Pub Date : 2016-03-18DOI: 10.1109/ICCPCT.2016.7530131
Anurag Choubey, Kakali Chatterjee
The earlier remote password authentication schemes required a service providing server to authenticate a legitimate user for remote login. However, the traditional schemes are not useful in multi-server architecture because of multiple user ids and passwords. In this paper, we present a remote password authentication scheme for multi-server architecture that can be robust and improved network security. This password authentication system is a trained classification system based on SVM. In this scheme, the users only remember own identity and password and own choices for the various server login which he filled during registration where the user can choose his password at will. Furthermore, this system does not require having any overhead of password or verification table and is very dynamic in nature and can also withstand the replay attack and masquerading.
{"title":"Secure remote user authentication for multi-server environment using machine learning technique","authors":"Anurag Choubey, Kakali Chatterjee","doi":"10.1109/ICCPCT.2016.7530131","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530131","url":null,"abstract":"The earlier remote password authentication schemes required a service providing server to authenticate a legitimate user for remote login. However, the traditional schemes are not useful in multi-server architecture because of multiple user ids and passwords. In this paper, we present a remote password authentication scheme for multi-server architecture that can be robust and improved network security. This password authentication system is a trained classification system based on SVM. In this scheme, the users only remember own identity and password and own choices for the various server login which he filled during registration where the user can choose his password at will. Furthermore, this system does not require having any overhead of password or verification table and is very dynamic in nature and can also withstand the replay attack and masquerading.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123510785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-18DOI: 10.1109/ICCPCT.2016.7530284
A. Manu, J. Patel, S. Akhtar, V. K. Agrawal, K. N. Bala Subramanya Murthy
In this work we attempt to present the Cloud PAAS security by realizing in terms of Docker container security, we make a deep dive of the PAAS security and also try to analyse, compare and contrast the PAAS Docker container security, with other container technologies, and also with Virtual machine security with and without Hypervisor, and current security level of Dockers container and In this work we extend our previous work on Docker container security and look into methodology of improving the Dockers container security using Multilateral balance security.
{"title":"A study, analysis and deep dive on cloud PAAS security in terms of Docker container security","authors":"A. Manu, J. Patel, S. Akhtar, V. K. Agrawal, K. N. Bala Subramanya Murthy","doi":"10.1109/ICCPCT.2016.7530284","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530284","url":null,"abstract":"In this work we attempt to present the Cloud PAAS security by realizing in terms of Docker container security, we make a deep dive of the PAAS security and also try to analyse, compare and contrast the PAAS Docker container security, with other container technologies, and also with Virtual machine security with and without Hypervisor, and current security level of Dockers container and In this work we extend our previous work on Docker container security and look into methodology of improving the Dockers container security using Multilateral balance security.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123513632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-18DOI: 10.1109/ICCPCT.2016.7530317
J. John, M. Wilscy
The characterization of nanoscale images finds numerous applications in computer vision and image processing technologies. It is an emerging area of research and only few papers exist in literature on techniques for analyzing properties of nanostructures. The characterization of nanostructures in terms of surface morphology, particle size, porosity measurement etc helps in analyzing unique features and properties of the nanomaterials which makes them useful in many applications. This paper reviews the various algorithms and their advantages and drawbacks in analyzing the nanostructures.
{"title":"Image processing techniques for surface characterization of nanostructures","authors":"J. John, M. Wilscy","doi":"10.1109/ICCPCT.2016.7530317","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530317","url":null,"abstract":"The characterization of nanoscale images finds numerous applications in computer vision and image processing technologies. It is an emerging area of research and only few papers exist in literature on techniques for analyzing properties of nanostructures. The characterization of nanostructures in terms of surface morphology, particle size, porosity measurement etc helps in analyzing unique features and properties of the nanomaterials which makes them useful in many applications. This paper reviews the various algorithms and their advantages and drawbacks in analyzing the nanostructures.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123616930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-18DOI: 10.1109/ICCPCT.2016.7530381
P. Tamilchelvan, M. Arounassalame
Robust control technique is more important to achieve a regulated constant output voltage in wind energy conversion (WEC) system. This paper presents a robust controller design for WEC system using Genetic Algorithm (GA) tuned Fractional Order Controller (FOC). The main contribution in this paper is the design of Fractional order PI controller using Genetic algorithm, implementation using MATLAB/ SIMULINK and performance comparisons. Here the performance of Fractional Order PI Controller is compared with PI controller. The regulation of system with control approach under variable wind speed conditions such as fluctuation wind phenomena was also considered for performance comparison.
{"title":"Robust control design for wind energy conversion system using Genetic Algorithm (GA) tuned Fractional order controller","authors":"P. Tamilchelvan, M. Arounassalame","doi":"10.1109/ICCPCT.2016.7530381","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530381","url":null,"abstract":"Robust control technique is more important to achieve a regulated constant output voltage in wind energy conversion (WEC) system. This paper presents a robust controller design for WEC system using Genetic Algorithm (GA) tuned Fractional Order Controller (FOC). The main contribution in this paper is the design of Fractional order PI controller using Genetic algorithm, implementation using MATLAB/ SIMULINK and performance comparisons. Here the performance of Fractional Order PI Controller is compared with PI controller. The regulation of system with control approach under variable wind speed conditions such as fluctuation wind phenomena was also considered for performance comparison.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126183202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-18DOI: 10.1109/ICCPCT.2016.7530325
R. Velayutham, M. Sabari, M. Rajeswari
Now-a-days children and women are facing many security related problems. In such situations, they are helpless and don't have any way to protect them or inform it to their family members, neighbours or police station and they feel as handicaps. Hence there should be a system to protect them in such times. So this system helps them to seek help in any critical situation. For that, the system contains GPS to detect location and GSM mechanisms to pass their current location to any one of the trusted contacts as a google map link and services are provided to track the locations from that moment onwards to save the person.
{"title":"An innovative approach for women and children's security based location tracking system","authors":"R. Velayutham, M. Sabari, M. Rajeswari","doi":"10.1109/ICCPCT.2016.7530325","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530325","url":null,"abstract":"Now-a-days children and women are facing many security related problems. In such situations, they are helpless and don't have any way to protect them or inform it to their family members, neighbours or police station and they feel as handicaps. Hence there should be a system to protect them in such times. So this system helps them to seek help in any critical situation. For that, the system contains GPS to detect location and GSM mechanisms to pass their current location to any one of the trusted contacts as a google map link and services are provided to track the locations from that moment onwards to save the person.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124669582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-18DOI: 10.1109/ICCPCT.2016.7530205
M. Debnath, R. Mallick, Sahasranshu Das, A. Aman
This paper focuses on the load frequency control of two area interconnected reheat thermal system with fuzzy-PID controller optimized by gravitational search algorithm (GSA). The gains of the fuzzy-PID controllers are optimized by providing a step load perturbation (SLP) of 1% to area 1 in consideration of integral time absolute error (ITAE) as the objective function. The dynamic performances of the system are being analyzed with GSA and PSO optimized fuzzy-PID controllers. The supremacy of the proposed method is depicted in terms of settling time, peak overshoots and undershoots in comparison with a recently published results. Further the robustness of the system is proved by changing the system loading.
{"title":"Gravitational search algorithm (GSA) optimized fuzzy-PID controller design for load frequency control of an interconnected multi-area power system","authors":"M. Debnath, R. Mallick, Sahasranshu Das, A. Aman","doi":"10.1109/ICCPCT.2016.7530205","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530205","url":null,"abstract":"This paper focuses on the load frequency control of two area interconnected reheat thermal system with fuzzy-PID controller optimized by gravitational search algorithm (GSA). The gains of the fuzzy-PID controllers are optimized by providing a step load perturbation (SLP) of 1% to area 1 in consideration of integral time absolute error (ITAE) as the objective function. The dynamic performances of the system are being analyzed with GSA and PSO optimized fuzzy-PID controllers. The supremacy of the proposed method is depicted in terms of settling time, peak overshoots and undershoots in comparison with a recently published results. Further the robustness of the system is proved by changing the system loading.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128286597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-18DOI: 10.1109/ICCPCT.2016.7530355
S. Sarkar, Nabendu Kr. Sarkar, A. Banerjee
While dealing with large data array required in various applications, the memory required for the data storage and data transfer of that bulk data becomes difficult. If the array size can be reduced without losing the data, the problem of storage and data transfer can be avoided. In this paper, a Huffman Coding based data compression algorithm is proposed and tested in MATLAB environment which will significantly reduce the size of one dimensional data array. Though the algorithm is tested with number array only, the algorithm can be extended to be applied with character array with slight modification.
{"title":"A novel Huffman coding based approach to reduce the size of large data array","authors":"S. Sarkar, Nabendu Kr. Sarkar, A. Banerjee","doi":"10.1109/ICCPCT.2016.7530355","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530355","url":null,"abstract":"While dealing with large data array required in various applications, the memory required for the data storage and data transfer of that bulk data becomes difficult. If the array size can be reduced without losing the data, the problem of storage and data transfer can be avoided. In this paper, a Huffman Coding based data compression algorithm is proposed and tested in MATLAB environment which will significantly reduce the size of one dimensional data array. Though the algorithm is tested with number array only, the algorithm can be extended to be applied with character array with slight modification.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":"02 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131049706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-18DOI: 10.1109/ICCPCT.2016.7530126
Devika Menon, Anila Antony
Islanding is a condition in which the micro grid is disconnected from the main grid which consists of loads and distribution generation. Islanding is required whenever there is a fault and whenever the maintenance is required. Under normal condition or stable condition, the system works under constant current control mode. After islanding the system switched to voltage controlled mode. There are different methods that can be used to detect islanding situation such as active and passive methods. In this paper DQ-PLL detection technique used for detecting islanding condition is carried out. This paper also explains in detail the advantages of DQ-PLL method for islanding detection The implementation is validated by using MATLAB/SIMULINK software.
{"title":"Islanding detection technique of distribution generation system","authors":"Devika Menon, Anila Antony","doi":"10.1109/ICCPCT.2016.7530126","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530126","url":null,"abstract":"Islanding is a condition in which the micro grid is disconnected from the main grid which consists of loads and distribution generation. Islanding is required whenever there is a fault and whenever the maintenance is required. Under normal condition or stable condition, the system works under constant current control mode. After islanding the system switched to voltage controlled mode. There are different methods that can be used to detect islanding situation such as active and passive methods. In this paper DQ-PLL detection technique used for detecting islanding condition is carried out. This paper also explains in detail the advantages of DQ-PLL method for islanding detection The implementation is validated by using MATLAB/SIMULINK software.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122337649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-18DOI: 10.1109/ICCPCT.2016.7530277
Arya Sebastian
The transmission of important medical diagnostic, MRI (Magnetic Resonance Imaging) images are vulnerable to third party hackers who does spoofing and they are able to introduce faulty and noisy data that damage the transmission data, which hinders the proper medical diagnostics, research and credibility of labs and doctors, there is a clear lack of awareness and lack of proper security measures taken in transmission of MRI images in the present labs, hospitals and research centers. This project is helpful to reduce the problem of secure transmission of medical images. There are many algorithms which can be applied to these medical images. This project is helpful to provide good security to medical images during transmission. Tumor detection or prediction in medical science is a very complex and expensive job, which is not yet been addressed properly and no proper graphical user interface exists in an open source environment. This project is dedicated to analyze the best tumor detection from an MRI brain image after several segmentation methods such as K-means Clustering and Watershed segmentation. Security is realized considering various techniques for encryption and decryption of the image. The encryption technique finally selected after the survey was based on Rivest, Shamir & Adleman [RSA] algorithm.
{"title":"Secure magnetic resonance image transmission and tumor detection techniques","authors":"Arya Sebastian","doi":"10.1109/ICCPCT.2016.7530277","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530277","url":null,"abstract":"The transmission of important medical diagnostic, MRI (Magnetic Resonance Imaging) images are vulnerable to third party hackers who does spoofing and they are able to introduce faulty and noisy data that damage the transmission data, which hinders the proper medical diagnostics, research and credibility of labs and doctors, there is a clear lack of awareness and lack of proper security measures taken in transmission of MRI images in the present labs, hospitals and research centers. This project is helpful to reduce the problem of secure transmission of medical images. There are many algorithms which can be applied to these medical images. This project is helpful to provide good security to medical images during transmission. Tumor detection or prediction in medical science is a very complex and expensive job, which is not yet been addressed properly and no proper graphical user interface exists in an open source environment. This project is dedicated to analyze the best tumor detection from an MRI brain image after several segmentation methods such as K-means Clustering and Watershed segmentation. Security is realized considering various techniques for encryption and decryption of the image. The encryption technique finally selected after the survey was based on Rivest, Shamir & Adleman [RSA] algorithm.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132429636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-18DOI: 10.1109/ICCPCT.2016.7530150
Ayan Roy, S. Srivastava
In this paper, a novel design method for determining the parameters of an optimal Fractional Order PID (PIλDδ) controller for speed control of a Permanent Magnet DC (PMDC) motor using Constrained Particle Swarm Optimization (CPSO) is studied and presented. A PλDδ is a form of conventional PID whose orders of integration and differentiation are fractional number instead of integers. The design objective was to optimize the performance of the system subject to different constraints in frequency and time domain such as phase margin, rise time, settling time etc. CPSO algorithm yields feasible solution of five parameters of PIλDδ satisfying all the required constraints. A comparative study has been carried out on the basis of transient response and robustness of system using proposed controller with widely used ZN tuned PID controller. Moreover, the output of the system for different sets of constraints has been presented. It is shown from simulation results that the proposed method yields more improved closed loop performance.
本文研究并提出了一种基于约束粒子群优化(CPSO)的分数阶PID (PIλDδ)控制器参数确定的新设计方法,用于永磁直流电动机的速度控制。λ d δ是传统PID的一种形式,其积分和微分阶数是分数阶而不是整数阶。设计目标是在相位裕度、上升时间、稳定时间等频域和时域约束条件下优化系统的性能。CPSO算法得到PIλDδ的5个参数满足所有约束条件的可行解。将所提出的控制器与广泛使用的ZN整定PID控制器在系统暂态响应和鲁棒性方面进行了对比研究。此外,还给出了系统在不同约束条件下的输出。仿真结果表明,该方法能提高闭环性能。
{"title":"Design of optimal PIλDδ controller for speed control of DC motor using constrained particle swarm optimization","authors":"Ayan Roy, S. Srivastava","doi":"10.1109/ICCPCT.2016.7530150","DOIUrl":"https://doi.org/10.1109/ICCPCT.2016.7530150","url":null,"abstract":"In this paper, a novel design method for determining the parameters of an optimal Fractional Order PID (PIλDδ) controller for speed control of a Permanent Magnet DC (PMDC) motor using Constrained Particle Swarm Optimization (CPSO) is studied and presented. A PλDδ is a form of conventional PID whose orders of integration and differentiation are fractional number instead of integers. The design objective was to optimize the performance of the system subject to different constraints in frequency and time domain such as phase margin, rise time, settling time etc. CPSO algorithm yields feasible solution of five parameters of PIλDδ satisfying all the required constraints. A comparative study has been carried out on the basis of transient response and robustness of system using proposed controller with widely used ZN tuned PID controller. Moreover, the output of the system for different sets of constraints has been presented. It is shown from simulation results that the proposed method yields more improved closed loop performance.","PeriodicalId":431894,"journal":{"name":"2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132181137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}