首页 > 最新文献

2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]最新文献

英文 中文
Hybrid solar inverter for grid synchronization 用于电网同步的混合太阳能逆变器
M. Monisha, S. Jebaseelan, G. Nagarajan
The aim of this work is to provide security of supply by delivering uninterrupted power to critical loads and to grid. Two input sources are used in the proposed system. One of them is solar cell and another one is fuel cell. This paper presents simulation circuit for proposed system and simulation results.
这项工作的目的是通过向关键负载和电网输送不间断的电力来提供供电安全。在提出的系统中使用了两个输入源。其中一个是太阳能电池,另一个是燃料电池。本文给出了该系统的仿真电路和仿真结果。
{"title":"Hybrid solar inverter for grid synchronization","authors":"M. Monisha, S. Jebaseelan, G. Nagarajan","doi":"10.1109/ICCPCT.2015.7159275","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159275","url":null,"abstract":"The aim of this work is to provide security of supply by delivering uninterrupted power to critical loads and to grid. Two input sources are used in the proposed system. One of them is solar cell and another one is fuel cell. This paper presents simulation circuit for proposed system and simulation results.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83251857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A new gate for low cost design of all-optical reversible logic circuit 一种用于全光可逆逻辑电路低成本设计的新型栅极
Mukut Bihari Malav, Shubham Gupta, S. Jain
Reversible computing offers a possible solution for high performance computing and low power consumption. For hardware implementation of reversible logic, optical computers are emerging as one of the promising alternative. Recently, in the literature, reversible logic gates and combinational circuits have been proposed in optical domain using Semiconductor Optical Amplifier (SOA) based Mach Zehnder interferometer (MZI) switches due to its significant advantages such as high speed, low power, fast switching and ease of fabrication. Optical reversible designs have used ad-hoc approaches and require high cost in terms of MZI switches, Beam Splitters (BS), and Beam Combiners (BC) as well as optical delay. In this work, an optical reversible MNOT gate and all-optical realization of 4×4 Toffoli Gate have been proposed which is used in all-optical realization of optimized reversible combinational circuits. A general design approach to realize all-optical reversible circuits based on MZI switches has been proposed first time in the literature. Optimized all-optical reversible 2×1 multiplexer and full adder circuits have been designed using these proposed gates and design approach. All-optical reversible designs of 4×1 multiplexer, 1×4 Demultiplexer and 3to8 Decoder circuits have also been presented in this work first time in the literature. Our results have shown significant improvements over existing designs in terms of MZI switches, BS, BC and optical delay.
可逆计算为高性能计算和低功耗提供了一种可能的解决方案。对于可逆逻辑的硬件实现,光学计算机正成为一种有前途的替代方案。近年来,基于半导体光放大器(SOA)的Mach - Zehnder干涉仪(MZI)开关由于具有高速、低功耗、快速开关和易于制造等显著优点,在光学领域提出了可逆逻辑门和组合电路。光学可逆设计使用了自组织方法,并且在MZI开关,分束器(BS)和束合并器(BC)以及光延迟方面需要高成本。在这项工作中,提出了一种光学可逆MNOT门和4×4 Toffoli门的全光实现,用于优化可逆组合电路的全光实现。在文献中首次提出了一种基于MZI开关实现全光可逆电路的通用设计方法。优化的全光可逆2×1多路复用器和全加法器电路已设计使用这些提出的门和设计方法。在文献中首次提出了4×1多路复用器、1×4解路复用器和3to8解码器电路的全光可逆设计。我们的研究结果表明,在MZI开关、BS、BC和光延迟方面,现有的设计有了显著的改进。
{"title":"A new gate for low cost design of all-optical reversible logic circuit","authors":"Mukut Bihari Malav, Shubham Gupta, S. Jain","doi":"10.1109/ICCPCT.2015.7159381","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159381","url":null,"abstract":"Reversible computing offers a possible solution for high performance computing and low power consumption. For hardware implementation of reversible logic, optical computers are emerging as one of the promising alternative. Recently, in the literature, reversible logic gates and combinational circuits have been proposed in optical domain using Semiconductor Optical Amplifier (SOA) based Mach Zehnder interferometer (MZI) switches due to its significant advantages such as high speed, low power, fast switching and ease of fabrication. Optical reversible designs have used ad-hoc approaches and require high cost in terms of MZI switches, Beam Splitters (BS), and Beam Combiners (BC) as well as optical delay. In this work, an optical reversible MNOT gate and all-optical realization of 4×4 Toffoli Gate have been proposed which is used in all-optical realization of optimized reversible combinational circuits. A general design approach to realize all-optical reversible circuits based on MZI switches has been proposed first time in the literature. Optimized all-optical reversible 2×1 multiplexer and full adder circuits have been designed using these proposed gates and design approach. All-optical reversible designs of 4×1 multiplexer, 1×4 Demultiplexer and 3to8 Decoder circuits have also been presented in this work first time in the literature. Our results have shown significant improvements over existing designs in terms of MZI switches, BS, BC and optical delay.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80578541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Game-theoretic approach towards network security: A review 网络安全的博弈论研究综述
Litti Tom
Advancements in information technology has increased the use of internet. With the pervasiveness of internet, network security has become critical issue in every organization. Network attacks results in massive amount of loss in terms of money, reputation and data confidentiality. Reducing or eliminating the negative effects of any intrusion is a fundamental issue of network security. The network security problem can be represented as a game between the attacker or intruder and the network administrator where both the players try to attain maximum outcome. The network administrator tries to defend the attack and the attacker tries to overcome it and attack the system. Thus network security can be enforced using game theoretic approach. This paper presents a review of game theoretic solutions developed for network security.
信息技术的进步增加了互联网的使用。随着互联网的普及,网络安全已成为每个组织的关键问题。网络攻击会导致大量的金钱、声誉和数据机密性损失。减少或消除任何入侵的负面影响是网络安全的基本问题。网络安全问题可以表示为攻击者或入侵者与网络管理员之间的博弈,双方都试图获得最大的结果。网络管理员试图防御攻击,而攻击者试图克服攻击并攻击系统。因此,可以利用博弈论的方法来加强网络安全。本文综述了针对网络安全问题的博弈论解决方案。
{"title":"Game-theoretic approach towards network security: A review","authors":"Litti Tom","doi":"10.1109/ICCPCT.2015.7159364","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159364","url":null,"abstract":"Advancements in information technology has increased the use of internet. With the pervasiveness of internet, network security has become critical issue in every organization. Network attacks results in massive amount of loss in terms of money, reputation and data confidentiality. Reducing or eliminating the negative effects of any intrusion is a fundamental issue of network security. The network security problem can be represented as a game between the attacker or intruder and the network administrator where both the players try to attain maximum outcome. The network administrator tries to defend the attack and the attacker tries to overcome it and attack the system. Thus network security can be enforced using game theoretic approach. This paper presents a review of game theoretic solutions developed for network security.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83792499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Effective intrusion detection method for Manets using EAACK 基于EAACK的网络入侵检测方法
M. Sherine
The movement to remote system from wired system has been a worldwide pattern in the recent decades. The versatility what's more adaptability brought by remote system made it conceivable in numerous applications. Among all the contemporary remote systems, Mobile Ad hoc Network (MANET) is a standout amongst the most imperative and special applications. On the in spite of conventional system structural engineering, MANET does not oblige an altered system base; each and every hub functions as both a transmitter and a collector. Hubs correspond specifically with one another when they are both inside the same correspondence range. Else, they depend on their neighbors to transfer messages. The planning toward oneself capacity of hubs in MANET made it prominent among basic mission applications like military utilization or crisis recuperation. On the other hand, the open medium and wide dissemination of hubs make MANET defenseless against malignant assailants. For this situation, it is essential to create proficient interruption identification instruments to ensure MANET from assaults. With the changes of the innovation furthermore cut in equipment costs, we are seeing a current pattern of growing Manets into mechanical applications. To acclimate to such pattern, we unequivocally accept that it is crucial to address its potential security issues. In this paper, we propose and actualize another interruption recognition framework named Enhanced Adaptive Acknowledgment (EAACK) uniquely intended for Manets using JAVA programming platform. Analyzed to contemporary methodologies, EAACK shows higher malevolent conduct location rates in specific circumstances while does not significantly influence the system exhibitions.
近几十年来,有线系统向远程系统的转变已成为世界范围内的一种趋势。远程系统所带来的多功能性和更强的适应性使其在众多应用中成为可能。在所有当代远程系统中,移动自组织网络(MANET)是最重要和最特殊的应用之一。尽管传统的系统结构工程,MANET不要求改变系统基础;每个集线器的功能都是发送器和收集器。当集线器处于相同的通信范围中时,它们会特别地相互对应。否则,它们依赖于它们的邻居来传输消息。MANET中对枢纽自身能力的规划使其在军事利用或危机恢复等基本任务应用中突出。另一方面,开放的媒介和集线器的广泛传播使MANET对恶性攻击者毫无防备。在这种情况下,必须创建熟练的中断识别工具,以确保MANET免受攻击。随着创新的变化进一步降低了设备成本,我们看到目前马奈在机械应用中的发展模式。为了适应这种模式,我们毫不含糊地承认,解决其潜在的安全问题至关重要。在本文中,我们提出并实现了另一个中断识别框架,称为增强自适应识别(EAACK),该框架专门用于使用JAVA编程平台的Manets。以当代方法分析,EAACK在特定情况下显示出较高的恶意行为定位率,但对系统展示没有显著影响。
{"title":"Effective intrusion detection method for Manets using EAACK","authors":"M. Sherine","doi":"10.1109/ICCPCT.2015.7159354","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159354","url":null,"abstract":"The movement to remote system from wired system has been a worldwide pattern in the recent decades. The versatility what's more adaptability brought by remote system made it conceivable in numerous applications. Among all the contemporary remote systems, Mobile Ad hoc Network (MANET) is a standout amongst the most imperative and special applications. On the in spite of conventional system structural engineering, MANET does not oblige an altered system base; each and every hub functions as both a transmitter and a collector. Hubs correspond specifically with one another when they are both inside the same correspondence range. Else, they depend on their neighbors to transfer messages. The planning toward oneself capacity of hubs in MANET made it prominent among basic mission applications like military utilization or crisis recuperation. On the other hand, the open medium and wide dissemination of hubs make MANET defenseless against malignant assailants. For this situation, it is essential to create proficient interruption identification instruments to ensure MANET from assaults. With the changes of the innovation furthermore cut in equipment costs, we are seeing a current pattern of growing Manets into mechanical applications. To acclimate to such pattern, we unequivocally accept that it is crucial to address its potential security issues. In this paper, we propose and actualize another interruption recognition framework named Enhanced Adaptive Acknowledgment (EAACK) uniquely intended for Manets using JAVA programming platform. Analyzed to contemporary methodologies, EAACK shows higher malevolent conduct location rates in specific circumstances while does not significantly influence the system exhibitions.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79212006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Control of a large scale single stage grid connected PV system using fuzzy controller with capacitor assisted extended boost quasi Z source inverter (CAEB qZSI) 电容辅助扩展升压准Z源逆变器(CAEB qZSI)模糊控制器控制大型单级并网光伏系统
Sruthi S. Nair, N. Hemalatha, N. Ramesh
This projects describes about a grid connected three-phase, single-stage photovoltaic (PV) system using fuzzy controller with Capacitor assisted extended boost qZSI topologies (CAEB qZSI). This new scheme has higher efficiency and simple power electronic converter topology compared to two-stage PV system. The control objectives such as maximum power point tracking (MPPT), synchronization with grid, current control, and harmonic reduction in output current are realized in only one stage. A grid connected PV system with MPPT and reactive power injection capability into the utility grid is achieved using grid synchronisation. Park's d-q transformation technique is used by using filtered three-phase grid voltage for current controlling. To regulate the DC-link voltage a modified voltage controller using feedback linearization scheme with feed forward PV current signal is proposed. Reactive power feeding into the grid is also realized. To perform several simulations, MATLAB R2013b software environment is used.
本项目描述了一个使用模糊控制器和电容辅助扩展升压qZSI拓扑(CAEB qZSI)的并网三相单级光伏(PV)系统。与两级光伏系统相比,该方案具有更高的效率和简单的电力电子变换器拓扑。最大功率点跟踪(MPPT)、与电网同步、电流控制、输出电流谐波抑制等控制目标只需一级即可实现。通过电网同步,实现了具有MPPT和无功功率注入能力的并网光伏系统。Park’s d-q变换技术是利用滤波后的三相电网电压进行电流控制。为了调节直流电压,提出了一种采用前馈PV电流信号反馈线性化的电压控制器。无功馈入电网也得以实现。采用MATLAB R2013b软件环境进行仿真。
{"title":"Control of a large scale single stage grid connected PV system using fuzzy controller with capacitor assisted extended boost quasi Z source inverter (CAEB qZSI)","authors":"Sruthi S. Nair, N. Hemalatha, N. Ramesh","doi":"10.1109/ICCPCT.2015.7159273","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159273","url":null,"abstract":"This projects describes about a grid connected three-phase, single-stage photovoltaic (PV) system using fuzzy controller with Capacitor assisted extended boost qZSI topologies (CAEB qZSI). This new scheme has higher efficiency and simple power electronic converter topology compared to two-stage PV system. The control objectives such as maximum power point tracking (MPPT), synchronization with grid, current control, and harmonic reduction in output current are realized in only one stage. A grid connected PV system with MPPT and reactive power injection capability into the utility grid is achieved using grid synchronisation. Park's d-q transformation technique is used by using filtered three-phase grid voltage for current controlling. To regulate the DC-link voltage a modified voltage controller using feedback linearization scheme with feed forward PV current signal is proposed. Reactive power feeding into the grid is also realized. To perform several simulations, MATLAB R2013b software environment is used.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83182098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An implementation of mobile control room environment in android platform for industrial applications 在android平台上实现工业应用的移动控制室环境
T. Jerry Alexander
In recent years there is a vast technology improvements in industrial control rooms for monitoring the entire field of Industrial plants. High end PLC's are being implemented for controlling the entire process of fields. But a problem is that even though automation takes the complete control of total plants few authentication and manual actions are needed from user side for completing the control action. Hence there is a must situation for users presence at all times in the control room for taking some timely needed control actions. Due to the static nature of control room environment, the user should always be static to monitor the process. The proposed system approach provides a good solution to this problem. The whole control room environment is additionally implemented in the arduino-android platform and the same is communicated to the process through Wi-Fi / Bluetooth / GPRS. Now the user in control room can be mobile at anytime, anywhere to monitor and control the whole plant. An arduino uno board is used here for acquiring process control parameters from the sensors and transmitting it via a Bluetooth module to an android device. Hence the parameter values can be monitored and stored simultaneously.
近年来,工业控制室在监控整个工业工厂领域方面取得了巨大的技术进步。高端PLC正在被用于控制油田的整个过程。但问题是,即使自动化完全控制了整个工厂,完成控制操作也只需要用户进行很少的认证和手动操作。因此,用户必须时刻在控制室中,以便及时采取必要的控制行动。由于控制室环境的静态性质,用户应始终以静态方式监控过程。提出的系统方法很好地解决了这一问题。整个控制室环境另外在arduino-android平台上实现,并通过Wi-Fi /蓝牙/ GPRS与流程通信。现在控制室的用户可以随时随地移动,对整个工厂进行监控和控制。这里使用arduino uno板从传感器获取过程控制参数,并通过蓝牙模块将其传输到android设备。因此,可以同时监控和存储参数值。
{"title":"An implementation of mobile control room environment in android platform for industrial applications","authors":"T. Jerry Alexander","doi":"10.1109/ICCPCT.2015.7159269","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159269","url":null,"abstract":"In recent years there is a vast technology improvements in industrial control rooms for monitoring the entire field of Industrial plants. High end PLC's are being implemented for controlling the entire process of fields. But a problem is that even though automation takes the complete control of total plants few authentication and manual actions are needed from user side for completing the control action. Hence there is a must situation for users presence at all times in the control room for taking some timely needed control actions. Due to the static nature of control room environment, the user should always be static to monitor the process. The proposed system approach provides a good solution to this problem. The whole control room environment is additionally implemented in the arduino-android platform and the same is communicated to the process through Wi-Fi / Bluetooth / GPRS. Now the user in control room can be mobile at anytime, anywhere to monitor and control the whole plant. An arduino uno board is used here for acquiring process control parameters from the sensors and transmitting it via a Bluetooth module to an android device. Hence the parameter values can be monitored and stored simultaneously.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86957313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Enhancement of output voltage quality of multi level inverter using series active filter 采用串联有源滤波器提高多电平逆变器输出电压质量
S. Parthasarathy, S. Karthickkumar, Pg Scholar, S. Rahini
In modern power electronic world, inverter is widely used to satisfy industrial needs, such as Adjustable Speed Drives (ASD), arc furnaces, UPS and used in renewable energy sector in order to integrate solar panel into grid. During this conversion process, waveform distortion induced in the output side of inverter. The waveform distortion occurs due to harmonics created by those devices, which results in devastation effects in industry and in power grid. In order to avoid those problems, Seven Level Inverter is proposed and controlled by Phase Shift Carrier Pulse Width Modulation (PSC-PWM) technique. The output voltage quality of this Multi Level Inverter is to be enhanced with help of Series Active Filter (SeAF), which injects compensation voltage generated by control theory of instantaneous real and reactive power theory by means of series injection transformer. In this paper, the effectiveness of Series Active Filter has to be analyzed in terms of voltage harmonic performance under different modulation indexes and switching frequencies the help of MATLAB/Simulink 2010.
在现代电力电子领域,逆变器被广泛用于满足工业需求,如可调速驱动器(ASD)、电弧炉、UPS等,并用于可再生能源领域,以将太阳能电池板并入电网。在此转换过程中,逆变器输出侧会产生波形畸变。由于这些设备产生的谐波导致了波形失真,这对工业和电网造成了破坏性影响。为了避免这些问题,提出了七电平逆变器,并采用相移载波脉宽调制(PSC-PWM)技术进行控制。串联有源滤波器(SeAF)通过串联注入变压器注入瞬时实功率和无功功率控制理论产生的补偿电压,提高了多电平逆变器的输出电压质量。本文借助MATLAB/Simulink 2010分析了串联有源滤波器在不同调制指标和开关频率下的电压谐波性能。
{"title":"Enhancement of output voltage quality of multi level inverter using series active filter","authors":"S. Parthasarathy, S. Karthickkumar, Pg Scholar, S. Rahini","doi":"10.1109/ICCPCT.2015.7159333","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159333","url":null,"abstract":"In modern power electronic world, inverter is widely used to satisfy industrial needs, such as Adjustable Speed Drives (ASD), arc furnaces, UPS and used in renewable energy sector in order to integrate solar panel into grid. During this conversion process, waveform distortion induced in the output side of inverter. The waveform distortion occurs due to harmonics created by those devices, which results in devastation effects in industry and in power grid. In order to avoid those problems, Seven Level Inverter is proposed and controlled by Phase Shift Carrier Pulse Width Modulation (PSC-PWM) technique. The output voltage quality of this Multi Level Inverter is to be enhanced with help of Series Active Filter (SeAF), which injects compensation voltage generated by control theory of instantaneous real and reactive power theory by means of series injection transformer. In this paper, the effectiveness of Series Active Filter has to be analyzed in terms of voltage harmonic performance under different modulation indexes and switching frequencies the help of MATLAB/Simulink 2010.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86985708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A survey of equalization techniques for an effective equalizer design in MIMO-OFDM systems MIMO-OFDM系统中有效均衡器设计的均衡技术综述
N. S. Randhawa, Shally Sharma, R. Dubey
The wireless MIMO-OFDM technology with its innovative features has improved the data rates to a very high extent. A collective set of parameters decides the performance of a system. The paper addresses the problem of ISI in MIMO-OFDM system which degrades its error performance and occurs due to the varying nature of wireless communication channels. The estimation is one of the way the channel behavior is examined and the equalization process would equalize those effects by altering the channel response according to the estimated behavior. Numbers of equalization techniques are there in the literature which works on removing the ISI and improving the BER (Bit Error Rate). The paper has provided an in depth understanding of the various equalizers and the comprehensive survey of all these equalizers.
无线MIMO-OFDM技术以其创新的特性极大地提高了数据传输速率。一组参数决定了系统的性能。本文研究了MIMO-OFDM系统中由于无线通信信道性质的变化而产生的误码干扰问题,该问题降低了MIMO-OFDM系统的误差性能。估计是检查信道行为的一种方式,均衡过程将通过根据估计的行为改变信道响应来平衡这些影响。文献中有许多均衡技术用于消除ISI和提高误码率(BER)。本文对各种均衡器进行了深入的了解,并对所有这些均衡器进行了全面的综述。
{"title":"A survey of equalization techniques for an effective equalizer design in MIMO-OFDM systems","authors":"N. S. Randhawa, Shally Sharma, R. Dubey","doi":"10.1109/ICCPCT.2015.7159297","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159297","url":null,"abstract":"The wireless MIMO-OFDM technology with its innovative features has improved the data rates to a very high extent. A collective set of parameters decides the performance of a system. The paper addresses the problem of ISI in MIMO-OFDM system which degrades its error performance and occurs due to the varying nature of wireless communication channels. The estimation is one of the way the channel behavior is examined and the equalization process would equalize those effects by altering the channel response according to the estimated behavior. Numbers of equalization techniques are there in the literature which works on removing the ISI and improving the BER (Bit Error Rate). The paper has provided an in depth understanding of the various equalizers and the comprehensive survey of all these equalizers.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89461317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Comparison of DTW score and warping path for text dependent speaker verification system 基于文本的说话人验证系统中DTW分数与扭曲路径的比较
T. Das, Songhita Misra, S. P. Choudhury, D. K. Sah, U. Baruah, R. Laskar
Dynamic Time Warping has always been a popular technique for pattern matching of two speech samples for Automatic Speaker Recognition. DTW score evaluated from the minimum distance matrix is generally used to identify the similarity between two speech samples and thereby giving a decision for the Text Dependent Speaker Verification system. This paper discusses a system based on DTW trace back path for the alignment of two speech samples for the decisions are thereby compared with the performance of the system with the system based on DTW Score. The result shows a significant improvement in the performance of the system suggesting that the trace back path provides a better similarity measure as compared to that of the DTW Score.
动态时间翘曲一直是自动说话人识别中常用的两种语音样本模式匹配技术。从最小距离矩阵评估的DTW分数通常用于识别两个语音样本之间的相似度,从而为文本依赖说话人验证系统提供决策。本文讨论了一种基于DTW回溯路径的系统,用于对两个语音样本进行比对,从而将该系统的性能与基于DTW Score的系统进行比较。结果表明,系统的性能有了显著的提高,这表明与DTW Score相比,追溯路径提供了更好的相似性度量。
{"title":"Comparison of DTW score and warping path for text dependent speaker verification system","authors":"T. Das, Songhita Misra, S. P. Choudhury, D. K. Sah, U. Baruah, R. Laskar","doi":"10.1109/ICCPCT.2015.7159305","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159305","url":null,"abstract":"Dynamic Time Warping has always been a popular technique for pattern matching of two speech samples for Automatic Speaker Recognition. DTW score evaluated from the minimum distance matrix is generally used to identify the similarity between two speech samples and thereby giving a decision for the Text Dependent Speaker Verification system. This paper discusses a system based on DTW trace back path for the alignment of two speech samples for the decisions are thereby compared with the performance of the system with the system based on DTW Score. The result shows a significant improvement in the performance of the system suggesting that the trace back path provides a better similarity measure as compared to that of the DTW Score.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91346239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A security framework for brokerless publish subscribe system using identity based signcryption 使用基于身份的签名加密的无代理发布订阅系统的安全框架
P. Anusree, S. Sreedhar
Publish subscribe communication paradigm has been recognized as the most promising communication paradigms for information dissemination in large scale distributed environment. It has been used in a variety of applications ranging from personalized information dissemination to a wide range of group communications. So publish subscribe system needs to fulfill the basic security demands of these information dissemination applications. Confidentiality, authentication, data integrity and non repudiation are the most important security services in security environment. Encryption and signature are the basic cryptographic tools for achieving these security services in communication system. This paper presents a novel approach to provide all the basic aspects of security such as confidentiality, authentication, integrity and Non-repudiation in broker-less content based publish subscribe system along with forward secrecy and unforgeability. The scheme use identity based signcryption technique and that can effectively reduces the computational cost and communication overhead.
发布订阅通信范式已被公认为是大规模分布式环境中最有前途的信息传播通信范式。它已被用于各种应用,从个性化信息传播到广泛的群体通信。因此,发布订阅系统需要满足这些信息传播应用的基本安全需求。机密性、身份验证、数据完整性和不可否认性是安全环境中最重要的安全服务。加密和签名是通信系统中实现这些安全服务的基本密码学工具。提出了一种在无代理的基于内容的发布订阅系统中提供机密性、身份验证、完整性和不可否认性等所有基本安全方面的新方法,并具有前向保密性和不可伪造性。该方案采用基于身份的签名加密技术,可以有效地降低计算成本和通信开销。
{"title":"A security framework for brokerless publish subscribe system using identity based signcryption","authors":"P. Anusree, S. Sreedhar","doi":"10.1109/ICCPCT.2015.7159270","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159270","url":null,"abstract":"Publish subscribe communication paradigm has been recognized as the most promising communication paradigms for information dissemination in large scale distributed environment. It has been used in a variety of applications ranging from personalized information dissemination to a wide range of group communications. So publish subscribe system needs to fulfill the basic security demands of these information dissemination applications. Confidentiality, authentication, data integrity and non repudiation are the most important security services in security environment. Encryption and signature are the basic cryptographic tools for achieving these security services in communication system. This paper presents a novel approach to provide all the basic aspects of security such as confidentiality, authentication, integrity and Non-repudiation in broker-less content based publish subscribe system along with forward secrecy and unforgeability. The scheme use identity based signcryption technique and that can effectively reduces the computational cost and communication overhead.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90417842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1