首页 > 最新文献

2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)最新文献

英文 中文
Experimental evaluation of PID and ESO controller for instrument landing system 仪表着陆系统PID和ESO控制器的实验评价
Rahul Jain, P. Shetty, Satyanarayan Shenoy
This paper presents methodologies for design and experimental evaluation of both Proportional Integral and Derivative (PID) and Extended State Observer (ESO) controller for auto landing system. The process of auto landing can be experimentally described as second-order model for ESO controller. A PID controller and ESO controller is proposed to achieve the desired response for the autoland system. Computer simulations are performed to illustrate the performance of PID and ESO controller in comparison to each other. The applicability and usefulness of the proposed control scheme are well exemplified by conducting experiments on an aircraft model. Both simulations and experimental results reveal that the proposed PID and ESO scheme performs equally.
本文介绍了自动着陆系统的比例积分与导数(PID)控制器和扩展状态观测器(ESO)控制器的设计和实验评估方法。自动着陆过程可以用ESO控制器的二阶模型进行实验描述。提出了PID控制器和ESO控制器来实现自动著陆系统的期望响应。通过计算机仿真,比较了PID和ESO控制器的性能。通过对某型飞机模型的实验,验证了所提控制方案的适用性和有效性。仿真和实验结果表明,所提出的PID和ESO方案性能相当。
{"title":"Experimental evaluation of PID and ESO controller for instrument landing system","authors":"Rahul Jain, P. Shetty, Satyanarayan Shenoy","doi":"10.1109/ICCICCT.2014.6993059","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993059","url":null,"abstract":"This paper presents methodologies for design and experimental evaluation of both Proportional Integral and Derivative (PID) and Extended State Observer (ESO) controller for auto landing system. The process of auto landing can be experimentally described as second-order model for ESO controller. A PID controller and ESO controller is proposed to achieve the desired response for the autoland system. Computer simulations are performed to illustrate the performance of PID and ESO controller in comparison to each other. The applicability and usefulness of the proposed control scheme are well exemplified by conducting experiments on an aircraft model. Both simulations and experimental results reveal that the proposed PID and ESO scheme performs equally.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"24 1","pages":"751-757"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81867914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A tutorial review on data compression with detection of fetal heart beat from noisy ECG 基于噪声心电检测胎儿心跳的数据压缩技术综述
Bommepalli Madhava Reddy, T. Subbareddy, Saureddy Omkar Reddy, V. Elamaran
FECG (Fetal Electrocardiogram) signal convey information in making timely decisions during pregnancy. It is very important to extract and detect the FECG signal from a composite maternal abdominal signals for task of fetal monitoring. We implement adaptive filters for the task of separation of FECG signal from the abdominal ECG signal and understand its nature. A Least Mean Square (LMS) algorithm is implemented for the purpose of detection adaptively. Data compression techniques are implemented foe the filtered ECG signal for the purpose of easy storage and transmission. Since the data is more important and sensitive, it is necessary to implement lossless compression with high compression ratio by reducing the redundancy involved in the ECG signal with low noise. A Fast Fourier Transform, Discrete Cosine Transform (DCT), DCT-II and Discrete Sine Transform (DST) methods are used here for the purpose of compression. The performance metrics like compression ratio, low percent mean square (PRD) are compared and the results are tabulated by using Matlab software tool.
胎儿心电图(FECG)信号为孕期及时决策提供信息。从母体腹部的复合信号中提取和检测胎儿的FECG信号对胎儿的监测任务具有重要意义。我们实现了从腹心电信号中分离脑电图信号的自适应滤波器,并了解了其性质。采用最小均方(LMS)算法实现自适应检测。为了便于存储和传输,对滤波后的心电信号进行了数据压缩技术。由于数据更为重要和敏感,因此有必要通过减少低噪声心电信号所涉及的冗余来实现高压缩比的无损压缩。这里使用快速傅立叶变换、离散余弦变换(DCT)、DCT- ii和离散正弦变换(DST)方法进行压缩。利用Matlab软件工具对压缩比、低均方百分比(PRD)等性能指标进行了比较,并将结果制成表格。
{"title":"A tutorial review on data compression with detection of fetal heart beat from noisy ECG","authors":"Bommepalli Madhava Reddy, T. Subbareddy, Saureddy Omkar Reddy, V. Elamaran","doi":"10.1109/ICCICCT.2014.6993163","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993163","url":null,"abstract":"FECG (Fetal Electrocardiogram) signal convey information in making timely decisions during pregnancy. It is very important to extract and detect the FECG signal from a composite maternal abdominal signals for task of fetal monitoring. We implement adaptive filters for the task of separation of FECG signal from the abdominal ECG signal and understand its nature. A Least Mean Square (LMS) algorithm is implemented for the purpose of detection adaptively. Data compression techniques are implemented foe the filtered ECG signal for the purpose of easy storage and transmission. Since the data is more important and sensitive, it is necessary to implement lossless compression with high compression ratio by reducing the redundancy involved in the ECG signal with low noise. A Fast Fourier Transform, Discrete Cosine Transform (DCT), DCT-II and Discrete Sine Transform (DST) methods are used here for the purpose of compression. The performance metrics like compression ratio, low percent mean square (PRD) are compared and the results are tabulated by using Matlab software tool.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"7 1","pages":"1310-1314"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82363753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
OFDM baseband receiver performance analysis for various received signal impairments OFDM基带接收机的各种接收信号损伤性能分析
Rini Maria James, I. Mahalakshmi, M. Rangachar
Orthogonal Frequency Division Multiplexing (OFDM) is a digital transmission technique used both in wired and wireless communication systems to achieve higher data rates. The idea of OFDM is to split the total transmission bandwidth into a number of orthogonal subcarriers which are transmitted in parallel. In this paper the performance of OFDM baseband receiver is analyzed for various received signal impairments. The impairments considered includes phase offset, frequency offset and synchronization mismatches. Finally the quantization of these observations are carried out.
正交频分复用(OFDM)是一种用于有线和无线通信系统的数字传输技术,以实现更高的数据速率。OFDM的思想是将总传输带宽分成若干正交的子载波,这些子载波并行传输。本文分析了OFDM基带接收机在各种接收信号损伤情况下的性能。所考虑的损害包括相位偏移、频率偏移和同步不匹配。最后对这些观测结果进行量化处理。
{"title":"OFDM baseband receiver performance analysis for various received signal impairments","authors":"Rini Maria James, I. Mahalakshmi, M. Rangachar","doi":"10.1109/ICCICCT.2014.6992991","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992991","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) is a digital transmission technique used both in wired and wireless communication systems to achieve higher data rates. The idea of OFDM is to split the total transmission bandwidth into a number of orthogonal subcarriers which are transmitted in parallel. In this paper the performance of OFDM baseband receiver is analyzed for various received signal impairments. The impairments considered includes phase offset, frequency offset and synchronization mismatches. Finally the quantization of these observations are carried out.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"22 1","pages":"382-387"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80387498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FPGA synthesis of area efficient data path for reconfigurable FIR filter 可重构FIR滤波器区域高效数据路径的FPGA合成
R. Saranya, C. Pradeep
Reconfigurable computing for DSP remains an active area of research as the need for integration with more traditional DSP technologies become apparent. Traditionally, most of the work in the field of reconfigurable computing was focused on fine-grained FPGA devices. Over the years, the focus was shifted from bit level granularity to a more coarse grained composition. In this paper, we present the synthesis of high-throughput and area efficient data path for reconfigurable Finite Impulse Response (FIR) filter. FIR filters have been and continue to be important building blocks in many DSP systems. It computes the output by multiplying a set of input samples with a set of coefficients followed by addition. Here, the multiplication and addition processess are based on the concept of Divide and Conquer approach. Separate multiplier and adder blocks are designed to model the FIR filter. The design was modeled using Verilog HDL and simulated and synthesized using Xilinx IS E 14.2. The design was also synthesized in Leonardo Spectrum. A comparison was made by implementing the design on different FPGA devices. The result shows that the proposed system has better device utilization in Virtex-5 FPGA.
随着与更传统的DSP技术集成的需求日益明显,DSP的可重构计算仍然是一个活跃的研究领域。传统上,可重构计算领域的大部分工作都集中在细粒度FPGA器件上。多年来,焦点从位级粒度转移到更粗粒度的组合。本文提出了一种用于可重构有限脉冲响应(FIR)滤波器的高通量和面积高效数据路径的合成方法。FIR滤波器已经并将继续是许多DSP系统的重要组成部分。它通过将一组输入样本与一组系数相乘,然后进行加法来计算输出。在这里,乘法和加法的过程是基于分治法的概念。单独的乘法器和加法器模块被设计用来模拟FIR滤波器。设计采用Verilog HDL进行建模,采用Xilinx IS E 14.2进行仿真合成。该设计也在Leonardo Spectrum中合成。通过在不同FPGA器件上的实现,对设计进行了比较。结果表明,该系统在Virtex-5 FPGA上具有较好的器件利用率。
{"title":"FPGA synthesis of area efficient data path for reconfigurable FIR filter","authors":"R. Saranya, C. Pradeep","doi":"10.1109/ICCICCT.2014.6992985","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992985","url":null,"abstract":"Reconfigurable computing for DSP remains an active area of research as the need for integration with more traditional DSP technologies become apparent. Traditionally, most of the work in the field of reconfigurable computing was focused on fine-grained FPGA devices. Over the years, the focus was shifted from bit level granularity to a more coarse grained composition. In this paper, we present the synthesis of high-throughput and area efficient data path for reconfigurable Finite Impulse Response (FIR) filter. FIR filters have been and continue to be important building blocks in many DSP systems. It computes the output by multiplying a set of input samples with a set of coefficients followed by addition. Here, the multiplication and addition processess are based on the concept of Divide and Conquer approach. Separate multiplier and adder blocks are designed to model the FIR filter. The design was modeled using Verilog HDL and simulated and synthesized using Xilinx IS E 14.2. The design was also synthesized in Leonardo Spectrum. A comparison was made by implementing the design on different FPGA devices. The result shows that the proposed system has better device utilization in Virtex-5 FPGA.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"11 1","pages":"349-354"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81668400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel approach for sequential pattern mining by using genetic algorithm 一种基于遗传算法的序列模式挖掘新方法
M. Saravanan, V. Jyothi
Web Usage Mining can be described as the discovery and analysis of user access pattern through mining of log files and associated data from a particular websites. Huge Number of visitors interact daily with web sites around the world. Huge amount of data are being produced and these in order could be very helpful to the company in the field of compliant customer's behaviors'. The world wide web contains increasing amount of websites which in turn contain increasing number of web pages. When a user visits a new website, it has to go through large number of web pages to meet their necessities. Web usage mining is the procedure of removing useful information from server logs. Hence, this work discovers sequential patterns of web files using genetic algorithm. This approach can be used to analyze the recent visitor's trend and lead to the creation of repeated and most visited pages. The purpose of using genetic algorithm is to find optimal sequential web pages.
Web使用情况挖掘可以描述为通过挖掘来自特定网站的日志文件和相关数据来发现和分析用户访问模式。每天有大量的访问者与世界各地的网站进行互动。大量的数据正在产生,这些数据在合规客户行为领域可能对公司非常有帮助。”万维网包含越来越多的网站,而这些网站又包含越来越多的网页。当一个用户访问一个新的网站,它必须通过大量的网页,以满足他们的需求。Web使用挖掘是从服务器日志中删除有用信息的过程。因此,本研究利用遗传算法发现网络文件的顺序模式。这种方法可以用来分析最近访问者的趋势,并导致创建重复和访问最多的页面。使用遗传算法的目的是寻找最优的顺序网页。
{"title":"A novel approach for sequential pattern mining by using genetic algorithm","authors":"M. Saravanan, V. Jyothi","doi":"10.1109/ICCICCT.2014.6992971","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992971","url":null,"abstract":"Web Usage Mining can be described as the discovery and analysis of user access pattern through mining of log files and associated data from a particular websites. Huge Number of visitors interact daily with web sites around the world. Huge amount of data are being produced and these in order could be very helpful to the company in the field of compliant customer's behaviors'. The world wide web contains increasing amount of websites which in turn contain increasing number of web pages. When a user visits a new website, it has to go through large number of web pages to meet their necessities. Web usage mining is the procedure of removing useful information from server logs. Hence, this work discovers sequential patterns of web files using genetic algorithm. This approach can be used to analyze the recent visitor's trend and lead to the creation of repeated and most visited pages. The purpose of using genetic algorithm is to find optimal sequential web pages.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"30 1","pages":"284-288"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82776544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A review on hyperspectral image compression 高光谱图像压缩研究进展
Sanjith S, Ganesan R
The growth of small satellite communication technologies, demands for data transmission and storage is rapidly increased. The advancements in computer technology and digital data processing techniques improves the efficiency of transmission and storage of data. Recently hyperspectral image compression has got considerable attention and so many researches had been made in this field and got positive results in compression ratio. In this paper we have made a state-of-the-art investigation about hyperspectral image compression which can be used in satellites onboard compression. Mainly this investigation is focused on lossy, lossless and near lossless compression methods and methodologies used to perform the compression. Topics covered includes Distributed Source Coding (DSC), Slepian-Wolf theory, M-CALIC, LAIS-LUT, FIVQ, DCT, JPEG2000 Multidimensional lattice vector quantization. As a final point the merits and demerits are discussed.
小卫星通信技术的发展,对数据传输和存储的需求迅速增加。计算机技术和数字数据处理技术的进步提高了数据传输和存储的效率。近年来,高光谱图像压缩受到了广泛的关注,在这一领域进行了大量的研究,并在压缩比方面取得了积极的成果。本文就高光谱图像压缩技术在卫星机载压缩中的应用进行了研究。本研究主要集中在有损、无损和接近无损的压缩方法和用于执行压缩的方法。涵盖的主题包括分布式源编码(DSC)、睡狼理论、M-CALIC、LAIS-LUT、FIVQ、DCT、JPEG2000多维点阵矢量量化。作为最后一点的优点和缺点进行了讨论。
{"title":"A review on hyperspectral image compression","authors":"Sanjith S, Ganesan R","doi":"10.1109/ICCICCT.2014.6993136","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993136","url":null,"abstract":"The growth of small satellite communication technologies, demands for data transmission and storage is rapidly increased. The advancements in computer technology and digital data processing techniques improves the efficiency of transmission and storage of data. Recently hyperspectral image compression has got considerable attention and so many researches had been made in this field and got positive results in compression ratio. In this paper we have made a state-of-the-art investigation about hyperspectral image compression which can be used in satellites onboard compression. Mainly this investigation is focused on lossy, lossless and near lossless compression methods and methodologies used to perform the compression. Topics covered includes Distributed Source Coding (DSC), Slepian-Wolf theory, M-CALIC, LAIS-LUT, FIVQ, DCT, JPEG2000 Multidimensional lattice vector quantization. As a final point the merits and demerits are discussed.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"76 3 1","pages":"1159-1163"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87856029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Mobile agent based security in MANETS against Sybil attack 基于移动代理的MANETS安全防御Sybil攻击
A. Aranganathan, C. Suriyakala
In this paper, we deal with mobile ad-hoc networks have emerged as a major next generation wireless technology. An attack in MANET is very vulnerable for all the layers. An attack acts as a malicious node which affects the network performance. Sybil attack is one of the severe attacks in network layer which creates confusion in the routing which can be detected and prevented by an Agent. Agent can able to update the routing information throughout the network and also to reduce the network load. In this research, we propose a mobile agent based scheme to detect the new identities of Sybil attackers without using centralized trusted third party or any extra hardware such as directional antenna or a geographical positioning system and also can be prevented by cryptographic system. The improved in the packet delivery ratio, reduced network overload and the improved bandwidth efficiency are performed using ns2 tool.
在本文中,我们讨论了移动自组织网络作为下一代主要无线技术的出现。MANET中的攻击对所有层都是非常脆弱的。攻击作为一个恶意节点,影响网络性能。Sybil攻击是一种严重的网络层攻击,它造成路由混乱,可以被Agent检测和阻止。代理可以在整个网络中更新路由信息,也可以减少网络负载。在本研究中,我们提出了一种基于移动代理的方案来检测Sybil攻击者的新身份,而无需使用集中式可信第三方或任何额外的硬件(如定向天线或地理定位系统),并且可以通过加密系统进行阻止。通过使用ns2工具,可以提高分组分发率,减少网络过载,提高带宽效率。
{"title":"Mobile agent based security in MANETS against Sybil attack","authors":"A. Aranganathan, C. Suriyakala","doi":"10.1109/ICCICCT.2014.6993170","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993170","url":null,"abstract":"In this paper, we deal with mobile ad-hoc networks have emerged as a major next generation wireless technology. An attack in MANET is very vulnerable for all the layers. An attack acts as a malicious node which affects the network performance. Sybil attack is one of the severe attacks in network layer which creates confusion in the routing which can be detected and prevented by an Agent. Agent can able to update the routing information throughout the network and also to reduce the network load. In this research, we propose a mobile agent based scheme to detect the new identities of Sybil attackers without using centralized trusted third party or any extra hardware such as directional antenna or a geographical positioning system and also can be prevented by cryptographic system. The improved in the packet delivery ratio, reduced network overload and the improved bandwidth efficiency are performed using ns2 tool.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"39 1","pages":"1338-1342"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86730977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance comparison of an error correction technique in memory 一种内存纠错技术的性能比较
Linz Elizabeth Kurian, B. Mathew
Memories are always sensitive to soft errors which affect memory reliability. A common method for protecting memories from soft errors is the use of Error Correcting Codes (ECC). As technology shrinks, Multiple Cell Upsets (MCU) pose a major issue in the reliability of memories exposed to radiation environments. Here a Decimal Matrix Code (DMC) based on divide-symbol is used to enhance memory reliability. Large number of redundant bits are used in this approach. A comparison was made by implementing the design by using different adder structures such as Ripple carry, Carry lookahead and Kogge Stone adder. The design was modeled using VHDL, simulated and synthesized using Xilinx IS E 14.2. The results show that the design implemented by using Kogge stone adder has higher performance.
存储器对软错误非常敏感,软错误会影响存储器的可靠性。保护存储器免受软错误的常用方法是使用纠错码(ECC)。随着技术的萎缩,多单元干扰(MCU)对暴露在辐射环境中的存储器的可靠性提出了一个主要问题。本文采用基于除号的十进制矩阵码(DMC)来提高存储器的可靠性。这种方法使用了大量的冗余位。通过使用Ripple进位法、carry超前法和Kogge Stone进位法等不同的加法器结构来实现设计,并进行了比较。设计采用VHDL进行建模,采用Xilinx IS E 14.2进行仿真合成。结果表明,采用Kogge石加法器实现的设计具有较高的性能。
{"title":"Performance comparison of an error correction technique in memory","authors":"Linz Elizabeth Kurian, B. Mathew","doi":"10.1109/ICCICCT.2014.6992986","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992986","url":null,"abstract":"Memories are always sensitive to soft errors which affect memory reliability. A common method for protecting memories from soft errors is the use of Error Correcting Codes (ECC). As technology shrinks, Multiple Cell Upsets (MCU) pose a major issue in the reliability of memories exposed to radiation environments. Here a Decimal Matrix Code (DMC) based on divide-symbol is used to enhance memory reliability. Large number of redundant bits are used in this approach. A comparison was made by implementing the design by using different adder structures such as Ripple carry, Carry lookahead and Kogge Stone adder. The design was modeled using VHDL, simulated and synthesized using Xilinx IS E 14.2. The results show that the design implemented by using Kogge stone adder has higher performance.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"39 1","pages":"355-359"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86983611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An integrated system for tracking and recognition using Kalman filter 基于卡尔曼滤波的跟踪与识别集成系统
A. Vijay, Anoop K. Johnson
Tracking of any object from a video scene becomes more critical not only for security applications but also for analyzing traffic. This system integrates low level image processing as well as high level image processing through online data model and offline data model for more efficiency and robustness. Also this makes the system to handle occlusion conditions and abrupt color intensity variation conditions. This system uses median filtering and blob extraction for moving object detection. The offline model employs high level image processing recognize the moving objects. Here the Kalman filter is used for effective tracking under complex situations.
从视频场景中跟踪任何对象不仅对安全应用,而且对流量分析变得更加重要。该系统通过在线数据模型和离线数据模型将低级图像处理和高级图像处理相结合,提高了系统的效率和鲁棒性。这也使得系统可以处理遮挡条件和突然的颜色强度变化条件。该系统采用中值滤波和斑点提取技术对运动目标进行检测。离线模型采用高级图像处理对运动物体进行识别。在这里,卡尔曼滤波用于复杂情况下的有效跟踪。
{"title":"An integrated system for tracking and recognition using Kalman filter","authors":"A. Vijay, Anoop K. Johnson","doi":"10.1109/ICCICCT.2014.6993118","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993118","url":null,"abstract":"Tracking of any object from a video scene becomes more critical not only for security applications but also for analyzing traffic. This system integrates low level image processing as well as high level image processing through online data model and offline data model for more efficiency and robustness. Also this makes the system to handle occlusion conditions and abrupt color intensity variation conditions. This system uses median filtering and blob extraction for moving object detection. The offline model employs high level image processing recognize the moving objects. Here the Kalman filter is used for effective tracking under complex situations.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"10 1","pages":"1065-1069"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85204647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Forensic investigation framework for P2P protocol P2P协议的取证调查框架
T. Manesh, M. Sha, K. Vivekanandan
Online sharing of digital assents have now become common in the internet by its increased number of users over a decade drastically. There are many online sharing resources which offer huge storage. These facilities tend the internet users to upload and download pirated softwares, movies and other similar digital assets which violates all copyrights. The P2P protocol is working behind such online sharing websites and resources. The cyber cell is very active now in various parts of the country to trace and fraudulent sharing of files when reported. So it is necessary to have an efficient mechanism to find the actual content which is being uploaded or downloaded from a particular machine as part of network forensic investigation. Usually P2P websites and services are blocked in enterprises and educational institutions to avoid sharing of unwanted digital assets and also to increase internet bandwidth. The proposed novel technique is based on network forensics which can be used for content level observation of P2P Bit Torrent protocol and regenerate original malicious content or session between malicious users for their prosecution in the court.
在过去的十年里,随着互联网用户数量的急剧增加,在线分享数字同意书已经变得很普遍。有许多在线共享资源提供了巨大的存储空间。这些设施促使互联网用户上传和下载盗版软件、电影和其他类似的侵犯版权的数字资产。P2P协议在这些在线共享网站和资源的背后起着作用。该网络小组现在在全国各地非常活跃,追踪和欺诈性共享文件。因此,作为网络取证调查的一部分,有必要建立一种有效的机制来查找正在从特定机器上传或下载的实际内容。通常,P2P网站和服务在企业和教育机构被封锁,以避免共享不必要的数字资产,并增加互联网带宽。该技术基于网络取证技术,可对P2P Bit Torrent协议进行内容级观察,并生成恶意用户之间的原始恶意内容或会话,为其在法庭上的起诉提供依据。
{"title":"Forensic investigation framework for P2P protocol","authors":"T. Manesh, M. Sha, K. Vivekanandan","doi":"10.1109/ICCICCT.2014.6992966","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992966","url":null,"abstract":"Online sharing of digital assents have now become common in the internet by its increased number of users over a decade drastically. There are many online sharing resources which offer huge storage. These facilities tend the internet users to upload and download pirated softwares, movies and other similar digital assets which violates all copyrights. The P2P protocol is working behind such online sharing websites and resources. The cyber cell is very active now in various parts of the country to trace and fraudulent sharing of files when reported. So it is necessary to have an efficient mechanism to find the actual content which is being uploaded or downloaded from a particular machine as part of network forensic investigation. Usually P2P websites and services are blocked in enterprises and educational institutions to avoid sharing of unwanted digital assets and also to increase internet bandwidth. The proposed novel technique is based on network forensics which can be used for content level observation of P2P Bit Torrent protocol and regenerate original malicious content or session between malicious users for their prosecution in the court.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"26 1","pages":"256-264"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89266524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1