首页 > 最新文献

2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)最新文献

英文 中文
Fuzzy based Fault Tolerant shunt Active Power Filter 基于模糊容错的并联有源电力滤波器
N. Madhuri, S. Doradla, M. Kalavathi
Active Power Filters are developed for compensating the harmonics, reactive power simultaneously. The performance of shunt Active Power Filter depends on the two factors i.e., type of the controller and methods used to obtain the reference current. Generally, the type of controller used in most of the Active Power Filters is traditional PI controller or Fuzzy Logic Controller. Recently, Fault Tolerant Shunt Active Power Filter was proposed using PI controller with redundancy method to guarantee reliability of Active Power Filters. However in this study, we propose a Fault tolerant Shunt Active Power Filter using Fuzzy Logic Controller instead of PI controller to achieve better performance in terms of Total Harmonic Distortion. Simulation results are obtained using MATLAB/SIMULINK for Fuzzy based Fault tolerant Shunt Active Power Filter in presence of open / short circuit fault and shown better results in comparison with Fault Tolerant Shunt Active Filter using PI controller.
有源电力滤波器是为同时补偿谐波和无功而研制的。并联型有源电力滤波器的性能取决于两个因素,即控制器的类型和获取参考电流的方法。一般来说,在大多数有源电力滤波器中使用的控制器类型是传统的PI控制器或模糊逻辑控制器。为了保证有源电力滤波器的可靠性,提出了一种采用PI冗余控制的容错并联有源电力滤波器。然而,在本研究中,我们提出了一种容错并联有源电力滤波器,使用模糊逻辑控制器代替PI控制器,以获得更好的总谐波失真性能。利用MATLAB/SIMULINK对存在开路/短路故障的模糊容错并联有源电力滤波器进行了仿真,并与采用PI控制器的容错并联有源滤波器进行了比较。
{"title":"Fuzzy based Fault Tolerant shunt Active Power Filter","authors":"N. Madhuri, S. Doradla, M. Kalavathi","doi":"10.1109/ICCICCT.2014.6993169","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993169","url":null,"abstract":"Active Power Filters are developed for compensating the harmonics, reactive power simultaneously. The performance of shunt Active Power Filter depends on the two factors i.e., type of the controller and methods used to obtain the reference current. Generally, the type of controller used in most of the Active Power Filters is traditional PI controller or Fuzzy Logic Controller. Recently, Fault Tolerant Shunt Active Power Filter was proposed using PI controller with redundancy method to guarantee reliability of Active Power Filters. However in this study, we propose a Fault tolerant Shunt Active Power Filter using Fuzzy Logic Controller instead of PI controller to achieve better performance in terms of Total Harmonic Distortion. Simulation results are obtained using MATLAB/SIMULINK for Fuzzy based Fault tolerant Shunt Active Power Filter in presence of open / short circuit fault and shown better results in comparison with Fault Tolerant Shunt Active Filter using PI controller.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"379 1","pages":"1334-1337"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78799358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Adaptive thresholding: A comparative study 自适应阈值法的比较研究
Payel Roy, Goutami Dey, S. Dutta, Sayan Chakraborty, N. Dey, R. Ray
With the growth of image processing applications, image segmentation has become an important part of image processing. The simplest method to segment an image is thresholding. Using the thresholding method, segmentation of an image is done by fixing all pixels whose intensity values are more than the threshold to a foreground value. The remaining pixels are set to a background value. Such technique can be used to obtain binary images from grayscale images. The conventional thresholding techniques use a global threshold for all pixels, whereas adaptive thresholding changes the threshold value dynamically over the image. This paper offers a comparative study on adaptive thresholding techniques to choose the accurate method for binarizing an image based on the contrast, texture, resolution etc. of an image.
随着图像处理应用的增长,图像分割已成为图像处理的重要组成部分。分割图像最简单的方法是阈值分割。使用阈值分割方法,通过将强度值大于阈值的所有像素固定为前景值来完成图像分割。其余像素设置为背景值。该技术可用于从灰度图像中获得二值图像。传统的阈值分割技术对所有像素使用全局阈值,而自适应阈值分割技术在图像上动态改变阈值。本文对自适应阈值分割技术进行了比较研究,以便根据图像的对比度、纹理、分辨率等选择准确的图像二值化方法。
{"title":"Adaptive thresholding: A comparative study","authors":"Payel Roy, Goutami Dey, S. Dutta, Sayan Chakraborty, N. Dey, R. Ray","doi":"10.1109/ICCICCT.2014.6993140","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993140","url":null,"abstract":"With the growth of image processing applications, image segmentation has become an important part of image processing. The simplest method to segment an image is thresholding. Using the thresholding method, segmentation of an image is done by fixing all pixels whose intensity values are more than the threshold to a foreground value. The remaining pixels are set to a background value. Such technique can be used to obtain binary images from grayscale images. The conventional thresholding techniques use a global threshold for all pixels, whereas adaptive thresholding changes the threshold value dynamically over the image. This paper offers a comparative study on adaptive thresholding techniques to choose the accurate method for binarizing an image based on the contrast, texture, resolution etc. of an image.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"1 1","pages":"1182-1186"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89680457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 94
Android malware attacks and countermeasures: Current and future directions Android恶意软件攻击和对策:当前和未来的方向
Rahul Raveendranath, V. Rajamani, Anoop Babu, S. K. Datta
Smartphones are rising in popularity as well as becoming more sophisticated over recent years. This popularity coupled with the fact that smartphones contain a lot of private user data is causing a proportional rise in different malwares for the platform. In this paper we analyze and classify state-of-the-art malware techniques and their countermeasures. The paper also reports a novel method for malware development and novel attack techniques such as mobile botnets, usage pattern based attacks and repackaging attacks. The possible countermeasures are also proposed. Then a detailed analysis of one of the proposed novel malware methods is explained. Finally the paper concludes by summarizing the paper.
近年来,智能手机越来越受欢迎,也变得越来越复杂。这种受欢迎程度加上智能手机包含大量私人用户数据的事实,导致针对该平台的不同恶意软件比例上升。在本文中,我们分析和分类最新的恶意软件技术及其对策。本文还报道了一种新的恶意软件开发方法和新的攻击技术,如移动僵尸网络,基于使用模式的攻击和重新包装攻击。并提出了可能的对策。然后详细分析了所提出的一种新型恶意软件方法。最后对全文进行总结。
{"title":"Android malware attacks and countermeasures: Current and future directions","authors":"Rahul Raveendranath, V. Rajamani, Anoop Babu, S. K. Datta","doi":"10.1109/ICCICCT.2014.6992944","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992944","url":null,"abstract":"Smartphones are rising in popularity as well as becoming more sophisticated over recent years. This popularity coupled with the fact that smartphones contain a lot of private user data is causing a proportional rise in different malwares for the platform. In this paper we analyze and classify state-of-the-art malware techniques and their countermeasures. The paper also reports a novel method for malware development and novel attack techniques such as mobile botnets, usage pattern based attacks and repackaging attacks. The possible countermeasures are also proposed. Then a detailed analysis of one of the proposed novel malware methods is explained. Finally the paper concludes by summarizing the paper.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"23 1","pages":"137-143"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86342373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Segmentation in Malayalam OCR — Handling broken characters using active contour model 马来语OCR中的分割-使用活动轮廓模型处理破碎字符
M. Praseetha, S. Deepa
Character segmentation is a significant phase in an Optical Character Recognition (OCR) system. In this stage of OCR, the image of sequence of characters is decomposed into sub-images of individual symbols. The recognition of characters depends on this phase so that any mistake in the segmentation leads to a complete failure of the OCR system. One of the main reasons for incorrect segmentation of characters is the presence of broken characters in the input document. Here an approach based on Active Contour Model is proposed to solve this problem.
字符分割是光学字符识别(OCR)系统中的一个重要环节。在OCR的这一阶段,字符序列图像被分解成单个符号的子图像。字符的识别依赖于这个阶段,因此分割中的任何错误都会导致OCR系统的完全失败。字符分割错误的主要原因之一是输入文档中存在断字符。本文提出了一种基于活动轮廓模型的方法来解决这一问题。
{"title":"Segmentation in Malayalam OCR — Handling broken characters using active contour model","authors":"M. Praseetha, S. Deepa","doi":"10.1109/ICCICCT.2014.6993097","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993097","url":null,"abstract":"Character segmentation is a significant phase in an Optical Character Recognition (OCR) system. In this stage of OCR, the image of sequence of characters is decomposed into sub-images of individual symbols. The recognition of characters depends on this phase so that any mistake in the segmentation leads to a complete failure of the OCR system. One of the main reasons for incorrect segmentation of characters is the presence of broken characters in the input document. Here an approach based on Active Contour Model is proposed to solve this problem.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"71 1","pages":"958-962"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86405958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud storage system enabling secure privacy preserving third party audit 云存储系统支持安全隐私保护第三方审计
D. Rewadkar, Suchita Y. Ghatage
Cloud computing is a revolutionary new approach to how computing services are produced and consumed. It is an abstraction of the concept of pooling resources and presenting them as virtual resources. Using cloud computing resources, data, computations, and services can be shared over scalable network of nodes; these nodes may represent the datacenters, end user computers and web services. On the same note cloud storage refers to storing the data on a remote storage located at other organization's infrastructure. The data storage is maintained and managed by the organization; the user will pay for the storage space which is used. Outsourcing data ultimately relinquishes the control of data from user and the fate of data is in control of the cloud server. As the data is stored on cloud server, the storage correctness of data is put on risk. The cloud server is managed by cloud service provider which is a different administrative entity, so ensuring the data integrity is of prime importance. This article studies the problems of ensuring data storage correctness and proposes an efficient and secure method to address these issues. A third party auditor is introduced securely, who will on behalf of users request will periodically verify the data integrity of the data stored on cloud server. There will not be any online burden on user and security of data will be maintained as the data will not be shared directly with the third party auditor. A homomorphic encryption scheme is used to encrypt the data which will be shared with the TPA. The results can be further extended to enable the third party auditor to do multiple auditing.
云计算是一种革命性的计算服务生产和消费方式的新方法。它是资源池概念的抽象,并将其作为虚拟资源呈现。利用云计算资源,数据、计算和服务可以在可扩展的节点网络上共享;这些节点可以代表数据中心、最终用户计算机和web服务。同样,云存储是指将数据存储在位于其他组织基础设施的远程存储上。数据存储由组织维护和管理;用户将为所使用的存储空间付费。外包数据最终放弃了用户对数据的控制,数据的命运掌握在云服务器的手中。由于数据存储在云服务器上,因此数据的存储正确性存在风险。云服务器由云服务提供商管理,云服务提供商是一个不同的管理实体,因此确保数据完整性至关重要。本文研究了保证数据存储正确性的问题,并提出了一种有效、安全的方法来解决这些问题。安全引入第三方审核员,代表用户要求定期验证存储在云服务器上的数据的完整性。不会对用户造成任何网上负担,而且由于数据不会直接与第三方审计机构共享,因此数据的安全性将得到保证。使用同态加密方案对将与TPA共享的数据进行加密。可以进一步扩展结果,使第三方审核员能够执行多个审核。
{"title":"Cloud storage system enabling secure privacy preserving third party audit","authors":"D. Rewadkar, Suchita Y. Ghatage","doi":"10.1109/ICCICCT.2014.6993049","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993049","url":null,"abstract":"Cloud computing is a revolutionary new approach to how computing services are produced and consumed. It is an abstraction of the concept of pooling resources and presenting them as virtual resources. Using cloud computing resources, data, computations, and services can be shared over scalable network of nodes; these nodes may represent the datacenters, end user computers and web services. On the same note cloud storage refers to storing the data on a remote storage located at other organization's infrastructure. The data storage is maintained and managed by the organization; the user will pay for the storage space which is used. Outsourcing data ultimately relinquishes the control of data from user and the fate of data is in control of the cloud server. As the data is stored on cloud server, the storage correctness of data is put on risk. The cloud server is managed by cloud service provider which is a different administrative entity, so ensuring the data integrity is of prime importance. This article studies the problems of ensuring data storage correctness and proposes an efficient and secure method to address these issues. A third party auditor is introduced securely, who will on behalf of users request will periodically verify the data integrity of the data stored on cloud server. There will not be any online burden on user and security of data will be maintained as the data will not be shared directly with the third party auditor. A homomorphic encryption scheme is used to encrypt the data which will be shared with the TPA. The results can be further extended to enable the third party auditor to do multiple auditing.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"52 1","pages":"695-699"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79127852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Smile detection from still images using KNN algorithm 基于KNN算法的静态图像微笑检测
T. George, Sumi P. Potty, Sneha Jose
Reliable detection and recognition of facial expression from still images in the unconstrained real world situations has many potential applications. Smile detection can be used in many applications include modeling systems for psychological studies on human emotional responses, expression recognition technologies, extending image search capabilities etc. This paper proposes an experimental study of smile detection in embedded environment using Raspberry Pi board, by extracting mouth and eye pair from images using Haar-cascade classifier and train these images using KNN matching algorithm. The relatively simple K- Nearest Neighbor is used because of its lazy learning efficiency. OpenCV- 2.3.1(Open Source Computer Vision) library is used as the imaging library. The experiments explored that the proposed approach has an accuracy of 66.6%.
在不受约束的现实世界中,从静止图像中可靠地检测和识别面部表情具有许多潜在的应用。微笑检测可用于许多应用,包括人类情绪反应的心理研究建模系统,表情识别技术,扩展图像搜索功能等。本文提出了一种基于树莓派板的嵌入式环境下微笑检测的实验研究,利用haar级联分类器从图像中提取嘴和眼睛对,并使用KNN匹配算法对图像进行训练。使用相对简单的K近邻算法是因为它的惰性学习效率。使用OpenCV- 2.3.1(Open Source Computer Vision)库作为图像库。实验表明,该方法的准确率为66.6%。
{"title":"Smile detection from still images using KNN algorithm","authors":"T. George, Sumi P. Potty, Sneha Jose","doi":"10.1109/ICCICCT.2014.6993006","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993006","url":null,"abstract":"Reliable detection and recognition of facial expression from still images in the unconstrained real world situations has many potential applications. Smile detection can be used in many applications include modeling systems for psychological studies on human emotional responses, expression recognition technologies, extending image search capabilities etc. This paper proposes an experimental study of smile detection in embedded environment using Raspberry Pi board, by extracting mouth and eye pair from images using Haar-cascade classifier and train these images using KNN matching algorithm. The relatively simple K- Nearest Neighbor is used because of its lazy learning efficiency. OpenCV- 2.3.1(Open Source Computer Vision) library is used as the imaging library. The experiments explored that the proposed approach has an accuracy of 66.6%.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"1 1","pages":"461-465"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76459096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Area efficient fully parallel distributed arithmetic architecture for one-dimensional discrete cosine transform 一维离散余弦变换的面积高效全并行分布式算法结构
Teena Susan Elias, P. Dhanusha
The paper describes the design of one-dimensional discrete cosine transform (DCT) which is widely used in image and video compression systems. The objective of this paper is to design an area efficient fully parallel distributed arithmetic (DA) architecture for one-dimensional DCT to be implemented on field programmable gate array (FPGA). DCT requires large amount of mathematical computations including multiplications and accumulations. The multipliers consume increased power and area; hence multipliers are completely discarded in the proposed design. Distributed arithmetic is a method of modification at bit stream for sum of product or vector dot product to hide the multiplications. DA is very much suitable for FPGA designs as it reduces the size of a multiply and accumulate hardware. The speed is increased in the proposed design with the fully parallel approach. In this work, existing DA architecture for 1D-DCT and the proposed area efficient fully parallel DA architecture for 1D-DCT are realized. The simulation is performed using Modelsim6.2b and synthesized with Xilinx IS E Simulator. The 1D-DCT can be extended to 2D-DCT by using row column decomposition technique.
本文介绍了在图像和视频压缩系统中广泛应用的一维离散余弦变换(DCT)的设计。本文的目的是设计一种在现场可编程门阵列(FPGA)上实现一维DCT的区域高效全并行分布式算法(DA)体系结构。DCT需要大量的数学计算,包括乘法和累加。乘数器消耗更多的功率和面积;因此,在提出的设计中,乘数完全被丢弃。分布式算法是一种在比特流上对乘积和或向量点积进行修改以隐藏乘法的方法。数据处理非常适合FPGA设计,因为它减少了乘法和累加硬件的尺寸。采用全并行方法,提高了设计的速度。在此工作中,实现了现有的3d - dct数据处理体系结构和提出的3d - dct区域高效全并行数据处理体系结构。采用Modelsim6.2b进行仿真,并用Xilinx is E Simulator进行合成。利用行列分解技术可以将一维dct扩展到二维dct。
{"title":"Area efficient fully parallel distributed arithmetic architecture for one-dimensional discrete cosine transform","authors":"Teena Susan Elias, P. Dhanusha","doi":"10.1109/ICCICCT.2014.6992973","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992973","url":null,"abstract":"The paper describes the design of one-dimensional discrete cosine transform (DCT) which is widely used in image and video compression systems. The objective of this paper is to design an area efficient fully parallel distributed arithmetic (DA) architecture for one-dimensional DCT to be implemented on field programmable gate array (FPGA). DCT requires large amount of mathematical computations including multiplications and accumulations. The multipliers consume increased power and area; hence multipliers are completely discarded in the proposed design. Distributed arithmetic is a method of modification at bit stream for sum of product or vector dot product to hide the multiplications. DA is very much suitable for FPGA designs as it reduces the size of a multiply and accumulate hardware. The speed is increased in the proposed design with the fully parallel approach. In this work, existing DA architecture for 1D-DCT and the proposed area efficient fully parallel DA architecture for 1D-DCT are realized. The simulation is performed using Modelsim6.2b and synthesized with Xilinx IS E Simulator. The 1D-DCT can be extended to 2D-DCT by using row column decomposition technique.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"29 1","pages":"294-299"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90665341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A retrospective study based on the soft computing approach in combined Ultrasonic Assisted Electrical Discharge Machining 基于软计算方法的超声辅助电火花复合加工的回顾性研究
D. Sudhakar, M. D. Anand, P. Gopu, Yang Wang, Mohammadreza Shabgard, Hamed Kakolvand, Mirsadegh Seyedzavvar
Machining of super alloys, composite materials and some high strength hard to machine materials by using Electrical Discharge Machining (EDM) produces poor quality surface finish. Ultrasonic Assisted Electrical Discharge Machining (USEDM) is one of the advanced hybrid type unconventional machining processes is developed to overcome the above quality problems. The ultimate aim of this paper is to conduct a literature survey in USEDM operations used by researchers among different applications using various materials. Also took a deep review in different prediction and optimization techniques used by researchers to obtain the optimal input parameters setting for getting an optimal solution in machining area.
用电火花加工(EDM)加工超级合金、复合材料和一些高强度难加工材料的表面光洁度较差。超声辅助电火花加工(USEDM)是为克服上述质量问题而发展起来的一种先进的混合型非常规加工工艺。本文的最终目的是对研究人员在使用各种材料的不同应用中使用的USEDM操作进行文献调查。同时对研究人员为获得加工区域的最优解而采用的各种预测和优化技术进行了深入的综述。
{"title":"A retrospective study based on the soft computing approach in combined Ultrasonic Assisted Electrical Discharge Machining","authors":"D. Sudhakar, M. D. Anand, P. Gopu, Yang Wang, Mohammadreza Shabgard, Hamed Kakolvand, Mirsadegh Seyedzavvar","doi":"10.1109/ICCICCT.2014.6993195","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993195","url":null,"abstract":"Machining of super alloys, composite materials and some high strength hard to machine materials by using Electrical Discharge Machining (EDM) produces poor quality surface finish. Ultrasonic Assisted Electrical Discharge Machining (USEDM) is one of the advanced hybrid type unconventional machining processes is developed to overcome the above quality problems. The ultimate aim of this paper is to conduct a literature survey in USEDM operations used by researchers among different applications using various materials. Also took a deep review in different prediction and optimization techniques used by researchers to obtain the optimal input parameters setting for getting an optimal solution in machining area.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"480 1","pages":"1487-1494"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75178852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of non-volatile 4×4 4T1D DRAM cell in 0.18μm technology 采用0.18μm技术实现非易失性4×4 4T1D DRAM单元
T. Joseph, Ajith Ravindran
This paper deals with the design and evolution of different 4×4 bit DRAM cells. Performances of different volatile 4×4 DRAM cells are compared. The comparison is done on the basis of power, area and delay. The 4×4 Non-Volatile (NVDRAM 4T1D) cell is proposed. The performance of the NVDRAM is then examined. The schematic entry was done using Mentor Graphics Design architect and simulations are done using Mentor Graphics Eldo. The simulation results obtained with TSMC 0.18μm process technology at 1.8V.
本文讨论了不同4×4位DRAM单元的设计和发展。比较了不同挥发性4×4 DRAM电池的性能。从功率、面积和时延三个方面进行了比较。提出了4×4非易失性(NVDRAM 4T1D)单元。然后检查NVDRAM的性能。原理图入口使用Mentor Graphics Design architect完成,仿真使用Mentor Graphics Eldo完成。仿真结果采用TSMC 0.18μm工艺在1.8V下得到。
{"title":"Implementation of non-volatile 4×4 4T1D DRAM cell in 0.18μm technology","authors":"T. Joseph, Ajith Ravindran","doi":"10.1109/ICCICCT.2014.6993001","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993001","url":null,"abstract":"This paper deals with the design and evolution of different 4×4 bit DRAM cells. Performances of different volatile 4×4 DRAM cells are compared. The comparison is done on the basis of power, area and delay. The 4×4 Non-Volatile (NVDRAM 4T1D) cell is proposed. The performance of the NVDRAM is then examined. The schematic entry was done using Mentor Graphics Design architect and simulations are done using Mentor Graphics Eldo. The simulation results obtained with TSMC 0.18μm process technology at 1.8V.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"507 1","pages":"435-439"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77348695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A survey on Z-source inverter z源逆变器研究进展
N. R. Sreeprathab, X. F. Joseph
In the established Voltage source inverter (VSI) and Current source inverter (CSI), are customized to get a new technology called as Z Source inverter. This highly developed Z Source technology has a set of connections of LC with revision, and traditional pulse width modulated signal which is used with modifications. In order to interconnect the main circuit to the power source, the Z Source inverter is being employed, which holds the distinctive impedance system. So as to overcome the concept and hypothetical obstacles and boundaries present in VSI and CSI, gives a fresh power conversion model. In this paper various topologies of Z Source inverters are reviewed and discussed.
在已建立的电压源逆变器(VSI)和电流源逆变器(CSI)中,分别定制得到一种新技术称为Z源逆变器。这种高度发达的Z源技术采用了一套带修正的LC连接和带修正的传统脉宽调制信号连接。为了将主电路与电源互连,采用Z源逆变器,该逆变器具有独特的阻抗系统。为了克服VSI和CSI中存在的概念和假设障碍和边界,给出了一种全新的功率转换模型。本文对Z源逆变器的各种拓扑结构进行了综述和讨论。
{"title":"A survey on Z-source inverter","authors":"N. R. Sreeprathab, X. F. Joseph","doi":"10.1109/ICCICCT.2014.6993182","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993182","url":null,"abstract":"In the established Voltage source inverter (VSI) and Current source inverter (CSI), are customized to get a new technology called as Z Source inverter. This highly developed Z Source technology has a set of connections of LC with revision, and traditional pulse width modulated signal which is used with modifications. In order to interconnect the main circuit to the power source, the Z Source inverter is being employed, which holds the distinctive impedance system. So as to overcome the concept and hypothetical obstacles and boundaries present in VSI and CSI, gives a fresh power conversion model. In this paper various topologies of Z Source inverters are reviewed and discussed.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"110 1","pages":"1406-1410"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78104541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1