首页 > 最新文献

2019 Third International Conference on Inventive Systems and Control (ICISC)最新文献

英文 中文
Cryptography & Network Security Hash Function Applications, Attacks and Advances: A Review 密码学与网络安全哈希函数的应用、攻击与进展综述
Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036448
Arvind K Sharma, D. Mittal
Hash Functions have a distinct paramount significance in the sub domain of Networking like Network Security, Computer Security and Internet Security as compare to Symmetric and Public Key Encryption-Decryption Techniques. Major issues primarily which resolved by any hash algorithm are to managing the Integrity of Plaint-text Message(s) which are to be transmitting between communicating parties and to prove the Authenticity of Resources (Users/Machines), with digital signatures as well. Hash function also utilized for computing random secrect key of fixed length which further feeds to Symmetric and Public Key Cryptosystems in particular Key Management. Different level of security provided by different algorithms depending on how difficult is to break them. The most well-known hash algorithms are MD4, MD5, SHA, JH, Skein, Grøstl, Blake, Hamsi, Fugue, Crush, Whirlpool, Tav etc. In this paper we are discussing importance of hash functions, hash functions widely used in networking their application, literature and most importantly various Attacks applicable on hash functions and compression functions utilized by hash functions.
与对称和公钥加密-解密技术相比,哈希函数在网络安全、计算机安全和互联网安全等网络子领域具有明显的重要意义。任何散列算法主要解决的主要问题是管理在通信各方之间传输的明文消息的完整性,并证明资源(用户/机器)的真实性,以及数字签名。哈希函数还用于计算固定长度的随机密钥,并进一步提供给对称密钥和公钥密码系统,特别是密钥管理。不同的算法提供不同的安全级别,这取决于破解它们的难易程度。最著名的散列算法有MD4、MD5、SHA、JH、Skein、Grøstl、Blake、Hamsi、Fugue、Crush、Whirlpool、Tav等。本文讨论了哈希函数的重要性、哈希函数在网络中的广泛应用、文献以及最重要的是针对哈希函数的各种攻击和哈希函数所利用的压缩函数。
{"title":"Cryptography & Network Security Hash Function Applications, Attacks and Advances: A Review","authors":"Arvind K Sharma, D. Mittal","doi":"10.1109/ICISC44355.2019.9036448","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036448","url":null,"abstract":"Hash Functions have a distinct paramount significance in the sub domain of Networking like Network Security, Computer Security and Internet Security as compare to Symmetric and Public Key Encryption-Decryption Techniques. Major issues primarily which resolved by any hash algorithm are to managing the Integrity of Plaint-text Message(s) which are to be transmitting between communicating parties and to prove the Authenticity of Resources (Users/Machines), with digital signatures as well. Hash function also utilized for computing random secrect key of fixed length which further feeds to Symmetric and Public Key Cryptosystems in particular Key Management. Different level of security provided by different algorithms depending on how difficult is to break them. The most well-known hash algorithms are MD4, MD5, SHA, JH, Skein, Grøstl, Blake, Hamsi, Fugue, Crush, Whirlpool, Tav etc. In this paper we are discussing importance of hash functions, hash functions widely used in networking their application, literature and most importantly various Attacks applicable on hash functions and compression functions utilized by hash functions.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114801042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Maximize the Cloud Profit to Improved QoS in Cloud Computing: Design and Analysis 最大化云利润以改进云计算中的QoS:设计与分析
Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036421
Shivangi Dhariwal, Hemant Makwana
the cloud computing offers the efficient computation and the storage for providing the high performance computing. In this context the different job management schemes and scheduling techniques are implemented for improving the performance of cloud servers. Because the cloud servers are much costly it is required to utilize the maximum resources for gaining the profit from the cloud infrastructure. In order to perform this task two major cases are considered for providing the solution. First the server waiting for job and all the resources are free, secondly the job achieving their waiting time and rent the third party server temporarily. In this context for demonstrating the issues and challenges first the job allocation system is explained using the suitable algorithm steps. In further for improving the performance of the server three additional algorithms are implemented which computes the maximum possible profit on the basis of available server speed and size. The implementation of the proposed system is provided using the cloudsim simulation tool and with the help of JAVA technology. In addition of that the performance of the system is also identified in terms of net profit, optimal profit and the maximum profit. The proposed technique is found acceptable for the real world scenarios also.
云计算提供高效的计算和提供高性能计算的存储。在这种情况下,实现了不同的作业管理方案和调度技术,以提高云服务器的性能。由于云服务器非常昂贵,因此需要利用最大的资源从云基础设施中获得利润。为了执行此任务,考虑了提供解决方案的两种主要情况。首先,服务器在等待作业,所有的资源都是空闲的,其次,作业达到了他们的等待时间,临时租用第三方服务器。在这种情况下,为了演示问题和挑战,首先使用适当的算法步骤解释了作业分配系统。为了进一步提高服务器的性能,实现了基于可用服务器速度和大小计算最大可能利润的三个附加算法。利用cloudsim仿真工具和JAVA技术实现了该系统。此外,还从净利润、最优利润和最大利润三个方面确定了系统的性能。所提出的技术对于现实世界的场景也是可以接受的。
{"title":"Maximize the Cloud Profit to Improved QoS in Cloud Computing: Design and Analysis","authors":"Shivangi Dhariwal, Hemant Makwana","doi":"10.1109/ICISC44355.2019.9036421","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036421","url":null,"abstract":"the cloud computing offers the efficient computation and the storage for providing the high performance computing. In this context the different job management schemes and scheduling techniques are implemented for improving the performance of cloud servers. Because the cloud servers are much costly it is required to utilize the maximum resources for gaining the profit from the cloud infrastructure. In order to perform this task two major cases are considered for providing the solution. First the server waiting for job and all the resources are free, secondly the job achieving their waiting time and rent the third party server temporarily. In this context for demonstrating the issues and challenges first the job allocation system is explained using the suitable algorithm steps. In further for improving the performance of the server three additional algorithms are implemented which computes the maximum possible profit on the basis of available server speed and size. The implementation of the proposed system is provided using the cloudsim simulation tool and with the help of JAVA technology. In addition of that the performance of the system is also identified in terms of net profit, optimal profit and the maximum profit. The proposed technique is found acceptable for the real world scenarios also.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"195 Pt B 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116353040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparative study of classifier models for Crime Mitigation and Risk Modelling 减少犯罪和风险建模分类模型的比较研究
Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036416
Rakhi Gupta, Nashrah Gowalkar, S.D Joshi, S. Patil
Twitter sentiment analysis is an application of sentiment analysis on data from Twitter (tweets) for sentiment extraction. It automatically identifies whether a tweet expresses positive, negative or neutral opinion about and individual or an entity. The aim of this paper is to give detail explanation about the process of Crime mitigation by analyzing sentiment over the data generated by a social platform twitter using machine learning. This study focuses on a comparison done between, two classifier models, for data streamed from twitter. The paper then uses the comparative study for crime mitigation. Classification of sentiment can be done at various level. In our paper, the focus is on Feature level classification. [2]Risk analysis and profiling is then done on the predicted classes.
Twitter情感分析是情感分析在Twitter (tweets)数据上进行情感提取的一种应用。它会自动识别一条推文是否表达了对个人或实体的积极、消极或中立的观点。本文的目的是通过使用机器学习分析社交平台twitter生成的数据的情绪,详细解释犯罪减轻的过程。本研究的重点是对来自twitter的数据流的两个分类器模型进行比较。然后,本文将比较研究应用于犯罪减轻。情感的分类可以在不同的层次上进行。本文的重点是特征级分类。[2]然后对预测的类别进行风险分析和概况分析。
{"title":"Comparative study of classifier models for Crime Mitigation and Risk Modelling","authors":"Rakhi Gupta, Nashrah Gowalkar, S.D Joshi, S. Patil","doi":"10.1109/ICISC44355.2019.9036416","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036416","url":null,"abstract":"Twitter sentiment analysis is an application of sentiment analysis on data from Twitter (tweets) for sentiment extraction. It automatically identifies whether a tweet expresses positive, negative or neutral opinion about and individual or an entity. The aim of this paper is to give detail explanation about the process of Crime mitigation by analyzing sentiment over the data generated by a social platform twitter using machine learning. This study focuses on a comparison done between, two classifier models, for data streamed from twitter. The paper then uses the comparative study for crime mitigation. Classification of sentiment can be done at various level. In our paper, the focus is on Feature level classification. [2]Risk analysis and profiling is then done on the predicted classes.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121984374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anatomy of Big Iot Data analytics 剖析大物联网数据分析
Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036426
Sunil kumar Bidhan, Laxmi Ahuja, S. Khatri, S. Som
A large quantity of statistics is generated because of the explosive boom inside the wide variety of devices connected to the Internet of Things. However, such data large amount of data is not useful without the power of analytics. Different IOT, big data, and analytics have enable individuals to get significant understanding into vast measure of information produced by IoT gadgets. Nonetheless, these arrangements are still in their underlying state, and the area comes up short on a far reaching overview. The contribution of this paper is to purpose a five layer architecture for big IOT data. The functionality of five different layers of big IOT data architecture is explained. The opportunities for big IoT data architecture are discussed. Further more challenges face by the architecture are also explained.
由于连接到物联网的各种设备内部的爆炸式增长,产生了大量的统计数据。然而,如果没有分析的力量,这样大量的数据是没有用的。不同的物联网、大数据和分析使个人能够对物联网设备产生的大量信息有深刻的理解。尽管如此,这些安排仍处于基本状态,该领域还缺乏长远的概述。本文的贡献是为大物联网数据提供了一个五层架构。解释了大物联网数据架构的五个不同层的功能。讨论了大物联网数据架构的机遇。进一步说明了该体系结构面临的更多挑战。
{"title":"Anatomy of Big Iot Data analytics","authors":"Sunil kumar Bidhan, Laxmi Ahuja, S. Khatri, S. Som","doi":"10.1109/ICISC44355.2019.9036426","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036426","url":null,"abstract":"A large quantity of statistics is generated because of the explosive boom inside the wide variety of devices connected to the Internet of Things. However, such data large amount of data is not useful without the power of analytics. Different IOT, big data, and analytics have enable individuals to get significant understanding into vast measure of information produced by IoT gadgets. Nonetheless, these arrangements are still in their underlying state, and the area comes up short on a far reaching overview. The contribution of this paper is to purpose a five layer architecture for big IOT data. The functionality of five different layers of big IOT data architecture is explained. The opportunities for big IoT data architecture are discussed. Further more challenges face by the architecture are also explained.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129663935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Assessment on various Approaches for Content Based Image Retrieval 基于内容的图像检索方法的评价
Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036378
Navjot Kour, Smvdu Katra, N. Gondhi
Content Based Image retrieval(CBIR) has a important place in research field. This paper deals with the realization of different approaches used in image retrieval based on content. In CBIR, a query image is searched from larger database by selecting features from image and then exact match is retrieved using efficient algorithms. The various CBIR approaches are reviewed such as relevance feedback, SVM, graphs, wavelet transform, Gabor filter, Semantic templates, GMM, Fuzzy logic, Object ontology, Machine intelligence and Histogram. In this paper, the various graph theory algorithms used in CBIR have been discussed and compared viz. NN Graphs, Collocation Tree, Graphlets, Efficient Manifold Ranking, A* algorithm and segmentation algorithm.
基于内容的图像检索(CBIR)在研究领域占有重要地位。本文讨论了基于内容的图像检索方法的实现。在CBIR中,首先从较大的数据库中选择图像的特征,然后利用高效的算法对查询图像进行精确匹配。本文综述了相关反馈、支持向量机、图、小波变换、Gabor滤波、语义模板、GMM、模糊逻辑、对象本体、机器智能和直方图等各种CBIR方法。本文讨论和比较了用于CBIR的各种图论算法,即:NN图、搭配树、Graphlets、高效流形排序、A*算法和分割算法。
{"title":"Assessment on various Approaches for Content Based Image Retrieval","authors":"Navjot Kour, Smvdu Katra, N. Gondhi","doi":"10.1109/ICISC44355.2019.9036378","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036378","url":null,"abstract":"Content Based Image retrieval(CBIR) has a important place in research field. This paper deals with the realization of different approaches used in image retrieval based on content. In CBIR, a query image is searched from larger database by selecting features from image and then exact match is retrieved using efficient algorithms. The various CBIR approaches are reviewed such as relevance feedback, SVM, graphs, wavelet transform, Gabor filter, Semantic templates, GMM, Fuzzy logic, Object ontology, Machine intelligence and Histogram. In this paper, the various graph theory algorithms used in CBIR have been discussed and compared viz. NN Graphs, Collocation Tree, Graphlets, Efficient Manifold Ranking, A* algorithm and segmentation algorithm.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"02 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127192498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Secondary Cluster Head in Wireless Sensor Network 无线传感器网络中二次簇头性能分析
Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036468
Manjhari T., J. S. Kumar, Shabareeshwaran T.
In wireless sensor network (WSN) every node is capable of sense and monitor the parameters in various fields such as industry, agriculture, forest etc., and data forward to sink node in wireless. In WSN network lifetime and energy is key issue because all nodes operated in limited battery power and cannot be replaced easily. Energy efficient clustering technique can be used in order to give better network existence and low energy utilization. In this work, the Secondary Cluster Head (SCH) selected in the obtainable clustering system and performance was analyzed. A comparison among Low-Energy Adaptive Clustering Hierarchy (LEACH), Fuzzy C-Means and K-Means were done based on the amount of dead and alive nodes. The proposed method significantly extends the network lifetime and fuzzy C-means protocol performed well in terms of first and last dead nodes.
在无线传感器网络(WSN)中,每个节点都能够感知和监测工业、农业、森林等各个领域的参数,并将数据转发给无线汇聚节点。在无线传感器网络中,由于所有节点在有限的电池电量下运行,且不容易被替换,因此寿命和能量是关键问题。采用能量高效聚类技术可以获得较好的网络存在性和较低的能量利用率。本文分析了可获得的聚类系统中二级簇头(SCH)的选择及其性能。基于死节点和活节点的数量,对低能量自适应聚类层次(LEACH)、模糊C-Means和K-Means进行了比较。该方法显著延长了网络生存期,模糊c均值协议在首死节点和末死节点方面表现良好。
{"title":"Performance Analysis of Secondary Cluster Head in Wireless Sensor Network","authors":"Manjhari T., J. S. Kumar, Shabareeshwaran T.","doi":"10.1109/ICISC44355.2019.9036468","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036468","url":null,"abstract":"In wireless sensor network (WSN) every node is capable of sense and monitor the parameters in various fields such as industry, agriculture, forest etc., and data forward to sink node in wireless. In WSN network lifetime and energy is key issue because all nodes operated in limited battery power and cannot be replaced easily. Energy efficient clustering technique can be used in order to give better network existence and low energy utilization. In this work, the Secondary Cluster Head (SCH) selected in the obtainable clustering system and performance was analyzed. A comparison among Low-Energy Adaptive Clustering Hierarchy (LEACH), Fuzzy C-Means and K-Means were done based on the amount of dead and alive nodes. The proposed method significantly extends the network lifetime and fuzzy C-means protocol performed well in terms of first and last dead nodes.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"430 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132201364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Nature Inspired Approaches combined with Dynamic Learning to generate stable gait in Humanoids 结合动态学习的自然启发方法在类人机器人中生成稳定的步态
Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036461
Arya Rajiv Chaloli, Karthik Bhat, Vishwas N S
Conventional approaches to solving the Gait-Generation problem in humanoids are usually static in nature and are modeled based on a particular environment. These approaches can work well in a constrained context but fail to adapt to different environments. Hence turning our view and drawing inspiration from the various processes in nature, observing its principles and understanding the underlying concepts behind them, greatly improves our perspective in tackling this problem. There has been significant research in particular areas of such an approach yet the integration of these principles to form a wholesome approach has not been looked at with great detail. The approach taken intends to solve this problem and generate gait on a humanoid robot (the INDRA platform) by implementing a biologically inspired control approach called Central Pattern Generator (CPG) with neural oscillators. The parameters of the neural oscillator are tuned using Genetic algorithms and a policy is created to help the robot adapt to new environments of which there is no previous knowledge with the help of Reinforcement Learning. Therefore, this paper attempts to bring out a solution that combines multiple biologically derived approaches to generate a robust and stable gait.
解决人形机器人步态生成问题的传统方法通常是静态的,并且基于特定的环境进行建模。这些方法可以在受限的上下文中很好地工作,但不能适应不同的环境。因此,转变我们的观点,从自然界的各种过程中汲取灵感,观察其原理并理解其背后的潜在概念,将大大提高我们解决这一问题的视角。在这种方法的特定领域已经进行了大量的研究,但尚未非常详细地研究将这些原则结合起来形成一种有益的方法。所采取的方法旨在解决这一问题,并通过实现具有神经振荡器的称为中枢模式发生器(CPG)的生物启发控制方法,在人形机器人(INDRA平台)上生成步态。神经振荡器的参数使用遗传算法进行调整,并在强化学习的帮助下创建策略以帮助机器人适应以前没有知识的新环境。因此,本文试图提出一种结合多种生物衍生方法的解决方案,以产生稳健和稳定的步态。
{"title":"Nature Inspired Approaches combined with Dynamic Learning to generate stable gait in Humanoids","authors":"Arya Rajiv Chaloli, Karthik Bhat, Vishwas N S","doi":"10.1109/ICISC44355.2019.9036461","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036461","url":null,"abstract":"Conventional approaches to solving the Gait-Generation problem in humanoids are usually static in nature and are modeled based on a particular environment. These approaches can work well in a constrained context but fail to adapt to different environments. Hence turning our view and drawing inspiration from the various processes in nature, observing its principles and understanding the underlying concepts behind them, greatly improves our perspective in tackling this problem. There has been significant research in particular areas of such an approach yet the integration of these principles to form a wholesome approach has not been looked at with great detail. The approach taken intends to solve this problem and generate gait on a humanoid robot (the INDRA platform) by implementing a biologically inspired control approach called Central Pattern Generator (CPG) with neural oscillators. The parameters of the neural oscillator are tuned using Genetic algorithms and a policy is created to help the robot adapt to new environments of which there is no previous knowledge with the help of Reinforcement Learning. Therefore, this paper attempts to bring out a solution that combines multiple biologically derived approaches to generate a robust and stable gait.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125384694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Regulation of A DC Motor Using Second-Order Sliding Mode Strategies 基于二阶滑模策略的直流电机调节
Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036427
B. A. Reddy, D. Sowjanya
In classical boundary layer (First-order) SMC strategy, the tracking performance and robustness affected when this controller is designed to reduce chattering phenomenon. To improve this tracking performance higher order SMC strategies are preferred. In this paper, higher order smc algorithms are applied to regulate the armature control dc motor. These higher order sliding modes reduces the chattering without affecting tracking accuracy and robustness and also insensitive to disturbance. This higher-order SMC controller smoothens the control signal. This paper examine two different control algorithms related to second-order SMC, these are twisting and super twisting. The effectiveness of these control algorithms in regulating the speed and angular position of the DC motor is verified in simulation in MATLAB environment. The speed characteristics of DC motor under different initial conditions are shown in simulation using twisting and super twisting higher order SMC strategy.
在经典的边界层(一阶)SMC策略中,为了减少抖振现象而设计控制器会影响跟踪性能和鲁棒性。为了提高跟踪性能,高阶SMC策略是首选。本文将高阶smc算法应用于电枢控制直流电动机的调节。这些高阶滑动模式在不影响跟踪精度和鲁棒性的情况下减少了抖振,并且对干扰不敏感。该高阶SMC控制器对控制信号进行平滑处理。本文研究了与二阶SMC相关的两种不同的控制算法,即扭转和超扭转。在MATLAB环境下进行仿真,验证了这些控制算法对直流电动机速度和角位置调节的有效性。采用扭转和超扭转高阶SMC策略对不同初始条件下直流电动机的速度特性进行了仿真。
{"title":"Regulation of A DC Motor Using Second-Order Sliding Mode Strategies","authors":"B. A. Reddy, D. Sowjanya","doi":"10.1109/ICISC44355.2019.9036427","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036427","url":null,"abstract":"In classical boundary layer (First-order) SMC strategy, the tracking performance and robustness affected when this controller is designed to reduce chattering phenomenon. To improve this tracking performance higher order SMC strategies are preferred. In this paper, higher order smc algorithms are applied to regulate the armature control dc motor. These higher order sliding modes reduces the chattering without affecting tracking accuracy and robustness and also insensitive to disturbance. This higher-order SMC controller smoothens the control signal. This paper examine two different control algorithms related to second-order SMC, these are twisting and super twisting. The effectiveness of these control algorithms in regulating the speed and angular position of the DC motor is verified in simulation in MATLAB environment. The speed characteristics of DC motor under different initial conditions are shown in simulation using twisting and super twisting higher order SMC strategy.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126536256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Novel Approach For Detection Of Early Diabetic Retinopathy 早期糖尿病视网膜病变的新检测方法
Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036417
R. P, N. Mahakalkar, Tripty Singh
The early detection of Diabetic Retinopathy is necessary to prevent blindness. Retinal imaging is a common clinical procedure used to record the visualisation of the retina. The main difficulty in capturing the ocular fundus is image quality which is affected by medial opacities. Micro Aneurysms (MA) are the earliest clinical sign of Diabetic Retinopathy. The appearance and structure of blood vessels in retinal images are main problem in diagnosis of eye diseases. The detection of blood vessels is difficult in the automatic processing of retinal images. In proposed method, for segmentation of blood vessels, the contrast-limited adaptive histogram equalisation (CLAHE) is used along with canny edge technique for exact edge location. The method is tested on Digital Retinal Images for Vessel Extraction (DRIVE) database. Comparative results of all basic Edge detection techniques with respect to the quality metrics parameter such as energy, entropy, mean etc is analysed. It is noted that proposed method performs good in extracting the vascular pattern than traditional edge detection techniques.
早期发现糖尿病视网膜病变是预防失明的必要措施。视网膜成像是一种常用的临床程序,用于记录视网膜的可视化。眼底成像的主要困难是图像质量受内侧混浊的影响。微动脉瘤(MA)是糖尿病视网膜病变最早的临床体征。视网膜图像中血管的形态和结构是眼部疾病诊断的主要问题。在视网膜图像自动处理中,血管的检测是一个难点。该方法将对比度限制自适应直方图均衡化(CLAHE)与精细边缘技术相结合,实现血管的精确边缘定位。在数字视网膜图像血管提取(DRIVE)数据库上对该方法进行了测试。分析了各种基本边缘检测技术在能量、熵、均值等质量度量参数方面的比较结果。与传统的边缘检测技术相比,该方法具有更好的血管模式提取效果。
{"title":"Novel Approach For Detection Of Early Diabetic Retinopathy","authors":"R. P, N. Mahakalkar, Tripty Singh","doi":"10.1109/ICISC44355.2019.9036417","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036417","url":null,"abstract":"The early detection of Diabetic Retinopathy is necessary to prevent blindness. Retinal imaging is a common clinical procedure used to record the visualisation of the retina. The main difficulty in capturing the ocular fundus is image quality which is affected by medial opacities. Micro Aneurysms (MA) are the earliest clinical sign of Diabetic Retinopathy. The appearance and structure of blood vessels in retinal images are main problem in diagnosis of eye diseases. The detection of blood vessels is difficult in the automatic processing of retinal images. In proposed method, for segmentation of blood vessels, the contrast-limited adaptive histogram equalisation (CLAHE) is used along with canny edge technique for exact edge location. The method is tested on Digital Retinal Images for Vessel Extraction (DRIVE) database. Comparative results of all basic Edge detection techniques with respect to the quality metrics parameter such as energy, entropy, mean etc is analysed. It is noted that proposed method performs good in extracting the vascular pattern than traditional edge detection techniques.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124945798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effective Detection of Voice Dysfunction Using Glottic Flow Descriptors 声门流描述符对语音功能障碍的有效检测
Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036362
Girish Gidaye, J. Nirmal, Kadria Ezzine, M. Frikha
The presence of various vocal pathologies seriously affects the quality of the speech. These pathologies can treat better if they are diagnosed in primary stage. In this work, for early detection, we conceived non-intrusive automatic vocal fold pathologies recognition system. The sustained vowel /ah:/ with normal intonation for both healthy and pathologic subjects are extracted from PdA corpus. Glottal Inverse Filtering (GIF) is used to estimate glottal pulseform from frame of voiced speech signal. Various time and frequency domain descriptors are extracted from glottal pulseform and used for detection of voice disorder. For inverse filtering, Iterative Adaptive Inverse Filtering (IAIF) algorithm with Discrete All-Pole (DAP) model for vocal tract is used. The extracted descriptors are fed to classifier to separate healthy and pathologic subjects. The artificial neural network (ANN), support vector machine (SVM) and k-nearest neighbour (kNN) were used for classification. We have used box and density plots to investigate the discrimination ability of extracted glottal descriptors. To observe the discrimination ability of descriptors quantitatively, analysis of variance (ANOVA) and information gain feature scoring method is used. The time domain descriptors were found very rich in discrimination compared to frequency domain. The best classification rate achieved were 99.85%, 99.90% and 99.95% with kNN, SVM and ANN respectively.
各种声带病变的出现严重影响了说话的质量。这些病理如果在初级阶段被诊断出来,可以得到更好的治疗。在这项工作中,为了早期检测,我们设想了非侵入式声带病理自动识别系统。从PdA语料库中提取健康受试者和病理受试者正常语调的持续元音/ah:/。采用声门反滤波(GIF)技术对浊音信号帧进行声门脉冲波形估计。从声门脉冲波形中提取各种时域和频域描述符,用于检测语音紊乱。针对声道反滤波,采用离散全极(DAP)模型的迭代自适应反滤波(IAIF)算法。将提取的描述符输入到分类器中,以区分健康和病理受试者。采用人工神经网络(ANN)、支持向量机(SVM)和k近邻(kNN)进行分类。我们使用盒形图和密度图来研究提取的声门描述符的识别能力。为了定量观察描述符的识别能力,采用方差分析和信息增益特征评分方法。与频域描述符相比,时域描述符具有更强的识别能力。kNN、SVM和ANN的最佳分类率分别为99.85%、99.90%和99.95%。
{"title":"Effective Detection of Voice Dysfunction Using Glottic Flow Descriptors","authors":"Girish Gidaye, J. Nirmal, Kadria Ezzine, M. Frikha","doi":"10.1109/ICISC44355.2019.9036362","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036362","url":null,"abstract":"The presence of various vocal pathologies seriously affects the quality of the speech. These pathologies can treat better if they are diagnosed in primary stage. In this work, for early detection, we conceived non-intrusive automatic vocal fold pathologies recognition system. The sustained vowel /ah:/ with normal intonation for both healthy and pathologic subjects are extracted from PdA corpus. Glottal Inverse Filtering (GIF) is used to estimate glottal pulseform from frame of voiced speech signal. Various time and frequency domain descriptors are extracted from glottal pulseform and used for detection of voice disorder. For inverse filtering, Iterative Adaptive Inverse Filtering (IAIF) algorithm with Discrete All-Pole (DAP) model for vocal tract is used. The extracted descriptors are fed to classifier to separate healthy and pathologic subjects. The artificial neural network (ANN), support vector machine (SVM) and k-nearest neighbour (kNN) were used for classification. We have used box and density plots to investigate the discrimination ability of extracted glottal descriptors. To observe the discrimination ability of descriptors quantitatively, analysis of variance (ANOVA) and information gain feature scoring method is used. The time domain descriptors were found very rich in discrimination compared to frequency domain. The best classification rate achieved were 99.85%, 99.90% and 99.95% with kNN, SVM and ANN respectively.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"59 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114036980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 Third International Conference on Inventive Systems and Control (ICISC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1