首页 > 最新文献

2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)最新文献

英文 中文
Relative analysis of AODV & DSDV routing protocols for MANET based on NS2 基于NS2的MANET AODV和DSDV路由协议的对比分析
N. Aggarwal, T. S. Chohan, K. Singh, R. Vohra, S. Bahel
To design any wireless network, routing and protocol selection are of important consideration. In Mobile Adhoc Networks (MANET), routing protocols should have best throughput with minimum delay. So the performance in critical situations is the main concern of mobile networks. In this paper, wireless network of mobile nodes has been designed with defined parameters and the relative analysis is carried out on Adhoc On-demand Distance Vector (AODV) and Destination Sequenced distance Vector (DSDV) protocols using NS2 simulator. The Throughput of generating and receiving packets, Jitter on sending and receiving side and End to end delay are the common parameters used for the comparison.
在设计任何无线网络时,路由和协议的选择都是重要的考虑因素。在移动自组网(MANET)中,路由协议应具有最佳的吞吐量和最小的延迟。因此,关键情况下的性能是移动网络主要关注的问题。本文设计了具有定义参数的移动节点无线网络,并利用NS2模拟器对Adhoc按需距离矢量(AODV)和目的地顺序距离矢量(DSDV)协议进行了相关分析。生成和接收数据包的吞吐量、发送端和接收端的抖动以及端到端延迟是用于比较的常用参数。
{"title":"Relative analysis of AODV & DSDV routing protocols for MANET based on NS2","authors":"N. Aggarwal, T. S. Chohan, K. Singh, R. Vohra, S. Bahel","doi":"10.1109/ICEEOT.2016.7755355","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755355","url":null,"abstract":"To design any wireless network, routing and protocol selection are of important consideration. In Mobile Adhoc Networks (MANET), routing protocols should have best throughput with minimum delay. So the performance in critical situations is the main concern of mobile networks. In this paper, wireless network of mobile nodes has been designed with defined parameters and the relative analysis is carried out on Adhoc On-demand Distance Vector (AODV) and Destination Sequenced distance Vector (DSDV) protocols using NS2 simulator. The Throughput of generating and receiving packets, Jitter on sending and receiving side and End to end delay are the common parameters used for the comparison.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128906704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Trans receiving multimedia using Raspberry-Pi 使用树莓派传输接收多媒体
A. Razaque, Sai Subramanya Vamsi Chavali, Sundeep Goud Malkapuram, S. Nadimpalli, Suharsha Vommina, Dinesh Kumar Atukuri, Vamsee Sai Malllapu
Internet of things (IOT) can be considered as a combination of effective hardware and impressive software which results in smart objects which are able to communicate and interact among themselves. However, data flow accuracy between two movable devices is a growing problem. This paper proposes and implements two approaches: Discrete Cosine Transfer (DCT) and Inter-Process Communication (IPC) for maintaining stable communication. In our proposed approach, we use a movable semi-autonomous robot that travels to remote places in order to transmit and receive the information. The Receiving and transmitting process is handled using an IPC. The IPC is supported by using network layers that provide accurate interaction between multiple objects. DCT helps save bandwidth by compressing the technique when the IPC is initiating the communication process. The DCT involves in compressing the data and converting it into sin and cos signals. Our proposed approaches, DCT and IPC, are implemented using the Python platform. Our proposed approaches deployed on robots could improve accuracy and reduce bandwidth consumption that will help in military and coal mining applications.
物联网(IOT)可以被认为是有效的硬件和令人印象深刻的软件的组合,从而产生能够相互通信和交互的智能对象。然而,两个可移动设备之间的数据流准确性是一个日益严重的问题。本文提出并实现了离散余弦传输(DCT)和进程间通信(IPC)两种保持稳定通信的方法。在我们提出的方法中,我们使用一个可移动的半自主机器人,它可以移动到偏远的地方来传输和接收信息。接收和发送过程使用IPC进行处理。IPC通过使用网络层来支持,这些网络层提供了多个对象之间的精确交互。当IPC启动通信过程时,DCT通过压缩技术帮助节省带宽。DCT包括压缩数据并将其转换成正弦和余弦信号。我们提出的DCT和IPC方法是使用Python平台实现的。我们提出的方法部署在机器人上可以提高精度并减少带宽消耗,这将有助于军事和煤矿开采应用。
{"title":"Trans receiving multimedia using Raspberry-Pi","authors":"A. Razaque, Sai Subramanya Vamsi Chavali, Sundeep Goud Malkapuram, S. Nadimpalli, Suharsha Vommina, Dinesh Kumar Atukuri, Vamsee Sai Malllapu","doi":"10.1109/ICEEOT.2016.7755019","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755019","url":null,"abstract":"Internet of things (IOT) can be considered as a combination of effective hardware and impressive software which results in smart objects which are able to communicate and interact among themselves. However, data flow accuracy between two movable devices is a growing problem. This paper proposes and implements two approaches: Discrete Cosine Transfer (DCT) and Inter-Process Communication (IPC) for maintaining stable communication. In our proposed approach, we use a movable semi-autonomous robot that travels to remote places in order to transmit and receive the information. The Receiving and transmitting process is handled using an IPC. The IPC is supported by using network layers that provide accurate interaction between multiple objects. DCT helps save bandwidth by compressing the technique when the IPC is initiating the communication process. The DCT involves in compressing the data and converting it into sin and cos signals. Our proposed approaches, DCT and IPC, are implemented using the Python platform. Our proposed approaches deployed on robots could improve accuracy and reduce bandwidth consumption that will help in military and coal mining applications.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124264508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A survey of document clustering using semantic approach 基于语义方法的文档聚类研究综述
Nagma Y. Saiyad, H. Prajapati, V. Dabhi
Document clustering is the application of cluster analysis to textual documents. It is commonly used technique in data mining, information retrieval, knowledge discovery from data, pattern recognition, etc. In traditional document clustering, a document is considered as a bag of words; where semantic meaning of word is not taken into consideration. However, to achieve accurate document clustering, feature such as meanings of the words is important. Document clustering can be done using semantic approach because it takes semantic relationship among words into account. This paper highlights the problems in traditional approach as well as semantic approach. This paper identifies four major areas under semantic clustering and presents a survey of 23 papers that are studied, covering major significant work. Moreover, this paper also provides a survey of tools specifically used for text processing, and clustering algorithms, that help in applying and evaluating document clustering. The presented survey is used in preparing the proposed work in the same direction. This proposed work uses the sense of a word for text clustering system. Lexical chains will be used as features that are to be developed using the identity/synonymy relation from WordNet ontology as background knowledge. Later, clustering will be done using the lexical chains.
文档聚类是聚类分析在文本文档中的应用。它是数据挖掘、信息检索、从数据中发现知识、模式识别等领域的常用技术。在传统的文档聚类中,一个文档被认为是一个词包;不考虑词的语义。然而,为了实现准确的文档聚类,单词的含义等特征是很重要的。由于语义方法考虑了词之间的语义关系,因此可以使用语义方法实现文档聚类。本文着重指出了传统方法和语义方法存在的问题。本文确定了语义聚类的四个主要领域,并介绍了23篇研究论文的综述,涵盖了主要的重要工作。此外,本文还概述了专门用于文本处理的工具和聚类算法,这些工具和算法有助于应用和评估文档聚类。所提出的调查是用来准备同一方向的拟议工作的。本文提出了一种基于词的文本聚类系统。词汇链将被用作使用WordNet本体中的身份/同义词关系作为背景知识来开发的特征。稍后,将使用词法链完成集群。
{"title":"A survey of document clustering using semantic approach","authors":"Nagma Y. Saiyad, H. Prajapati, V. Dabhi","doi":"10.1109/ICEEOT.2016.7755154","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755154","url":null,"abstract":"Document clustering is the application of cluster analysis to textual documents. It is commonly used technique in data mining, information retrieval, knowledge discovery from data, pattern recognition, etc. In traditional document clustering, a document is considered as a bag of words; where semantic meaning of word is not taken into consideration. However, to achieve accurate document clustering, feature such as meanings of the words is important. Document clustering can be done using semantic approach because it takes semantic relationship among words into account. This paper highlights the problems in traditional approach as well as semantic approach. This paper identifies four major areas under semantic clustering and presents a survey of 23 papers that are studied, covering major significant work. Moreover, this paper also provides a survey of tools specifically used for text processing, and clustering algorithms, that help in applying and evaluating document clustering. The presented survey is used in preparing the proposed work in the same direction. This proposed work uses the sense of a word for text clustering system. Lexical chains will be used as features that are to be developed using the identity/synonymy relation from WordNet ontology as background knowledge. Later, clustering will be done using the lexical chains.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116888034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Topology generators for Software Defined Network testing 用于软件定义网络测试的拓扑生成器
S. Nandi
Software Defined Networking (SDN) is the potential future backbone of all computer networking. The main advantage of SDN is that it separates the control plane from the data plane. This delegates switching/routing decisions to a controller that is connected to the switches. The connectivity of the switches and controllers can be represented as a network topology. Usually a network topology has to be developed manually by hand before it can be imported to a simulator/emulator (like Mininet) for testing and evaluation. To ease this tedious problem, two topology generators have been proposed and implemented in Mininet. The first is a random topology generator based on the Erdös-Rényi model and the second is a generator that uses a SNAP format dataset to build the topology. Both the generators have been tested by generating large-scale topologies and they have been found to be working as desired.
软件定义网络(SDN)是未来所有计算机网络的潜在支柱。SDN的主要优点是它将控制平面与数据平面分开。这将交换/路由决策委托给连接到交换机的控制器。交换机和控制器的连通性可以表示为网络拓扑结构。通常,在将网络拓扑导入模拟器(如Mininet)进行测试和评估之前,必须手工开发网络拓扑。为了简化这个繁琐的问题,Mininet提出并实现了两个拓扑生成器。第一个是基于Erdös-Rényi模型的随机拓扑生成器,第二个是使用SNAP格式数据集构建拓扑的生成器。这两种生成器都通过生成大规模拓扑进行了测试,并发现它们可以按预期工作。
{"title":"Topology generators for Software Defined Network testing","authors":"S. Nandi","doi":"10.1109/ICEEOT.2016.7755247","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755247","url":null,"abstract":"Software Defined Networking (SDN) is the potential future backbone of all computer networking. The main advantage of SDN is that it separates the control plane from the data plane. This delegates switching/routing decisions to a controller that is connected to the switches. The connectivity of the switches and controllers can be represented as a network topology. Usually a network topology has to be developed manually by hand before it can be imported to a simulator/emulator (like Mininet) for testing and evaluation. To ease this tedious problem, two topology generators have been proposed and implemented in Mininet. The first is a random topology generator based on the Erdös-Rényi model and the second is a generator that uses a SNAP format dataset to build the topology. Both the generators have been tested by generating large-scale topologies and they have been found to be working as desired.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"475 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122050204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A survey on Iris recognition system 虹膜识别系统综述
Sandeep Patil, Shreya Gudasalamani, N. Iyer
Biometrics recognition is the use of physiological and behavioral traits to identify an individual. Many biometric traits have been developed and are being used to authenticate the person's identity. Iris recognition system are widely used and have been proved to be efficient at individual recognition with high accuracy and nearly perfect matching. The Iris feature of two eyes of same person are not similar making it more secured way of authentication compared to other Biometric recognition systems. This paper provides a review of various methods and algorithms used by authors and their effect on performance of Iris recognition system along with identification of gap for future work. This paper also briefs about the publicly available Iris database for experimenting and researches.
生物特征识别是利用生理和行为特征来识别个体。许多生物特征已经被开发出来,并被用来验证人的身份。虹膜识别系统被广泛应用于个体识别,具有较高的识别精度和近乎完美的匹配。同一个人的两只眼睛的虹膜特征不相似,使其比其他生物识别系统更安全的身份验证方式。本文综述了作者使用的各种方法和算法,以及它们对虹膜识别系统性能的影响,并为今后的工作提供了识别缺口的方法和算法。本文还简要介绍了可供实验和研究的公开Iris数据库。
{"title":"A survey on Iris recognition system","authors":"Sandeep Patil, Shreya Gudasalamani, N. Iyer","doi":"10.1109/ICEEOT.2016.7755084","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755084","url":null,"abstract":"Biometrics recognition is the use of physiological and behavioral traits to identify an individual. Many biometric traits have been developed and are being used to authenticate the person's identity. Iris recognition system are widely used and have been proved to be efficient at individual recognition with high accuracy and nearly perfect matching. The Iris feature of two eyes of same person are not similar making it more secured way of authentication compared to other Biometric recognition systems. This paper provides a review of various methods and algorithms used by authors and their effect on performance of Iris recognition system along with identification of gap for future work. This paper also briefs about the publicly available Iris database for experimenting and researches.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125950285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Sensorless speed control of Brushless DC Motor using fuzzy controller 基于模糊控制器的无刷直流电动机无传感器速度控制
J. S. Rao, G. R. Kumar, O. Sekhar
This paper proposes a fuzzy controlled integrated speed - Sensorless approach for the speed control of Brushless DC Motor (BLDCM). This speed sensorless approach employs a load observer to estimate the disturbed load torque, and thus develops a speed sensorless algorithm. For the load observer, the inputs are mechanical rotor inertia constant and the friction coefficient, which are estimated using the recursive least-square rule. Thus this approach is insensitive to motor parameter variations and integrated drift problem. The proposed algorithm is simple when compared to extended Kalman filter in estimating the speed. A comparison is made among fuzzy controller, modified model reference adaptive control and PI controller. It is found that the fuzzy controller has superior performance over other two controllers. The proposed scheme is simulated using MATLAB/Simulink.
针对无刷直流电动机的速度控制问题,提出了一种模糊控制无速度传感器集成控制方法。这种无速度传感器的方法采用负载观测器来估计受干扰的负载转矩,从而发展了一种无速度传感器的算法。载荷观测器的输入是机械转子惯量常数和摩擦系数,采用递推最小二乘法估计。因此,该方法对电机参数变化和积分漂移问题不敏感。与扩展卡尔曼滤波相比,该算法在估计速度方面简单。对模糊控制器、修正模型参考自适应控制和PI控制器进行了比较。结果表明,模糊控制器的性能优于其他两种控制器。采用MATLAB/Simulink对该方案进行了仿真。
{"title":"Sensorless speed control of Brushless DC Motor using fuzzy controller","authors":"J. S. Rao, G. R. Kumar, O. Sekhar","doi":"10.1109/ICEEOT.2016.7755483","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755483","url":null,"abstract":"This paper proposes a fuzzy controlled integrated speed - Sensorless approach for the speed control of Brushless DC Motor (BLDCM). This speed sensorless approach employs a load observer to estimate the disturbed load torque, and thus develops a speed sensorless algorithm. For the load observer, the inputs are mechanical rotor inertia constant and the friction coefficient, which are estimated using the recursive least-square rule. Thus this approach is insensitive to motor parameter variations and integrated drift problem. The proposed algorithm is simple when compared to extended Kalman filter in estimating the speed. A comparison is made among fuzzy controller, modified model reference adaptive control and PI controller. It is found that the fuzzy controller has superior performance over other two controllers. The proposed scheme is simulated using MATLAB/Simulink.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128525465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
FPGA based hardware implementation of AES Rijndael algorithm for Encryption and Decryption 基于FPGA的AES Rijndael加解密算法硬件实现
N. S. Sai Srinivas, Md Akramuddin
AES algorithm or Rijndael algorithm is a network security algorithm which is most commonly used in all types of wired and wireless digital communication networks for secure transmission of data between two end users, especially over a public network. This paper presents the hardware implementation of AES Rijndael Encryption and Decryption Algorithm by using Xilinx Virtex-7 FPGA. The hardware design approach is entirely based on pre-calculated look-up tables (LUTs) which results in less complex architecture, thereby providing high throughput and low latency. There are basically three different formats in AES. They are AES-128, AES-192 and AES-256. The encryption and decryption blocks of all the three formats are efficiently designed by using Verilog-HDL and are synthesized on Virtex-7 XC7VX690T chip (Target Device) with the help of Xilinx ISE Design Suite-14.7 Tool. The synthesis tool was set to optimize speed, area and power. The power analysis is made by using Xilinx XPower Analyzer. Pre-calculated LUTs are used for the implementation of algorithmic functions, namely S-Box and Inverse S-Box transformations and also for GF (28) i.e. Galois Field Multiplications involved in Mix-Columns and Inverse Mix-Columns transformations. The proposed architecture is found to be having good efficiency in terms of latency, throughput, speed/delay, area and power.
AES算法或Rijndael算法是一种网络安全算法,最常用于所有类型的有线和无线数字通信网络,用于两个最终用户之间的数据安全传输,特别是在公共网络上。本文利用Xilinx Virtex-7 FPGA实现了AES Rijndael加解密算法的硬件实现。硬件设计方法完全基于预先计算的查找表(lut),从而降低了体系结构的复杂性,从而提供了高吞吐量和低延迟。AES基本上有三种不同的格式。它们是AES-128、AES-192和AES-256。三种格式的加解密块均采用Verilog-HDL高效设计,并借助Xilinx ISE Design Suite-14.7 Tool在Virtex-7 XC7VX690T芯片(Target Device)上进行合成。对合成工具进行了速度、面积和功率优化。功率分析采用Xilinx XPower分析仪进行。预先计算的lut用于实现算法函数,即S-Box变换和逆S-Box变换,也用于GF(28),即混合列变换和逆混合列变换中涉及的伽罗瓦域乘法。所提出的架构在延迟、吞吐量、速度/延迟、面积和功耗方面具有良好的效率。
{"title":"FPGA based hardware implementation of AES Rijndael algorithm for Encryption and Decryption","authors":"N. S. Sai Srinivas, Md Akramuddin","doi":"10.1109/ICEEOT.2016.7754990","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7754990","url":null,"abstract":"AES algorithm or Rijndael algorithm is a network security algorithm which is most commonly used in all types of wired and wireless digital communication networks for secure transmission of data between two end users, especially over a public network. This paper presents the hardware implementation of AES Rijndael Encryption and Decryption Algorithm by using Xilinx Virtex-7 FPGA. The hardware design approach is entirely based on pre-calculated look-up tables (LUTs) which results in less complex architecture, thereby providing high throughput and low latency. There are basically three different formats in AES. They are AES-128, AES-192 and AES-256. The encryption and decryption blocks of all the three formats are efficiently designed by using Verilog-HDL and are synthesized on Virtex-7 XC7VX690T chip (Target Device) with the help of Xilinx ISE Design Suite-14.7 Tool. The synthesis tool was set to optimize speed, area and power. The power analysis is made by using Xilinx XPower Analyzer. Pre-calculated LUTs are used for the implementation of algorithmic functions, namely S-Box and Inverse S-Box transformations and also for GF (28) i.e. Galois Field Multiplications involved in Mix-Columns and Inverse Mix-Columns transformations. The proposed architecture is found to be having good efficiency in terms of latency, throughput, speed/delay, area and power.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128282402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Flexural behavior of reinforced geopolymer concrete beams 钢筋地聚合物混凝土梁的受弯性能
Aslam Hutagi, R. Khadiranaikar
The present investigation embodies the flexural behavior of Geopolymer Concrete (GPC) beams cured under ambient temperature. Twelve reinforced concrete beams of size 175mm × 250 mm × 1500 mm were tested. The beams were tested under four point bending over an effective span of 1200mm. The percentage of tensile reinforcement and compressive strength of concrete were taken as the variables while maintaining the same cross section. The behavior was studied with reference to first crack load, service load and ultimate load. The results were found to be similar to that of conventional cement concrete reinforced beams.
本研究体现了地聚合物混凝土(GPC)梁在环境温度下的弯曲行为。试验了12根尺寸为175mm × 250mm × 1500mm的钢筋混凝土梁。梁在四点弯曲下进行了测试,有效跨度为1200mm。在保持截面不变的情况下,以混凝土抗拉配筋率和抗压强度为变量。参考初裂荷载、使用荷载和极限荷载对其性能进行了研究。结果发现与传统水泥混凝土加固梁相似。
{"title":"Flexural behavior of reinforced geopolymer concrete beams","authors":"Aslam Hutagi, R. Khadiranaikar","doi":"10.1109/ICEEOT.2016.7755347","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755347","url":null,"abstract":"The present investigation embodies the flexural behavior of Geopolymer Concrete (GPC) beams cured under ambient temperature. Twelve reinforced concrete beams of size 175mm × 250 mm × 1500 mm were tested. The beams were tested under four point bending over an effective span of 1200mm. The percentage of tensile reinforcement and compressive strength of concrete were taken as the variables while maintaining the same cross section. The behavior was studied with reference to first crack load, service load and ultimate load. The results were found to be similar to that of conventional cement concrete reinforced beams.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128675435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Detection as well as removal of black hole and gray hole attack in MANET 无线局域网中黑洞和灰洞攻击的检测与消除
N. Sharma, A. Bisen
A lot of mobile network works in today network Mobile Ad-hoc Network is a special kind of network which works on variable (not fixed) networks. Due to dynamic characteristics and addictive functionality, these are suffers from various types of attacks. Black-hole and gray-hole attack is one type of attack which harms and attacks on MANET. In this attack the malicious (unwanted node) distract the data packets that it feels is having shortest and the freshest route to the destination node so sender forwards all the data packets to it. After receiving the data packets, it drops them to create a Denial of service attack or processes to extract information from the packet. In this paper a technique is being proposed for detection of the black-hole or malicious node. In this technique, a new procedure a kind of trap method is added in AODV protocol for the detection of malicious nodes. When the Black-hole node is detected after that an alarming method is triggered to make other nodes aware of malicious nodes.
移动自组网是一种工作在可变(非固定)网络上的特殊网络。由于动态特性和令人上瘾的功能,它们遭受各种类型的攻击。黑洞和灰洞攻击是一种危害和攻击无线局域网的攻击方式。在这种攻击中,恶意(不需要的节点)分散它认为具有最短和最新路由的数据包到目标节点,因此发送方将所有数据包转发给它。接收到数据包后,将其丢弃,以创建拒绝服务攻击或从数据包中提取信息的进程。本文提出了一种检测黑洞或恶意节点的技术。该技术在AODV协议中增加了一种新的过程——陷阱方法,用于检测恶意节点。当检测到黑洞节点后,触发告警方法,使其他节点意识到恶意节点。
{"title":"Detection as well as removal of black hole and gray hole attack in MANET","authors":"N. Sharma, A. Bisen","doi":"10.1109/ICEEOT.2016.7755409","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755409","url":null,"abstract":"A lot of mobile network works in today network Mobile Ad-hoc Network is a special kind of network which works on variable (not fixed) networks. Due to dynamic characteristics and addictive functionality, these are suffers from various types of attacks. Black-hole and gray-hole attack is one type of attack which harms and attacks on MANET. In this attack the malicious (unwanted node) distract the data packets that it feels is having shortest and the freshest route to the destination node so sender forwards all the data packets to it. After receiving the data packets, it drops them to create a Denial of service attack or processes to extract information from the packet. In this paper a technique is being proposed for detection of the black-hole or malicious node. In this technique, a new procedure a kind of trap method is added in AODV protocol for the detection of malicious nodes. When the Black-hole node is detected after that an alarming method is triggered to make other nodes aware of malicious nodes.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132993033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Detection of blood cancer in microscopic images of human blood samples: A review 人类血液样本显微图像中血癌的检测:综述
M. Saritha, B. Prakash, K. Sukesh, B. Shrinivas
For the fast and cost effective production of patient diagnosis, various image processing techniques or software has been developed to get desired information from medical images. Acute Lymphoblastic Leukemia (ALL) is a type of leukemia which is more common in children. The term `Acute' means that leukemia can progress quickly and if not treated may lead to fatal death within few months. Due to its non specific nature of the symptoms and signs of ALL leads wrong diagnosis. Even hematologist finds it difficult to classify the leukemia cells, there manual classification of blood cells is not only time consuming but also inaccurate. Therefore, early identification of leukemia yields in providing the appropriate treatment to the patient. As a solution to this problem the system propose individuates in the blood image the leucocytes from the blood cells, and then it selects the lymphocyte cells. It evaluates morphological index from those cells and finally it classifies the presence of leukemia. In this paper a literature review is been conducted on various techniques used for detecting cancer cells.
为了快速、经济地进行患者诊断,人们开发了各种图像处理技术或软件,以从医学图像中获得所需的信息。急性淋巴细胞白血病(ALL)是一种常见于儿童的白血病。“急性”一词意味着白血病可以迅速发展,如果不治疗,可能会在几个月内导致致命的死亡。由于ALL的症状和体征的非特异性导致误诊。即使是血液学家也很难对白血病细胞进行分类,手工对血细胞进行分类不仅耗时而且不准确。因此,白血病的早期识别有助于为患者提供适当的治疗。为了解决这一问题,该系统提出在血液图像中从血液细胞中分离出白细胞,然后再选择淋巴细胞。对这些细胞的形态学指标进行评估,最后对白血病的存在进行分类。本文对用于检测癌细胞的各种技术进行了文献综述。
{"title":"Detection of blood cancer in microscopic images of human blood samples: A review","authors":"M. Saritha, B. Prakash, K. Sukesh, B. Shrinivas","doi":"10.1109/ICEEOT.2016.7754751","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7754751","url":null,"abstract":"For the fast and cost effective production of patient diagnosis, various image processing techniques or software has been developed to get desired information from medical images. Acute Lymphoblastic Leukemia (ALL) is a type of leukemia which is more common in children. The term `Acute' means that leukemia can progress quickly and if not treated may lead to fatal death within few months. Due to its non specific nature of the symptoms and signs of ALL leads wrong diagnosis. Even hematologist finds it difficult to classify the leukemia cells, there manual classification of blood cells is not only time consuming but also inaccurate. Therefore, early identification of leukemia yields in providing the appropriate treatment to the patient. As a solution to this problem the system propose individuates in the blood image the leucocytes from the blood cells, and then it selects the lymphocyte cells. It evaluates morphological index from those cells and finally it classifies the presence of leukemia. In this paper a literature review is been conducted on various techniques used for detecting cancer cells.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132144040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1