This paper presents the rigorous analysis of electric and magnetic field of 1200 KV, AC transmission line, India's most prestigious forthcoming project. The analysis has been carried out using MATLAB software for both proposed single circuit horizontal configuration and double circuit vertical configuration. Electric and Magnetic fields at power frequency are analyzed for various scenarios like varying height of ground clearance of conductors, fields at ground level, four meter and eight meter above ground level. Magnetic fields at different line loadings are analyzed for both the circuits. These results are compared with standard limits of exposure to human beings published by International Commission for Non-ionizing Radiation Protection (ICNIRP) and IEEE to examine the safety. Purpose of this study is to provide factual information on electrical and magnetic characteristics of 1200 KV AC power line and its biological effects on people, animals and plants.
{"title":"Analysis of Electromagnetic Fields of 1200kV UHV-AC Transmission Lines","authors":"M. Unde, B. E. Kushare","doi":"10.1109/CICN.2013.126","DOIUrl":"https://doi.org/10.1109/CICN.2013.126","url":null,"abstract":"This paper presents the rigorous analysis of electric and magnetic field of 1200 KV, AC transmission line, India's most prestigious forthcoming project. The analysis has been carried out using MATLAB software for both proposed single circuit horizontal configuration and double circuit vertical configuration. Electric and Magnetic fields at power frequency are analyzed for various scenarios like varying height of ground clearance of conductors, fields at ground level, four meter and eight meter above ground level. Magnetic fields at different line loadings are analyzed for both the circuits. These results are compared with standard limits of exposure to human beings published by International Commission for Non-ionizing Radiation Protection (ICNIRP) and IEEE to examine the safety. Purpose of this study is to provide factual information on electrical and magnetic characteristics of 1200 KV AC power line and its biological effects on people, animals and plants.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128912200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper multiband E-Shaped fractal patch antenna with DGS (Defected Ground Structure) has been proposed. By applying the concept of fractal geometry on rectangular patch, self-similar E-Shaped structure has been obtained. Also, by using FR-4 epoxy (Fire Retardant-4) as substrate antenna resonates at 3.7 GHz, 6.7 GHz, 7.9 GHz and 8.7 GHz respectively with bandwidth 120 MHz, 495 MHz, 225 MHz and 315 MHz at corresponding frequencies. By inserting DGS in the proposed antenna the various parameters have been improved such as return loss, bandwidth and gain. Designing and simulation of this antenna has been done by the help of IE3D Software. The application of this antenna is to make it compatible with Satellite, Wi-Fi (Wireless Fidelity), Bluetooth, Cellular Phones and Radar etc.
{"title":"Multiband E-Shaped Fractal Microstrip Patch Antenna with DGS for Wireless Applications","authors":"Ajay Nagpal, Sukhwinder Singh Dillon, Anupama Marwaha","doi":"10.1109/CICN.2013.14","DOIUrl":"https://doi.org/10.1109/CICN.2013.14","url":null,"abstract":"In this paper multiband E-Shaped fractal patch antenna with DGS (Defected Ground Structure) has been proposed. By applying the concept of fractal geometry on rectangular patch, self-similar E-Shaped structure has been obtained. Also, by using FR-4 epoxy (Fire Retardant-4) as substrate antenna resonates at 3.7 GHz, 6.7 GHz, 7.9 GHz and 8.7 GHz respectively with bandwidth 120 MHz, 495 MHz, 225 MHz and 315 MHz at corresponding frequencies. By inserting DGS in the proposed antenna the various parameters have been improved such as return loss, bandwidth and gain. Designing and simulation of this antenna has been done by the help of IE3D Software. The application of this antenna is to make it compatible with Satellite, Wi-Fi (Wireless Fidelity), Bluetooth, Cellular Phones and Radar etc.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128615318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Through the research of EPA and MODBUS/TCP Industrial Ethernet technology, ARM embedded system and μC/OS-II real-time operating system, this paper designs and develops a communication gateway of EPA and MODBUS/TCP. The communication gateway can perform bidirectional data transceiving on EPA protocol and MODBUS/TCP protocol, which provides a secure, stable, real-time and flexible solution for process control of industrial field.
{"title":"Research and Application of Communication Gateway of EPA and MODBUS/TCP","authors":"Li Hui, Zhang Hao, Peng Daogang","doi":"10.1109/CICN.2013.44","DOIUrl":"https://doi.org/10.1109/CICN.2013.44","url":null,"abstract":"Through the research of EPA and MODBUS/TCP Industrial Ethernet technology, ARM embedded system and μC/OS-II real-time operating system, this paper designs and develops a communication gateway of EPA and MODBUS/TCP. The communication gateway can perform bidirectional data transceiving on EPA protocol and MODBUS/TCP protocol, which provides a secure, stable, real-time and flexible solution for process control of industrial field.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128510365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper is reviewed the state of research on the important topic in the field of information interchange that is identity based cryptography which more or less extention of the public key cryptography field. The paper starts with analyzing the fundamental concepts of identity based cryptography techniques, which includes encryption and the techniques of digital signature for authentication, which is called as identity based signature. Afterwards the paper continue its analyses on various techniques and applications of identity-based cryptography depends on the methods of bilinear pairing that is a computational ancient widely used to build up various identity based cryptography system in the current literature. Afterwards this paper reviewed the identity based encryption applications in the field of various networks as ad-hoc networks, mobile networks and other wireless networks in the current era. At the end of this paper, we discuss how realistic and under what parameters identity-based cryptography may be used in current and future environment with its benefits and limitations.
{"title":"Identity-Based Cryptography Techniques and Applications (A Review)","authors":"D. Anand, V. Khemchandani, R. Sharma","doi":"10.1109/CICN.2013.78","DOIUrl":"https://doi.org/10.1109/CICN.2013.78","url":null,"abstract":"This paper is reviewed the state of research on the important topic in the field of information interchange that is identity based cryptography which more or less extention of the public key cryptography field. The paper starts with analyzing the fundamental concepts of identity based cryptography techniques, which includes encryption and the techniques of digital signature for authentication, which is called as identity based signature. Afterwards the paper continue its analyses on various techniques and applications of identity-based cryptography depends on the methods of bilinear pairing that is a computational ancient widely used to build up various identity based cryptography system in the current literature. Afterwards this paper reviewed the identity based encryption applications in the field of various networks as ad-hoc networks, mobile networks and other wireless networks in the current era. At the end of this paper, we discuss how realistic and under what parameters identity-based cryptography may be used in current and future environment with its benefits and limitations.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"371 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115967780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A brief description about the ergonomic evaluation problems on the research subject of cockpit ergonomic evaluation theories and methods was made followed by the proposal of an aircraft cockpit ergonomic evaluation model based on the framework of model-predictive control. Repetitive decision making and feedback control made the model capable of handling constraints including physical limitations of aircraft dynamics as well as psychological and physiological limitations of flight crew. Active constraints which manifest limitations related to both human factors and cockpit ergonomic considerations can be determined by an optimization solver, in a real-time and quantitative manner. Such a model can be used to study the safety effect of flight due to pilot's human factors, and to guide safety design of aircraft. The model can also be used to locate the root of failure and its possibility caused by pilot's operate lapse in the human machine system, and then to compare the relative merits of various cockpit designs.
{"title":"Ergonomic Evaluation of Aircraft Cockpit Based on Model-Predictive Control","authors":"Yin Tangwen, Fu Shan","doi":"10.1109/CICN.2013.133","DOIUrl":"https://doi.org/10.1109/CICN.2013.133","url":null,"abstract":"A brief description about the ergonomic evaluation problems on the research subject of cockpit ergonomic evaluation theories and methods was made followed by the proposal of an aircraft cockpit ergonomic evaluation model based on the framework of model-predictive control. Repetitive decision making and feedback control made the model capable of handling constraints including physical limitations of aircraft dynamics as well as psychological and physiological limitations of flight crew. Active constraints which manifest limitations related to both human factors and cockpit ergonomic considerations can be determined by an optimization solver, in a real-time and quantitative manner. Such a model can be used to study the safety effect of flight due to pilot's human factors, and to guide safety design of aircraft. The model can also be used to locate the root of failure and its possibility caused by pilot's operate lapse in the human machine system, and then to compare the relative merits of various cockpit designs.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125668875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
By combining the most effective practices of Vitalization, Grid computing, utility computing and network technologies cloud computing is the resultant cost effective computing service delivery mechanism. This survey paper discusses prospect of cloud based Library Management System for cost effective library automation. Another important aspect of this survey work is analytic discussion on various open source library automation software. CYBRARIANTMTM an internet based integrated Library Automation and Management solution developed by CR2 Technologies Ltd is also included for the benefit of implementer.
{"title":"Library Automation in Cloud","authors":"D. G. Chandra, M. Kathing, D. Kumar","doi":"10.1109/CICN.2013.104","DOIUrl":"https://doi.org/10.1109/CICN.2013.104","url":null,"abstract":"By combining the most effective practices of Vitalization, Grid computing, utility computing and network technologies cloud computing is the resultant cost effective computing service delivery mechanism. This survey paper discusses prospect of cloud based Library Management System for cost effective library automation. Another important aspect of this survey work is analytic discussion on various open source library automation software. CYBRARIANTMTM an internet based integrated Library Automation and Management solution developed by CR2 Technologies Ltd is also included for the benefit of implementer.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126972347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing is a latest and fast growing technology that offers an innovative, efficient and scalable business model for organizations to adopt various information technology resources i.e. software, hardware, network, storage, bandwidth etc. Cloud Computing is a jargon term without a commonly accepted non-ambiguous scientific or technical definition. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. It has the capability to incorporate multiple internal and external cloud services together to provide high interoperability there can be multiple accounts associated with a single or multiple service provider (SPs). So, Security in terms of integrity is most important aspects in cloud computing environment. In this paper, a detailed analysis of the cloud security problem is presented. Also the different problem in a cloud computing system and their effect upon the different cloud users are analyzed. It is providing a comparably scalable, position independent. Low cost platform for client's data. Since cloud computing environment is constructed based on open Architecture and interface. Based on this analysis various computing system and their effect upon the system, upon organizations and also upon different cloud users are analyzed. It is providing a comparably scalable, position-independent, low cost platform for client's data. Since cloud computing environment is constructed based on open architecture and interface. Based on this analysis various researches have also presented a view of measures that can be taken to deal with the cloud security problem and prevention that must be taken into account by any organization and cloud users seeking investment in cloud computing.
{"title":"A New Technique of Data Integrity for Analysis of the Cloud Computing Security","authors":"R. Chalse, A. Selokar, A. Katara","doi":"10.1109/CICN.2013.103","DOIUrl":"https://doi.org/10.1109/CICN.2013.103","url":null,"abstract":"Cloud computing is a latest and fast growing technology that offers an innovative, efficient and scalable business model for organizations to adopt various information technology resources i.e. software, hardware, network, storage, bandwidth etc. Cloud Computing is a jargon term without a commonly accepted non-ambiguous scientific or technical definition. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. It has the capability to incorporate multiple internal and external cloud services together to provide high interoperability there can be multiple accounts associated with a single or multiple service provider (SPs). So, Security in terms of integrity is most important aspects in cloud computing environment. In this paper, a detailed analysis of the cloud security problem is presented. Also the different problem in a cloud computing system and their effect upon the different cloud users are analyzed. It is providing a comparably scalable, position independent. Low cost platform for client's data. Since cloud computing environment is constructed based on open Architecture and interface. Based on this analysis various computing system and their effect upon the system, upon organizations and also upon different cloud users are analyzed. It is providing a comparably scalable, position-independent, low cost platform for client's data. Since cloud computing environment is constructed based on open architecture and interface. Based on this analysis various researches have also presented a view of measures that can be taken to deal with the cloud security problem and prevention that must be taken into account by any organization and cloud users seeking investment in cloud computing.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128188290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Segmentation of anatomical regions of the medical imaging is a critical problem. In this paper, we propose effectiveness of soft computing techniques for segmenting medical imaging. This paper explores the possibility of applying techniques for segmenting the regions of medical image. We them compute the effectiveness of the applied techniques on medical imaging and compare their results from the database given on the web. We tested the results to calculate the effectiveness of the techniques used for segmenting the tumor region in brain images and digital mammogram images.
{"title":"Effectiveness of Soft Computing Techniques for Medical Imaging","authors":"Anamika Ahirwar, R. S. Jadon","doi":"10.1109/CICN.2013.76","DOIUrl":"https://doi.org/10.1109/CICN.2013.76","url":null,"abstract":"Segmentation of anatomical regions of the medical imaging is a critical problem. In this paper, we propose effectiveness of soft computing techniques for segmenting medical imaging. This paper explores the possibility of applying techniques for segmenting the regions of medical image. We them compute the effectiveness of the applied techniques on medical imaging and compare their results from the database given on the web. We tested the results to calculate the effectiveness of the techniques used for segmenting the tumor region in brain images and digital mammogram images.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122458913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Heart diseases, which are one of the death reasons, are among the several serious problems in this century and as per the latest survey, 60% of the patients die due to Heart problems. These diseases can be diagnosed by ECG (Electrocardiogram) signals. ECG measures electrical potentials on the body surface via contact electrodes thus it is very important signal in cardiology. Different artifacts affect the ECG signals which can thus cause problems in analyzing the ECG Thus signal processing schemes are applied to remove those interferences. The work proposed in this paper is removal of low frequency interference i.e. baseline wandering in ECG signal and digital filters are designed to remove it. The digital filters designed are FIR with different windowing methods as of Rectangular, Gaussian, Hamming, and Kaiser. The results obtained are at a low order of 56. The signals are taken from the MIT-BIH database which includes the normal and abnormal waveforms. The work has been done in MAT LAB environment where filters are designed in FDA Tool. The parameters are selected such that the noise is removed permanently. Also the best results are obtained at an order of 56 which makes hardware implementation easier. The result obtained for all FIR filters with different windows are compared by comparing the waveforms and power spectrums of the original and filtered ECG signals. The filters which gives the best results is the one using Kaiser Window.
{"title":"Design and Comparison of Digital Filters for Removal of Baseline Wandering from ECG Signal","authors":"R. Lakhwani, S. Ayub, J. Saini","doi":"10.1109/CICN.2013.48","DOIUrl":"https://doi.org/10.1109/CICN.2013.48","url":null,"abstract":"Heart diseases, which are one of the death reasons, are among the several serious problems in this century and as per the latest survey, 60% of the patients die due to Heart problems. These diseases can be diagnosed by ECG (Electrocardiogram) signals. ECG measures electrical potentials on the body surface via contact electrodes thus it is very important signal in cardiology. Different artifacts affect the ECG signals which can thus cause problems in analyzing the ECG Thus signal processing schemes are applied to remove those interferences. The work proposed in this paper is removal of low frequency interference i.e. baseline wandering in ECG signal and digital filters are designed to remove it. The digital filters designed are FIR with different windowing methods as of Rectangular, Gaussian, Hamming, and Kaiser. The results obtained are at a low order of 56. The signals are taken from the MIT-BIH database which includes the normal and abnormal waveforms. The work has been done in MAT LAB environment where filters are designed in FDA Tool. The parameters are selected such that the noise is removed permanently. Also the best results are obtained at an order of 56 which makes hardware implementation easier. The result obtained for all FIR filters with different windows are compared by comparing the waveforms and power spectrums of the original and filtered ECG signals. The filters which gives the best results is the one using Kaiser Window.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123291063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Feature selection and feature optimization play an important role in iris recognition system. Iris recognition system provide the great security flexibility for authentication and identification of genuine and imposters users. In this paper we proposed an optimized feature selection process for iris image template creation. The feature extraction process is performed by wavelet transform function and also modified the matching technique for iris recognition using multi-class SVM and ant colony optimization. Our empirical result evaluation shows that better performance of our proposed method in compression of hough tranform recognition technique.
{"title":"Improved Iris Recognition System Using Wavelet Transform and Ant Colony Optimization","authors":"V. Sharma, Sadhna K. Mishra, Deepika Dubey","doi":"10.1109/CICN.2013.58","DOIUrl":"https://doi.org/10.1109/CICN.2013.58","url":null,"abstract":"Feature selection and feature optimization play an important role in iris recognition system. Iris recognition system provide the great security flexibility for authentication and identification of genuine and imposters users. In this paper we proposed an optimized feature selection process for iris image template creation. The feature extraction process is performed by wavelet transform function and also modified the matching technique for iris recognition using multi-class SVM and ant colony optimization. Our empirical result evaluation shows that better performance of our proposed method in compression of hough tranform recognition technique.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"2000 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123549473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}