Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019689
Arijit Ghosh, Satyaki Sen, C. Dey
Linguistic modelling of complex and nonlinear system constitutes to be the heart of many control and decision-making process. In this area, fuzzy logic is one of the most effective tools to build such linguistic models. Here, initially a fuzzy PI controller is designed with expert defined 49 rules to achieve desirable performance for a speed control system. Thereafter, a neuro-fuzzy controller is developed through back propagation training based on the input-output data set obtained from the previously designed fuzzy controller. Performance of the proposed neuro-fuzzy PI controller is tested through simulation study as well as real time experimentation on a DC servo speed control system. Both the simulation and experimental results substantiate the suitability of the designed neuro-fuzzy controller for closely approximating the behaviour of nonlinear fuzzy controller.
{"title":"Neuro-fuzzy design of a fuzzy PI controller with real-time implementation on a speed control system","authors":"Arijit Ghosh, Satyaki Sen, C. Dey","doi":"10.1109/IC3I.2014.7019689","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019689","url":null,"abstract":"Linguistic modelling of complex and nonlinear system constitutes to be the heart of many control and decision-making process. In this area, fuzzy logic is one of the most effective tools to build such linguistic models. Here, initially a fuzzy PI controller is designed with expert defined 49 rules to achieve desirable performance for a speed control system. Thereafter, a neuro-fuzzy controller is developed through back propagation training based on the input-output data set obtained from the previously designed fuzzy controller. Performance of the proposed neuro-fuzzy PI controller is tested through simulation study as well as real time experimentation on a DC servo speed control system. Both the simulation and experimental results substantiate the suitability of the designed neuro-fuzzy controller for closely approximating the behaviour of nonlinear fuzzy controller.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117242027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019737
A. Ranjan, Vijay Kumar, M. Hussain
TLS is the cryptographic protocol used in the internet. It consists of set of protocols which are used for negotiation of cryptographic parameters, encryption-decryption and reporting errors during the process. Security Analysis of any cryptographic protocol is very much needed to discover vulnerability and to evaluate its security properties. First we theoretically analysed the protocol using automated tool scyther and draw important conclusion. After that we have performed one real time experiment to identify the loopholes with TLS authentication. We gathered the data and prepared the record of it then we have analysed the reasons behind it and suggested some generic countermeasures to handle them. In this paper we intend to find out the loopholes of TLS and found that certificate forging could be considered as a loophole of TLS security mechanism and discovered its cause and proposed the countermeasures.
{"title":"Security analysis of TLS authentication","authors":"A. Ranjan, Vijay Kumar, M. Hussain","doi":"10.1109/IC3I.2014.7019737","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019737","url":null,"abstract":"TLS is the cryptographic protocol used in the internet. It consists of set of protocols which are used for negotiation of cryptographic parameters, encryption-decryption and reporting errors during the process. Security Analysis of any cryptographic protocol is very much needed to discover vulnerability and to evaluate its security properties. First we theoretically analysed the protocol using automated tool scyther and draw important conclusion. After that we have performed one real time experiment to identify the loopholes with TLS authentication. We gathered the data and prepared the record of it then we have analysed the reasons behind it and suggested some generic countermeasures to handle them. In this paper we intend to find out the loopholes of TLS and found that certificate forging could be considered as a loophole of TLS security mechanism and discovered its cause and proposed the countermeasures.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115134136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019581
Gourav Kumar Javeriya, Deepak Gupta, Shikha Gupta, A. Dahiya
In this paper we work on noise analysis on blocks of images. We introduced a technique through which we are observing the effect of noise on various blocks of an image. Finally we are resultant the maximum and minimum effect of noise. For the proposed work we are considering only Gaussian noise. PSNR and SNR values are calculated for images with and without blocks. Proposed work has been implemented on many images of same format. This paper is highly beneficial for reducing the noise to only those blocks which are highly affected instead of applying the process of noise removal on whole image. This can reduce the processing time highly on the cost of small considerable noise. Also, the another advantage of this approach is that in the real time system, the blocks of image having high value of noise can be determined and can be processed further leaving the blocks with the low values of noise. This can effectively reduce the processing time without applying an extra effort.
{"title":"Noise distribution on various blocks of image and their analysis","authors":"Gourav Kumar Javeriya, Deepak Gupta, Shikha Gupta, A. Dahiya","doi":"10.1109/IC3I.2014.7019581","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019581","url":null,"abstract":"In this paper we work on noise analysis on blocks of images. We introduced a technique through which we are observing the effect of noise on various blocks of an image. Finally we are resultant the maximum and minimum effect of noise. For the proposed work we are considering only Gaussian noise. PSNR and SNR values are calculated for images with and without blocks. Proposed work has been implemented on many images of same format. This paper is highly beneficial for reducing the noise to only those blocks which are highly affected instead of applying the process of noise removal on whole image. This can reduce the processing time highly on the cost of small considerable noise. Also, the another advantage of this approach is that in the real time system, the blocks of image having high value of noise can be determined and can be processed further leaving the blocks with the low values of noise. This can effectively reduce the processing time without applying an extra effort.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123350817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019648
B. N. Aravind, K. Suresh
Digital images gets degraded due to several reasons. The aim of denoising involves the restoration of signal to yield visually good quality representation. In this paper, we are referring to an image corrupted by additive Gaussian noise. The image is modeled as MRF and maximum-a-posteriori (MAP) estimate is obtained using graduated non-convexity technique. Results suggest that the proposed technique yields better compared to other techniques.
{"title":"MAP-MRF approach for image denoising","authors":"B. N. Aravind, K. Suresh","doi":"10.1109/IC3I.2014.7019648","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019648","url":null,"abstract":"Digital images gets degraded due to several reasons. The aim of denoising involves the restoration of signal to yield visually good quality representation. In this paper, we are referring to an image corrupted by additive Gaussian noise. The image is modeled as MRF and maximum-a-posteriori (MAP) estimate is obtained using graduated non-convexity technique. Results suggest that the proposed technique yields better compared to other techniques.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124802008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019786
M. T. Banday, Munis Khan
Registers within a processor, cache within, on, or outside the processor, and virtual memory on the disk drive builds memory hierarchy in modern computer systems. The principle of locality of reference makes this memory hierarchy work efficiently. In recent years, cache organizations and designs have witnessed several advances that have not only improved their performance such as hit rates, speed, latency, energy consumption, etc. but various new designs and organizations for chip multi-processors such as multilevel caches, Non-Uniform Cache Access (NUCA), hybrid caches, etc. have also emerged. This paper presents a study of current competing processors in terms of various factors determining performance and throughput of cache organization and design. To evaluate their performance and viability, it reviews recent cache trends that include hybrid cache memory, non-uniform cache architecture, energy efficient replacement algorithms, cache memory programming, software defined caches and emerging techniques for making cache reliable against soft errors. It discusses the pros and cons of emerging cache architectures and designs.
{"title":"A study of recent advances in cache memories","authors":"M. T. Banday, Munis Khan","doi":"10.1109/IC3I.2014.7019786","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019786","url":null,"abstract":"Registers within a processor, cache within, on, or outside the processor, and virtual memory on the disk drive builds memory hierarchy in modern computer systems. The principle of locality of reference makes this memory hierarchy work efficiently. In recent years, cache organizations and designs have witnessed several advances that have not only improved their performance such as hit rates, speed, latency, energy consumption, etc. but various new designs and organizations for chip multi-processors such as multilevel caches, Non-Uniform Cache Access (NUCA), hybrid caches, etc. have also emerged. This paper presents a study of current competing processors in terms of various factors determining performance and throughput of cache organization and design. To evaluate their performance and viability, it reviews recent cache trends that include hybrid cache memory, non-uniform cache architecture, energy efficient replacement algorithms, cache memory programming, software defined caches and emerging techniques for making cache reliable against soft errors. It discusses the pros and cons of emerging cache architectures and designs.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124890046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019760
J. Kurian, M. N. Upama Rajan, Shinoj K. Sukumaran
This paper introduces a flexible microstrip patch antenna using rubber as the substrate. The flexible antennas are gaining wide acceptance in the present scenario and these antennas play significant role in Wireless Body Area Network(WBAN) applications. The paper deals with the primary approach in using natural rubber and natural rubber with filler materials added as the substrate for patch antenna. The mechanical properties of the rubber makes the antenna flexible. The antenna operates in the ISM band(2.4-2.5) GHz. The ISM band is a candidate for WBAN operation.
{"title":"Flexible microstrip patch antenna using rubber substrate for WBAN applications","authors":"J. Kurian, M. N. Upama Rajan, Shinoj K. Sukumaran","doi":"10.1109/IC3I.2014.7019760","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019760","url":null,"abstract":"This paper introduces a flexible microstrip patch antenna using rubber as the substrate. The flexible antennas are gaining wide acceptance in the present scenario and these antennas play significant role in Wireless Body Area Network(WBAN) applications. The paper deals with the primary approach in using natural rubber and natural rubber with filler materials added as the substrate for patch antenna. The mechanical properties of the rubber makes the antenna flexible. The antenna operates in the ISM band(2.4-2.5) GHz. The ISM band is a candidate for WBAN operation.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124895572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019684
Rishabh Berlia, P. Santosh
The Mouse Brace is a convenient device that is capable of replacing the existing optical mouse. It consists of a wrist brace that houses the mouse circuitry. The Mouse Brace is a sensor based device that consists of an accelerometer and two flex sensors. The Mouse Brace is also an excellent solution to the Carpal Tunnel Syndrome that may be induced due to excessive computer usage.
{"title":"Mouse Brace: A convenient computer mouse using accelerometer, flex sensors and microcontroller","authors":"Rishabh Berlia, P. Santosh","doi":"10.1109/IC3I.2014.7019684","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019684","url":null,"abstract":"The Mouse Brace is a convenient device that is capable of replacing the existing optical mouse. It consists of a wrist brace that houses the mouse circuitry. The Mouse Brace is a sensor based device that consists of an accelerometer and two flex sensors. The Mouse Brace is also an excellent solution to the Carpal Tunnel Syndrome that may be induced due to excessive computer usage.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123149672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019783
Anjuli Garg, C. Rama Krishna
Cloud computing is a technology which computes the resources and delivered as a service over a network in virtual form. Cloud computing is a bigger and broad concept which allows people to access the services through the use of internet from various devices. It has rapidly gained the popularity and captures the IT industries, colleges and institutes in recent years. Due to its advanced service benefits, numbers of users are increasing day-by-day. Hence, the need of task scheduling in cloud is increasing. Task scheduling is done to allocate the tasks onto the resources effectively and efficiently. A number of scheduling algorithms have been developed till now. A good scheduling strategy has the capability to adapt to changing environment and type of tasks. In this paper, we proposed a meta-heuristic scheduling algorithm i.e. improved honey bees life scheduling algorithm for a public a cloud (IHBSLA). The new scheduling algorithm is simulated using Cloudsim toolkit. Experimental results showed that our proposed algorithm performs 50% better than honey bees life scheduling algorithm (HBLSA) in terms of cost.
{"title":"An improved honey bees life scheduling algorithm for a public cloud","authors":"Anjuli Garg, C. Rama Krishna","doi":"10.1109/IC3I.2014.7019783","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019783","url":null,"abstract":"Cloud computing is a technology which computes the resources and delivered as a service over a network in virtual form. Cloud computing is a bigger and broad concept which allows people to access the services through the use of internet from various devices. It has rapidly gained the popularity and captures the IT industries, colleges and institutes in recent years. Due to its advanced service benefits, numbers of users are increasing day-by-day. Hence, the need of task scheduling in cloud is increasing. Task scheduling is done to allocate the tasks onto the resources effectively and efficiently. A number of scheduling algorithms have been developed till now. A good scheduling strategy has the capability to adapt to changing environment and type of tasks. In this paper, we proposed a meta-heuristic scheduling algorithm i.e. improved honey bees life scheduling algorithm for a public a cloud (IHBSLA). The new scheduling algorithm is simulated using Cloudsim toolkit. Experimental results showed that our proposed algorithm performs 50% better than honey bees life scheduling algorithm (HBLSA) in terms of cost.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121766013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Motor imagery (MI) is a mental rehearsal of movement without any body movement. Brain-Computer Interface (BCI) uses MI in the neurological rehabilitation, especially in stroke rehabilitation to restore the patient's motor abilities. BCI based on MI translates the subjects motor intent into control signals to control the devices like robotic arms, wheelchairs or to navigate the virtual worlds. In this work, multichannel electroencephalogram (EEG) signals of imagination of a right hand and right foot movement is considered. Common spatial pattern (CSP) is used to estimate the spatial filters for the multi-channel EEG data. The spatial filters lead to weighting of the channel/electrodes according to their variance in discriminating the two tasks performed. Channels with the largest variance are considered as significant channels. A two-fold classification method using support vector machine (SVM) is used to classify the test signal into right hand movement and right foot movement. In the present work, the analysis conducted demonstrate that the proposed twofold classification scheme can achieve upto 94.2% of accuracy in discrimination of the two tasks performed. The high-recognition rate and computational simplicity make CSP a promising method for an EEG-based BCI.
{"title":"Twofold classification of motor imagery using common spatial pattern","authors":"Kusuma Mohanchandra, Snehanshu Saha, Rashmi Deshmukh","doi":"10.1109/IC3I.2014.7019636","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019636","url":null,"abstract":"Motor imagery (MI) is a mental rehearsal of movement without any body movement. Brain-Computer Interface (BCI) uses MI in the neurological rehabilitation, especially in stroke rehabilitation to restore the patient's motor abilities. BCI based on MI translates the subjects motor intent into control signals to control the devices like robotic arms, wheelchairs or to navigate the virtual worlds. In this work, multichannel electroencephalogram (EEG) signals of imagination of a right hand and right foot movement is considered. Common spatial pattern (CSP) is used to estimate the spatial filters for the multi-channel EEG data. The spatial filters lead to weighting of the channel/electrodes according to their variance in discriminating the two tasks performed. Channels with the largest variance are considered as significant channels. A two-fold classification method using support vector machine (SVM) is used to classify the test signal into right hand movement and right foot movement. In the present work, the analysis conducted demonstrate that the proposed twofold classification scheme can achieve upto 94.2% of accuracy in discrimination of the two tasks performed. The high-recognition rate and computational simplicity make CSP a promising method for an EEG-based BCI.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121860248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019616
C. S. Jamadagni, C. Chethan, Yv Jeppu, S. Kamble, Vijay Desai
This paper discusses an approach for system simulation of an autopilot system designed for a Bell helicopter model. The flight controls for the helicopter is designed in Matlab/Simulink and the same is visualized in X-Plane flight simulator. The approach involves software in loop simulation method where controls are designed in Matlab/Simulink and the responses are observed on X-Plane plant. The interaction between the Matlab/Simulink and X-Plane is through UDP. A parameter identification of the X-Plane model is carried out from data obtained through UDP. This simulation setup is a good way to learn the intricacies of systems development, plant identification and control.
{"title":"System simulation approach for helicopter autopilot","authors":"C. S. Jamadagni, C. Chethan, Yv Jeppu, S. Kamble, Vijay Desai","doi":"10.1109/IC3I.2014.7019616","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019616","url":null,"abstract":"This paper discusses an approach for system simulation of an autopilot system designed for a Bell helicopter model. The flight controls for the helicopter is designed in Matlab/Simulink and the same is visualized in X-Plane flight simulator. The approach involves software in loop simulation method where controls are designed in Matlab/Simulink and the responses are observed on X-Plane plant. The interaction between the Matlab/Simulink and X-Plane is through UDP. A parameter identification of the X-Plane model is carried out from data obtained through UDP. This simulation setup is a good way to learn the intricacies of systems development, plant identification and control.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122822445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}