议中,控制信道采用时分多址(TDMA)技术,避免了节点控制信号之间的冲突。由于控制信道的零碰撞特性,使得整个MAC方案保持无碰撞状态。为了评估所提出的MAC协议的性能,进行了大量的仿真,证明了其有效性。
{"title":"A TDMA based EM controlled multi-channel MAC protocol for underwater sensor networks","authors":"Md. Ibrahim Ibne Alam, Md. Farhad Hossain","doi":"10.1109/ECACE.2017.7912918","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912918","url":null,"abstract":"Successful wireless communications in underwater with high throughput possess a great challenge still today. Due to the unique environment in underwater, medium access protocols (MAC) for terrestrial networks are not suitable for such environment. High attenuation of electromagnetic (EM) wave in water makes acoustic wave a more appropriate choice for communication in underwater. However, the low available bandwidth, high propagation delays and spatial-temporal uncertainty of the nodes make the MAC protocols with acoustic channel a vast area for research. In this paper, we propose a novel multi-channel MAC protocol for underwater sensor networks (UWSNs) employing both acoustic and EM waves. The proposed MAC protocol has a single EM based control channel which is used for managing the node data transmission times and confirmation messages. On the other hand, multiple acoustic channels are used as the data communication channels. In the proposed protocol, time division multiple access (TDMA) technique is used for control channel to prevent any collision between control signals of the nodes. Because of the nature of zero collision in the control channel, the whole MAC scheme remains in a collision-less state. Extensive simulations are carried out for evaluating the performance of the proposed MAC protocol demonstrating its validity.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114370613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance analysis of classifying localization sites of protein using data mining techniques and artificial neural networks 基于数据挖掘技术和人工神经网络的蛋白质定位位点分类性能分析
Md. Shahriare Satu, Tania Akter, Md. Jamal Uddin
Protein localization prediction is computation approach to predict where a protein resides in a cell. Accurate localization of proteins is needed to provide physiological substance for their function and aberrant localization of protein causes pathogenesis of various human diseases. E.Cott and Yeast are unicellular organism and different proteins allocate in their cell. If those protein are dislocated, then these causes various infections that affected human body adversely. So, the objective of this work is to classify proteins into different cellular localization sites based on amino acid sequences of E.Coli bacterium and Yeast In this experiment, we collect dataset of E.Coli and Yeast from data repository and preprocessed it for further processing. Then we train our dataset with several data mining classification algorithms and artificial neural networks. After classifying both dataset, we compare accuracies among different classifiers and try to find best classifiers for Protein localization sites prediction of E.Coli and Yeast dataset.
蛋白质定位预测是一种预测蛋白质在细胞中位置的计算方法。蛋白质的准确定位是为其功能提供生理物质的必要条件,蛋白质的异常定位是人类各种疾病发病的原因。酵母和酵母都是单细胞生物,它们的细胞内分配着不同的蛋白质。如果这些蛋白质脱位,就会引起各种感染,对人体产生不利影响。因此,本研究的目的是基于大肠杆菌和酵母菌的氨基酸序列将蛋白质分类到不同的细胞定位位点。本实验从数据库中收集大肠杆菌和酵母菌的数据集,并对其进行预处理,以便进一步处理。然后我们用几种数据挖掘分类算法和人工神经网络来训练我们的数据集。在对这两个数据集进行分类后,我们比较了不同分类器的准确率,并试图找到大肠杆菌和酵母数据集蛋白质定位位点预测的最佳分类器。
{"title":"Performance analysis of classifying localization sites of protein using data mining techniques and artificial neural networks","authors":"Md. Shahriare Satu, Tania Akter, Md. Jamal Uddin","doi":"10.1109/ECACE.2017.7913023","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7913023","url":null,"abstract":"Protein localization prediction is computation approach to predict where a protein resides in a cell. Accurate localization of proteins is needed to provide physiological substance for their function and aberrant localization of protein causes pathogenesis of various human diseases. E.Cott and Yeast are unicellular organism and different proteins allocate in their cell. If those protein are dislocated, then these causes various infections that affected human body adversely. So, the objective of this work is to classify proteins into different cellular localization sites based on amino acid sequences of E.Coli bacterium and Yeast In this experiment, we collect dataset of E.Coli and Yeast from data repository and preprocessed it for further processing. Then we train our dataset with several data mining classification algorithms and artificial neural networks. After classifying both dataset, we compare accuracies among different classifiers and try to find best classifiers for Protein localization sites prediction of E.Coli and Yeast dataset.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114445414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A simple multiband patch antenna for application in wireless communication 一种用于无线通信的简易多波段贴片天线
Md. Imran Khan, Md. Ahasan Kabir, A. Hira
This paper proposes a compact (46×50×0.16 mm3) multiband patch antenna for Wi-Fi, WiMAX, WLAN and satellite applications. The antenna consists of three I shape, two L shape and one F shape patch. The length of the patches and the thickness of Fr-4 substrate are varied to find out the optimized dimensions at which antenna gives the best performance. The antenna has three significant frequency bands having bandwidth of 500MHz (2.10–2.60GHz), 2.80GHz (3.02–5.82GHz) and 2.50GHz (7.00–9.50GHz). The proposed antenna maintains same radiation characteristics for all of the supported frequency bands. For all frequencies the antenna input impedance is matched with 50 Ω feeder lines. The antenna is simulated using CST Microwave Studio software. The simulated VSWR, reflection coefficient, radiation patterns, directivity, half power beamwidth (HPBW), realized peak gains and radiation efficiency of the antenna are presented.
本文提出了一种适用于Wi-Fi、WiMAX、WLAN和卫星应用的紧凑(46×50×0.16 mm3)多频段贴片天线。天线由3个I型、2个L型和1个F型贴片组成。通过改变贴片的长度和Fr-4衬底的厚度,找出能使天线获得最佳性能的最佳尺寸。该天线有三个重要频段,带宽为500MHz (2.10-2.60GHz)、2.80GHz (3.02-5.82GHz)和2.50GHz (7.00-9.50GHz)。该天线在所有支持的频段保持相同的辐射特性。对于所有频率,天线输入阻抗与50条Ω馈线相匹配。利用CST Microwave Studio软件对天线进行仿真。给出了天线的模拟驻波比、反射系数、辐射方向图、指向性、半功率波束宽度、实现峰值增益和辐射效率。
{"title":"A simple multiband patch antenna for application in wireless communication","authors":"Md. Imran Khan, Md. Ahasan Kabir, A. Hira","doi":"10.1109/ECACE.2017.7912978","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912978","url":null,"abstract":"This paper proposes a compact (46×50×0.16 mm3) multiband patch antenna for Wi-Fi, WiMAX, WLAN and satellite applications. The antenna consists of three I shape, two L shape and one F shape patch. The length of the patches and the thickness of Fr-4 substrate are varied to find out the optimized dimensions at which antenna gives the best performance. The antenna has three significant frequency bands having bandwidth of 500MHz (2.10–2.60GHz), 2.80GHz (3.02–5.82GHz) and 2.50GHz (7.00–9.50GHz). The proposed antenna maintains same radiation characteristics for all of the supported frequency bands. For all frequencies the antenna input impedance is matched with 50 Ω feeder lines. The antenna is simulated using CST Microwave Studio software. The simulated VSWR, reflection coefficient, radiation patterns, directivity, half power beamwidth (HPBW), realized peak gains and radiation efficiency of the antenna are presented.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127159750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Advanced real time RFID mutual authentication protocol using dynamically updated secret value through encryption and decryption process 先进的RFID实时互认证协议,通过加解密过程动态更新秘密值
Nure Alam Md. Risalat, M. T. Hasan, Md. Shahadat Hossain, M. Rahman
Radio Frequency Identification (RFID) Technology is growing popular in wireless communications. It can be used easily for security purposes using authentication protocol. In the literature, researchers proposed different types of RFID based authentication protocols to ensure security and privacy. RFID technology is used in IoT (Internet of things) for real time authentication like access control in offices, homeland security, and transportation and also in defense and sensitive medical organizations. In this paper we proposed a hash based mutual authentication protocol that can dynamically update secret key value between tag and the reader. This protocol is secure and immune to different kinds of attacks.
无线射频识别(RFID)技术在无线通信领域日益普及。它可以很容易地用于使用身份验证协议的安全目的。在文献中,研究人员提出了不同类型的基于RFID的认证协议,以确保安全性和隐私性。RFID技术用于物联网(IoT)的实时身份验证,如办公室,国土安全,运输以及国防和敏感医疗组织的访问控制。本文提出了一种基于哈希的互认证协议,该协议可以动态更新标签和阅读器之间的密钥值。该协议是安全的,不受各种攻击。
{"title":"Advanced real time RFID mutual authentication protocol using dynamically updated secret value through encryption and decryption process","authors":"Nure Alam Md. Risalat, M. T. Hasan, Md. Shahadat Hossain, M. Rahman","doi":"10.1109/ECACE.2017.7913010","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7913010","url":null,"abstract":"Radio Frequency Identification (RFID) Technology is growing popular in wireless communications. It can be used easily for security purposes using authentication protocol. In the literature, researchers proposed different types of RFID based authentication protocols to ensure security and privacy. RFID technology is used in IoT (Internet of things) for real time authentication like access control in offices, homeland security, and transportation and also in defense and sensitive medical organizations. In this paper we proposed a hash based mutual authentication protocol that can dynamically update secret key value between tag and the reader. This protocol is secure and immune to different kinds of attacks.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128057350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Pseudo random binary sequence: A new approach over finite field and its properties 伪随机二进序列:有限域上的一种新方法及其性质
Fatema Akhter, Md. Selim Al Mamun
The pseudo random binary sequence plays an important role in cryptography and network security system. This paper proposes a new approach to pseudo random binary sequence over finite field and evaluates some important properties of the newly generated sequence. The sequence is generated by applying a primitive polynomial over finite field, trace function and modified mobius function. Then period, autocorrelation, cross-correlation and linear complexity properties of the generated sequence have been presented in this paper. Finally, the proposed sequence is analyzed on various bit length of odd characteristics of field and compared with some existing works. The comparison results show the superiority of the proposed approach over existing works in terms of its properties.
伪随机二进制序列在密码学和网络安全系统中起着重要的作用。本文提出了有限域上伪随机二值序列的一种新方法,并对新生成序列的一些重要性质进行了评价。利用有限域上的原始多项式、迹函数和修正莫比乌斯函数生成序列。然后给出了生成序列的周期、自相关、互相关和线性复杂度的性质。最后,对所提出的序列进行了不同位长场奇特征的分析,并与已有的研究成果进行了比较。对比结果表明,本文提出的方法在性能上优于现有的方法。
{"title":"Pseudo random binary sequence: A new approach over finite field and its properties","authors":"Fatema Akhter, Md. Selim Al Mamun","doi":"10.1109/ECACE.2017.7912990","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912990","url":null,"abstract":"The pseudo random binary sequence plays an important role in cryptography and network security system. This paper proposes a new approach to pseudo random binary sequence over finite field and evaluates some important properties of the newly generated sequence. The sequence is generated by applying a primitive polynomial over finite field, trace function and modified mobius function. Then period, autocorrelation, cross-correlation and linear complexity properties of the generated sequence have been presented in this paper. Finally, the proposed sequence is analyzed on various bit length of odd characteristics of field and compared with some existing works. The comparison results show the superiority of the proposed approach over existing works in terms of its properties.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128118099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1