首页 > 最新文献

2018 Second International Conference on Computing Methodologies and Communication (ICCMC)最新文献

英文 中文
Arduino Based Home Automation Control Powered by Photovoltaic Cells 基于Arduino的光伏电池供电家庭自动化控制
Apurva Singh, Harshil Mehta, Anuj Nawal, O. V. Gnana Swathika
Home Automation is one of the most sought after area of development in the electronics sector. It has the advantage of no interaction of humans with the devices, and it usually requires another power source to power itself. In standard scenarios, a DC battery is used to power the microcontroller which is used for automation. With constant inclusion of smart energy systems to automate home appliances, this paper proposes a home automation system which is capable of powering the circuits on its own by means of photovoltaic cells and energizing the required set of loads wirelessly. Contrary to conventional methods, the proposed system employs a cascaded photovoltaic cell to energize an Arduino board which aids in automating the system. The Arduino upon wireless input feeds the relays which would activate or deactivate the required load. A hardware prototype of the proposed system is realized and validated successfully.
家庭自动化是电子行业最受追捧的发展领域之一。它的优点是不需要人与设备交互,而且通常需要另一个电源来为自己供电。在标准情况下,直流电池被用来为用于自动化的微控制器供电。随着智能能源系统不断纳入家用电器自动化,本文提出了一种家庭自动化系统,该系统能够通过光伏电池自行为电路供电,并无线为所需的一组负载供电。与传统方法相反,该系统采用级联光伏电池为Arduino板供电,有助于系统的自动化。Arduino在无线输入上给继电器供电,继电器将激活或停用所需的负载。该系统的硬件样机已成功实现并得到验证。
{"title":"Arduino Based Home Automation Control Powered by Photovoltaic Cells","authors":"Apurva Singh, Harshil Mehta, Anuj Nawal, O. V. Gnana Swathika","doi":"10.1109/ICCMC.2018.8488144","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8488144","url":null,"abstract":"Home Automation is one of the most sought after area of development in the electronics sector. It has the advantage of no interaction of humans with the devices, and it usually requires another power source to power itself. In standard scenarios, a DC battery is used to power the microcontroller which is used for automation. With constant inclusion of smart energy systems to automate home appliances, this paper proposes a home automation system which is capable of powering the circuits on its own by means of photovoltaic cells and energizing the required set of loads wirelessly. Contrary to conventional methods, the proposed system employs a cascaded photovoltaic cell to energize an Arduino board which aids in automating the system. The Arduino upon wireless input feeds the relays which would activate or deactivate the required load. A hardware prototype of the proposed system is realized and validated successfully.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"29 1","pages":"729-732"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79867489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
AN EFFICIENT APPROACH OF IMAGE RESTORATION USING MEAN INTENSITY CORRELATION OF NEIGHBORING PIXELS 一种利用相邻像素的平均强度相关进行图像恢复的有效方法
Nazia Hossain, Nazifa Anis, Amdadul Haque, N. Chauhan
Digital images are susceptible to the various types of noise. Noise in the image generally gets added due to the errors in the image acquisition process. These errors result in change in the intensity value of the pixel from the actual scene. Besides, this there are many other ways by which the noise can be introduced to an image. If an image is directly scanned from a photograph, then the grain noise is added into the image. Sometimes, noise gets added due to damage in the film. Motion of image capturing device introduces motion noise into an image. Moreover, electronic transmission of image data over a network can also introduce the noise to the image. There is various type of denoising methods available in the field of image restoration. However, most of these methods are computationally expensive and extensively complex to understand. Therefore, we have devised a very simple and efficient approach of image restoration using mean intensity correlation of neighboring pixel. Under this experiment, successful efforts have been made to restore a corrupted image with 85 percent reduction in the level of noise from the corrupt image.
数字图像容易受到各种噪声的影响。由于图像采集过程中的误差,通常会增加图像中的噪声。这些误差会导致像素的强度值与实际场景的亮度值发生变化。除此之外,还有许多其他的方法可以将噪声引入到图像中。如果直接从照片中扫描图像,则将颗粒噪声添加到图像中。有时,由于胶片的损坏而增加了噪音。图像捕获设备的运动将运动噪声引入图像中。此外,通过网络进行图像数据的电子传输也会给图像引入噪声。在图像恢复领域有各种各样的去噪方法。然而,这些方法中的大多数在计算上都很昂贵,而且理解起来非常复杂。因此,我们设计了一种非常简单有效的利用相邻像素的平均强度相关进行图像恢复的方法。在这个实验下,成功的努力已经作出了恢复损坏的图像与85%的噪声水平降低从损坏的图像。
{"title":"AN EFFICIENT APPROACH OF IMAGE RESTORATION USING MEAN INTENSITY CORRELATION OF NEIGHBORING PIXELS","authors":"Nazia Hossain, Nazifa Anis, Amdadul Haque, N. Chauhan","doi":"10.1109/ICCMC.2018.8487889","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487889","url":null,"abstract":"Digital images are susceptible to the various types of noise. Noise in the image generally gets added due to the errors in the image acquisition process. These errors result in change in the intensity value of the pixel from the actual scene. Besides, this there are many other ways by which the noise can be introduced to an image. If an image is directly scanned from a photograph, then the grain noise is added into the image. Sometimes, noise gets added due to damage in the film. Motion of image capturing device introduces motion noise into an image. Moreover, electronic transmission of image data over a network can also introduce the noise to the image. There is various type of denoising methods available in the field of image restoration. However, most of these methods are computationally expensive and extensively complex to understand. Therefore, we have devised a very simple and efficient approach of image restoration using mean intensity correlation of neighboring pixel. Under this experiment, successful efforts have been made to restore a corrupted image with 85 percent reduction in the level of noise from the corrupt image.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"8 1","pages":"225-230"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82572337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security in Cache Memory: Review 高速缓存中的安全性:回顾
Nishtha, Meenu
Security of cache memory is of concern in applications related to memory software. The purpose of our paper is to examine number of attacks relating to cache memory and suggest precautions towards such threats and guarantee memory cache security. Analysis: Data stored in cached memory could be easily retrieved. This has concern of being accessed by the unauthorized users. Output shows that side channel, duration and ability based attacks are major challenge in cached security. Findings: discussing of about arrangements included in the secured cryptographic based calculation so outlined, secure mindful store low power and mapping reserve configuration by utilizing procedures, for example, XOR operations settled, code convertors, broadened Hamming codes and multi-bit bunched ECC. Application or Enhancement: enhancing and confirming security of cache memory will bring about various applications including brilliant applications with mystery of information with extraordinary significance.
在与存储软件相关的应用中,高速缓存的安全性是人们关注的问题。本文的目的是研究与缓存有关的攻击数量,并提出针对此类威胁的预防措施,并保证内存缓存的安全性。分析:存储在缓存内存中的数据可以很容易地检索。这涉及到被未经授权的用户访问。输出显示,基于侧信道、持续时间和能力的攻击是缓存安全性的主要挑战。研究结果:讨论了基于安全加密的计算中包含的安排,通过使用程序(例如,定异或操作,代码转换器,扩展汉明码和多位聚类ECC),安全存储低功耗和映射储备配置。应用或增强:增强和确认高速缓存的安全性将带来各种各样的应用,包括具有非凡意义的信息神秘的辉煌应用。
{"title":"Security in Cache Memory: Review","authors":"Nishtha, Meenu","doi":"10.1109/ICCMC.2018.8487674","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487674","url":null,"abstract":"Security of cache memory is of concern in applications related to memory software. The purpose of our paper is to examine number of attacks relating to cache memory and suggest precautions towards such threats and guarantee memory cache security. Analysis: Data stored in cached memory could be easily retrieved. This has concern of being accessed by the unauthorized users. Output shows that side channel, duration and ability based attacks are major challenge in cached security. Findings: discussing of about arrangements included in the secured cryptographic based calculation so outlined, secure mindful store low power and mapping reserve configuration by utilizing procedures, for example, XOR operations settled, code convertors, broadened Hamming codes and multi-bit bunched ECC. Application or Enhancement: enhancing and confirming security of cache memory will bring about various applications including brilliant applications with mystery of information with extraordinary significance.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"71 1","pages":"659-662"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89521959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Encountering SQL Injection in Web Applications 在Web应用中遇到SQL注入
Padma N Joshi, N. Ravishankar, M. B. Raju, N. Ravi
Web has seen an exponential increase in number of applications over past decade. Current day web applications provide a lot more services than simple content delivery. web-based model of computing has been subject several attacks such as cross-site scripting & SQL injection. SQL Injection Attacks are comparatively recent threat to privacy, integrity & accessibility of all online requests & their technical infrastructure, secretarial for practically fourth of internet vulnerabilities. This research paper has represented types of attacks & classification of SQL injection attack. Next survey based on research done represented in tabular form. After that discussed about pattern locked proposed model & conclusion then future scope, suggested way for researchers for preventing SQL injection attacks.
在过去十年中,Web应用程序的数量呈指数级增长。当前的web应用程序提供的服务比简单的内容交付多得多。基于web的计算模式已经成为跨站脚本和SQL注入等攻击的对象。SQL注入攻击是最近对所有在线请求及其技术基础设施的隐私,完整性和可访问性的威胁,几乎是互联网漏洞的四分之一。本文介绍了SQL注入攻击的攻击类型和分类。下一项调查基于已完成的研究,以表格形式表示。然后讨论了模式锁定提出的模型和结论以及未来的研究范围,为研究人员提出了防止SQL注入攻击的方法。
{"title":"Encountering SQL Injection in Web Applications","authors":"Padma N Joshi, N. Ravishankar, M. B. Raju, N. Ravi","doi":"10.1109/ICCMC.2018.8487999","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487999","url":null,"abstract":"Web has seen an exponential increase in number of applications over past decade. Current day web applications provide a lot more services than simple content delivery. web-based model of computing has been subject several attacks such as cross-site scripting & SQL injection. SQL Injection Attacks are comparatively recent threat to privacy, integrity & accessibility of all online requests & their technical infrastructure, secretarial for practically fourth of internet vulnerabilities. This research paper has represented types of attacks & classification of SQL injection attack. Next survey based on research done represented in tabular form. After that discussed about pattern locked proposed model & conclusion then future scope, suggested way for researchers for preventing SQL injection attacks.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"44 1","pages":"257-261"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76226942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Capacity Comparison of SISO, SIMO, MISO & MIMO Systems SISO、SIMO、MISO和MIMO系统的容量比较
A. Sarangi, A. Datta
Everyone in the world always wants to use a better wireless network which provide high capacity and high data rates. High data rates and capacity can be produce by Multiple Input Multiple Output(MIMO) systems. This paper mainly focused on MIMO systems because the MIMO systems have multiple number of antennas in transmitting and receiving end which can produce more data rates and capacity compared to SISO, SIMO, MISO systems. The multiple antennas allow MIMO systems to produce multiplexing gain and diversity gain. The capacity of MIMO systems will be increased by increased the number of antennas in transmitter and receiver end.
世界上的每个人都想使用一个更好的无线网络,提供高容量和高数据速率。多输入多输出(MIMO)系统可以产生高数据速率和容量。本文主要研究MIMO系统,因为MIMO系统在发射端和接收端都有多个天线,与SISO、SIMO、MISO系统相比,MIMO系统可以产生更高的数据速率和容量。多天线允许MIMO系统产生多路增益和分集增益。通过增加发射端和接收端的天线数量,MIMO系统的容量将得到提高。
{"title":"Capacity Comparison of SISO, SIMO, MISO & MIMO Systems","authors":"A. Sarangi, A. Datta","doi":"10.1109/ICCMC.2018.8488147","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8488147","url":null,"abstract":"Everyone in the world always wants to use a better wireless network which provide high capacity and high data rates. High data rates and capacity can be produce by Multiple Input Multiple Output(MIMO) systems. This paper mainly focused on MIMO systems because the MIMO systems have multiple number of antennas in transmitting and receiving end which can produce more data rates and capacity compared to SISO, SIMO, MISO systems. The multiple antennas allow MIMO systems to produce multiplexing gain and diversity gain. The capacity of MIMO systems will be increased by increased the number of antennas in transmitter and receiver end.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"29 1","pages":"798-801"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73706684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A Comparative Study of Breast Cancer Diagnosis Using Supervised Machine Learning Techniques 使用监督机器学习技术进行乳腺癌诊断的比较研究
Madhuri Gupta, B. Gupta
Cancer is a class of diseases, which is driven by change in cells of the body and increase beyond normal growth and control. Breast cancer is one of the frequent types of cancer. Prognosis of breast cancer recurrence is highly required to raise the survival rate of patient suffering from breast cancer. With the advancement of technology and machine learning techniques, the cancer diagnosis and detection accuracy has improved. Machine learning (ML) techniques offer various probabilistic and statistical methods that allow intelligent systems to learn from reoccurring past experiences to detect and identify patterns from a dataset. The research work presented an overview of evolve the machine learning techniques in cancer disease by applying learning algorithms on breast cancer Wisconsin data –Linear regression, Random Forest, Multi-layer Perceptron and Decision Trees (DT). The result outcome shows that Multilayer perceptron performs better than other techniques.
癌症是一类疾病,它是由身体细胞的变化引起的,并且超出了正常的生长和控制。乳腺癌是一种常见的癌症。提高乳腺癌患者的生存率,对乳腺癌复发的预后要求很高。随着科技和机器学习技术的进步,癌症诊断和检测的准确性得到了提高。机器学习(ML)技术提供了各种概率和统计方法,允许智能系统从重复出现的过去经验中学习,以检测和识别数据集中的模式。通过对乳腺癌威斯康星数据的学习算法-线性回归、随机森林、多层感知器和决策树(DT)的应用,概述了癌症疾病中机器学习技术的发展概况。结果表明,多层感知器的性能优于其他技术。
{"title":"A Comparative Study of Breast Cancer Diagnosis Using Supervised Machine Learning Techniques","authors":"Madhuri Gupta, B. Gupta","doi":"10.1109/ICCMC.2018.8487537","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487537","url":null,"abstract":"Cancer is a class of diseases, which is driven by change in cells of the body and increase beyond normal growth and control. Breast cancer is one of the frequent types of cancer. Prognosis of breast cancer recurrence is highly required to raise the survival rate of patient suffering from breast cancer. With the advancement of technology and machine learning techniques, the cancer diagnosis and detection accuracy has improved. Machine learning (ML) techniques offer various probabilistic and statistical methods that allow intelligent systems to learn from reoccurring past experiences to detect and identify patterns from a dataset. The research work presented an overview of evolve the machine learning techniques in cancer disease by applying learning algorithms on breast cancer Wisconsin data –Linear regression, Random Forest, Multi-layer Perceptron and Decision Trees (DT). The result outcome shows that Multilayer perceptron performs better than other techniques.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"274 1","pages":"997-1002"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73488228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
A Strategic Genetic Algorithm for Resource Allocation in LTE Uplink Netwoks LTE上行网络资源分配的策略遗传算法
Leeban Moses, S. Karthikeyan
Long-term evolution (LTE), also known as 4G, is a rapidly growing global technology that continuously offers unprecedented data rates with higher capacity and new levels of user experience. The scheduling algorithm in LTE plays a vital role in determining the effectiveness of the system in terms of bandwidth efficiency and providing quality of service support to the users. In this paper we discuss about the complex optimization problem in resource allocation LTE uplink. We propose a new strategic genetic algorithm based approach as a solution to solve the problem. The proposed algorithm is evaluated in NS-3 simulator with a video sequence. Various LTE uplink resource allocation algorithms found in literature are discussed and their performance are evaluated and compared with our proposed algorithm. The results show that our proposed algorithm outperforms the existing algorithms in various scenarios.
长期演进(LTE),也称为4G,是一项快速发展的全球技术,不断提供前所未有的数据速率,更高的容量和新的用户体验水平。LTE中的调度算法在决定系统带宽效率的有效性和向用户提供高质量的业务支持方面起着至关重要的作用。本文讨论了LTE上行链路资源分配中的复杂优化问题。我们提出了一种新的基于策略遗传算法的方法来解决这一问题。在NS-3仿真器上对该算法进行了验证。讨论了文献中发现的各种LTE上行资源分配算法,并对其性能进行了评估,并与本文提出的算法进行了比较。结果表明,本文提出的算法在各种场景下都优于现有算法。
{"title":"A Strategic Genetic Algorithm for Resource Allocation in LTE Uplink Netwoks","authors":"Leeban Moses, S. Karthikeyan","doi":"10.1109/ICCMC.2018.8488024","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8488024","url":null,"abstract":"Long-term evolution (LTE), also known as 4G, is a rapidly growing global technology that continuously offers unprecedented data rates with higher capacity and new levels of user experience. The scheduling algorithm in LTE plays a vital role in determining the effectiveness of the system in terms of bandwidth efficiency and providing quality of service support to the users. In this paper we discuss about the complex optimization problem in resource allocation LTE uplink. We propose a new strategic genetic algorithm based approach as a solution to solve the problem. The proposed algorithm is evaluated in NS-3 simulator with a video sequence. Various LTE uplink resource allocation algorithms found in literature are discussed and their performance are evaluated and compared with our proposed algorithm. The results show that our proposed algorithm outperforms the existing algorithms in various scenarios.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"13 1","pages":"436-441"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82036190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of Heart Rate Variability in Biometric Identification 生物识别中心率变异性的分析
V. Jadhav, Nagsen S. Bansod, K. Kale
Biometric recognition provides excellent security by identifying an individual based on the physiological and/or behavioral characteristics. This paper presents a systematic analysis for human identification from HRV data. The objective of this paper is to state usefulness of Heart Rate Variability in biometric identification also how ECG data can be used as identification trait in human recognition. HRV is the variant flow in the interval of time between the different two continuous heart beats. HRV is calculated by the variation in two heart beats. The electrocardiogram trace expresses cardiac features that are unique to an each individual which helps to identify/recognize the individual.
生物特征识别通过基于生理和/或行为特征来识别个体,从而提供了出色的安全性。本文对基于HRV数据的人体识别进行了系统分析。本文的目的是说明心率变异性在生物识别中的有用性,以及如何将心电数据用作人类识别的识别特征。HRV是在不同的两次连续心跳之间的时间间隔内的可变流量。HRV是通过两次心跳的变化来计算的。心电图痕迹表达了每个人独特的心脏特征,有助于识别/识别个体。
{"title":"Analysis of Heart Rate Variability in Biometric Identification","authors":"V. Jadhav, Nagsen S. Bansod, K. Kale","doi":"10.1109/ICCMC.2018.8487233","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487233","url":null,"abstract":"Biometric recognition provides excellent security by identifying an individual based on the physiological and/or behavioral characteristics. This paper presents a systematic analysis for human identification from HRV data. The objective of this paper is to state usefulness of Heart Rate Variability in biometric identification also how ECG data can be used as identification trait in human recognition. HRV is the variant flow in the interval of time between the different two continuous heart beats. HRV is calculated by the variation in two heart beats. The electrocardiogram trace expresses cardiac features that are unique to an each individual which helps to identify/recognize the individual.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"14 1","pages":"229-304"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86353160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparative approach of PSO and ABC algorithm for optimal positioning and capacity sizing of DG and Shunt Capacitor in a Distribution network using DLF algorithm 基于DLF算法的配电网DG和并联电容器最优定位和容量大小的PSO和ABC算法比较研究
Ayan Kumar Tudu, Amrita Bhaumik
Placement and size optimization of Distributed Generation (DG) and shunt capacitors in a radial distribution networkhelps in minimizing system power loss and maintain appropriate system voltage .Of the numerous optimization methods available in the literature Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) algorithms are quite popular. An attempt has been made in this paper to compare the effectiveness of these two methods with the help of DLF algorithm to optimally place and size the DG and shunt capacitors in a radial distribution network. The required system data has been taken from the standard IEEE 69 bus radial distribution system. All computations were performed in MATLAB package.
在径向配电网中,分布式发电(DG)和并联电容器的放置和尺寸优化有助于减少系统功率损耗和保持适当的系统电压。在文献中可用的众多优化方法中,粒子群优化(PSO)和人工蜂群算法(ABC)很受欢迎。本文尝试用DLF算法比较这两种方法在径向配电网中DG和并联电容器的最佳位置和尺寸的有效性。所需的系统数据取自标准IEEE 69总线径向配电系统。所有计算均在MATLAB软件包中完成。
{"title":"A comparative approach of PSO and ABC algorithm for optimal positioning and capacity sizing of DG and Shunt Capacitor in a Distribution network using DLF algorithm","authors":"Ayan Kumar Tudu, Amrita Bhaumik","doi":"10.1109/ICCMC.2018.8487996","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487996","url":null,"abstract":"Placement and size optimization of Distributed Generation (DG) and shunt capacitors in a radial distribution networkhelps in minimizing system power loss and maintain appropriate system voltage .Of the numerous optimization methods available in the literature Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) algorithms are quite popular. An attempt has been made in this paper to compare the effectiveness of these two methods with the help of DLF algorithm to optimally place and size the DG and shunt capacitors in a radial distribution network. The required system data has been taken from the standard IEEE 69 bus radial distribution system. All computations were performed in MATLAB package.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"32 1","pages":"276-280"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84257241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Resource Allocation and Scheduling Methods in Cloud- A Survey 云中的资源分配和调度方法- A调查
Aicy Ealiyas, S. P. Jeno Lovesum
Cloud computing is an information technology paradigm, which provide services and resources through on-demand services over the internet. As there are many applications deployed in the cloud by users, proper scheduling is needed as various resources are consumed. If the application is not scheduled properly, it will cause load imbalance in the cloud data centers. In this paper, there will be proper utilization of the resources and a survey is done on the various scheduling and allocation methods for applications in cloud.
云计算是一种信息技术范式,它通过互联网上的按需服务提供服务和资源。由于用户在云中部署了许多应用程序,因此随着各种资源的消耗,需要进行适当的调度。如果应用程序调度不合理,将导致云数据中心的负载不平衡。本文将对资源进行合理利用,并对云应用的各种调度和分配方法进行调查。
{"title":"Resource Allocation and Scheduling Methods in Cloud- A Survey","authors":"Aicy Ealiyas, S. P. Jeno Lovesum","doi":"10.1109/ICCMC.2018.8487967","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487967","url":null,"abstract":"Cloud computing is an information technology paradigm, which provide services and resources through on-demand services over the internet. As there are many applications deployed in the cloud by users, proper scheduling is needed as various resources are consumed. If the application is not scheduled properly, it will cause load imbalance in the cloud data centers. In this paper, there will be proper utilization of the resources and a survey is done on the various scheduling and allocation methods for applications in cloud.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"32 1","pages":"601-604"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87259621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2018 Second International Conference on Computing Methodologies and Communication (ICCMC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1