Advanced Materials Research
Vol. 997
Vol. 997
Advanced Materials Research
Vol. 996
Vol. 996
Advanced Materials Research
Vol. 995
Vol. 995
Advanced Materials Research
Vols. 989-994
Vols. 989-994
Advanced Materials Research
Vol. 988
Vol. 988
Advanced Materials Research
Vols. 986-987
Vols. 986-987
Advanced Materials Research
Vols. 984-985
Vols. 984-985
Advanced Materials Research
Vol. 983
Vol. 983
Advanced Materials Research
Vol. 982
Vol. 982
Advanced Materials Research
Vol. 981
Vol. 981
Advanced Materials Research
Vol. 980
Vol. 980
Advanced Materials Research
Vol. 979
Vol. 979
Advanced Materials Research
Vol. 978
Vol. 978
Advanced Materials Research Vols. 984-985
Paper Title Page
Abstract: In modern power systems, distributed generation turns out to be progressively significant. Conversely, the growing utilize of distributed generators origins the concerns on the growing system hazard owing to their probable breakdown or unruly power productivity based on such renewable energy sources as wind and the sun. Power contribution at the required proportion by the grids is the chief performance consideration which depends upon the penetration of distributed generation and the accessibility of conventional sources during the load transform. In this paper, the projected approach is that the essential load power is divided evenly between the grids composed of Distributed Generation (DG) units and the utility based on the PSO algorithm during the load transform. A case study is carried out based on the New England test system (10-Generator-39-Bus) as a standard by using Particle swarm optimization (PSO) algorithm.
1301
Abstract: Cloud Computing is being intended to deliver information technology services based on internet on demand. The benefits of cloud technology are incomparable which takes the information technology into a new dimension. Organizations already invested for their own infrastructure are likely to set up private clouds to reap the benefits of cloud computing technologies. Cloud services are thriving by the open source software OpenStack. In this paper, we aim to introduce the largest open-source cloud operating system OpenStack with a new authentication mechanism. This paper tries to address the challenge of finding legitimate users by introducing One Time Password (OTP) as an authentication mechanism in OpenStack. Replay attacks can be defeated by using One Time Password. The OTP mechanism provides an extra level of protection which makes it extremely difficult for any potential intruder to abuse the recorded password that was already used to log into cloud service. The integration of OTP mechanism into OpenStack allows users to protect their credentials from unauthorized access. Also One Time Password is used to grant access to legitimate users into the cloud environment and to prevent access to malicious users bot attacks.With secured cloud environment users can enjoy lot many benefits of private cloud service.
1309
Abstract: One of the emerging techniques is cloud computing. This cloud service provides the access to the computers and their resources virtually through different models like public, private and hybrid. This paper concentrates in setting up a private cloud using the open source software “OpenStack”. The existing dashboard Horizon shows the memory size and number of virtual CPUs allocated to each instance but does not give the summary of the resources consumed on the whole by the host. We focus on creating a chrome extension that provides the state of the instances and total amount of resources consumed in each host. This resource utilization information can be utilized by the administrator to do the dynamic migration to use the resources in an effective way, minimize the power consumption by migrating instances from less utilized hosts to other hosts. The developed chrome extension provides details of instances such as the state of each instance which shows whether the instance is in Build, Active or Terminated state. Besides, it provides details such as CPU utilization, memory utilization and disk utilization of each host which are not displayed in the default dashboard of OpenStack. This extension also provides an alert message to the administrator when there is over-utilization and under-utilization of resources in a host. In this paper we have designed a chrome extension for OpenStack which can be utilized by the cloud administrators to manage the resources in the data center.
1318
Abstract: In the last decades, a substantial amount of research has been carried out on identification of nonlinear processes. Dynamical systems can be better represented by nonlinear models, which illustrate the global behavior of the nonlinear process reactor over the entire range. CSTR is highly nonlinear chemical reactor. A compact and resourceful model which approximates both linear and nonlinear component of the process is of highly demand. Process modeling is an essential constituent in the growth of sophisticated model-based process control systems. Driven by the contemporary economical needs, developments in process design point out that deliberate operation requires better models. The neural network predictive controller is very efficient to identify complex nonlinear systems with no complete model information. Closed loop method is preferred because it is sensitive to disturbances, no need identify the transfer function model of an unstable system. In this paper identification nonlinearities for a nonlinear process reactor CSTR is approached using neural network predictive controller. KEYWORDS Continuous Stirred Tank Reactor, Multi Input Multi Output, Neural Networks, Chebyshev Neural Networks, Predictive Controller.
1326
Abstract: Proposed method introduces a K-Nearest Neighbor method by using relevance vector machine which finds the entities and related information on waste materials to make processing of waste materials more domain friendly. A corpus analysis was incorporated to support the extraction of accurate information through elimination of unrelated tokens. The distribution of weights to terms was determined through a vector space model. Parallel verification on various entities was carried out while testing. This reduces the time taken for mapping and discovering useful information from documents (dataset) of e-waste management. Recent computer aided tools cannot check for consistency and correctness of faulty requirement definition, this paper introduces text processing method using natural language technique; this enables effective maintenance and utilization of waste materials by presenting task specific information through computer-assisted text mining and analysis process.
1335
Abstract: In modern digital era authentication has been done using biometric recognition. This biometric includes finger print, footprint, facial recognition, DNA of a person’s gene, hand palm print and eye’s iris recognition. The widely used among these is finger print and iris recognition. In this work we proposed a biometric recognition using footprints of a person. Earlier work deals with capturing footprint on a paper or on a surface. This won’t give us accurate foot print, since it depends on nature of the surface, quality of the paper and proper placement of the foot to give good foot print impression. To avoid all these we proposed a touch less method to obtain foot prints. The footprint can be obtained using any digital camera. We can take footprint image in many angles to conform the individuality of a person. In this work we used Principle Component Analysis (PCA) for pattern recognition and feature extraction. Then the SVM classifier split the patterns in to relevant classes. In early stage of our work itself we got remarkable quality and it is comparatively better than conventional footprint images obtained using paper or surface
1345
Abstract: Especially there is a wide interest in handling the outdoor surveillance images in autonomous navigation, remote surveillance, automatic incident detection, vision based driver assistant system and law enforcement services. In each case, there is an underlying object or scene which is wished to be captured, processed, analyzed and interpreted. Live recording and transmission of outdoor surveillance images are often one of a forensic tool but while transmission it may introduce some variations in the pixels and it may visible as missing blocks. Thus it is significant to improve the visual quality of such outdoor surveillance images for efficient analysis and recognition. In this paper, a simple effective inpainting method is proposed by combining fast inpainting and sparse representation method. The proposed method fully considers the complementary between the fast inpainting method and sparse representation inpainting approach. This approach inpaints the small size missing blocks more effectively than the existing inpainting methods. The experimental results on practical images show that the proposed algorithm can achieve a plausible visual performance without discontinuity in boundary and blurring.
Keywords:Image Inpainting, Sparse Representation, Fast inpainting
1350
Abstract: During real time there are problems in transmitting video directly to the client. One of the main problems is, intermediate intelligent proxy can easily hack the data as the transmitter fails to address authentication, and fails to provide security guarantees. Hence we provide steganography and cryptography mechanisms like secure-code, IP address and checksum for authentication and AES algorithm with secret key for security. Although the hacker hacks the video during transmission, he cannot view the information. Based on IP address and secure-code, the authenticated user only can get connected to the transmitter and view the information. For further improvement in security, the video is converted into frames and these frames are split into groups and separate shared key is applied to each group of frames for encryption and decryption. This secured communication process is applied in image processing modules like face detection, edge detection and color object detection. To reduce the computation time multi-core CPU processing is utilized. Using multi-core, the tasks are processed in parallel fashion.
1357
Abstract: The aim of this paper is to propose works by analysing, the data sent from the admin through Wi-Fi and provides acknowledgement to the admin through the same system used for communication. The reason why Wi-Fi has been ,used for broad-casting the data is that today’s conventional educational institutions have Wi-Fi facility in their campus for providing internet connectivity to the students. Broad-casting is done by sending the data to all the access points by accessing the broadcast ID of the network in which this system is to be implemented. Hence the same Wi-Fi system can be used to broadcast the message from administrator to classrooms and vice-versa.
1364
Abstract: Wireless communication plays a vital role in robotic communication. The robots can communicate using any of the wireless standards like Bluetooth, Zigbee, Wi-fi, etc. based on the application. Many applications involve wireless transmission of images from the robots to the access point. The images can be transmitted at a particular frequency based on the wireless standard. However, interference is a major issue in wireless communication. In order to overcome interference and to make use of white space spectrum, cognitive radio is used. Hence in this paper, wireless image transmission based on cognitive radio is proposed for robotic communication. The paper proposes an efficient design of orthogonal frequency division multiplexing (OFDM) based cognitive radio to transmit and receive grayscale images over an AWGN channel. OFDM technologies are particularly well suited to cognitive radio applications because of the ease to which signals can be adapted to channel conditions and capacity requirements. The narrowband interference rejection is facilitated by suitable subcarrier allocation. The whole system has been designed and analyzed using SystemVue software.
1370