期刊文献+
共找到26篇文章
< 1 2 >
每页显示 20 50 100
Failure Prediction for Scientific Workflows Using Nature-Inspired Machine Learning Approach
1
作者 S.Sridevi Jeevaa Katiravan 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期223-233,共11页
Scientific workflows have gained the emerging attention in sophisti-cated large-scale scientific problem-solving environments.The pay-per-use model of cloud,its scalability and dynamic deployment enables it suited for ex... Scientific workflows have gained the emerging attention in sophisti-cated large-scale scientific problem-solving environments.The pay-per-use model of cloud,its scalability and dynamic deployment enables it suited for executing scientific workflow applications.Since the cloud is not a utopian environment,failures are inevitable that may result in experiencingfluctuations in the delivered performance.Though a single task failure occurs in workflow based applications,due to its task dependency nature,the reliability of the overall system will be affected drastically.Hence rather than reactive fault-tolerant approaches,proactive measures are vital in scientific workflows.This work puts forth an attempt to con-centrate on the exploration issue of structuring a nature inspired metaheuristics-Intelligent Water Drops Algorithm(IWDA)combined with an efficient machine learning approach-Support Vector Regression(SVR)for task failure prognostica-tion which facilitates proactive fault-tolerance in the scheduling of scientific workflow applications.The failure prediction models in this study have been implemented through SVR-based machine learning approaches and the precision accuracy of prediction is optimized by IWDA and several performance metrics were evaluated on various benchmark workflows.The experimental results prove that the proposed proactive fault-tolerant approach performs better compared with the other existing techniques. 展开更多
关键词 Failure prediction intelligent water drops support vector regression proactive fault-tolerance scientific workflows precision accuracy resource provisioning
下载PDF
Hybrid Approach for Privacy Enhancement in Data Mining Using Arbitrariness and Perturbation
2
作者 B.Murugeshwari S.Rajalakshmi K.Sudharson 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2293-2307,共15页
Imagine numerous clients,each with personal data;individual inputs are severely corrupt,and a server only concerns the collective,statistically essential facets of this data.In several data mining methods,privacy has ... Imagine numerous clients,each with personal data;individual inputs are severely corrupt,and a server only concerns the collective,statistically essential facets of this data.In several data mining methods,privacy has become highly critical.As a result,various privacy-preserving data analysis technologies have emerged.Hence,we use the randomization process to reconstruct composite data attributes accurately.Also,we use privacy measures to estimate how much deception is required to guarantee privacy.There are several viable privacy protections;however,determining which one is the best is still a work in progress.This paper discusses the difficulty of measuring privacy while also offering numerous random sampling procedures and statistical and categorized data results.Further-more,this paper investigates the use of arbitrary nature with perturbations in privacy preservation.According to the research,arbitrary objects(most notably random matrices)have"predicted"frequency patterns.It shows how to recover crucial information from a sample damaged by a random number using an arbi-trary lattice spectral selection strategy.Thisfiltration system's conceptual frame-work posits,and extensive practicalfindings indicate that sparse data distortions preserve relatively modest privacy protection in various situations.As a result,the research framework is efficient and effective in maintaining data privacy and security. 展开更多
关键词 Data mining data privacy ARBITRARINESS data security PERTURBATION
下载PDF
Energy-Efficient Routing Protocol with Multi-Hop Fuzzy Logic for Wireless Networks
3
作者 J.Gobinath S.Hemajothi J.S.Leena Jasmine 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期2457-2471,共15页
A Wireless Sensor Network(WSN)becomes a newer type of real-time embedded device that can be utilized for a wide range of applications that make regular networking which appears impracticable.Concerning the energy prod... A Wireless Sensor Network(WSN)becomes a newer type of real-time embedded device that can be utilized for a wide range of applications that make regular networking which appears impracticable.Concerning the energy produc-tion of the nodes,WSN has major issues that may influence the stability of the system.As a result,constructing WSN requires devising protocols and standards that make the most use of constrained capacity,especially the energy resources.WSN faces some issues with increased power utilization and an on going devel-opment due to the uneven energy usage between the nodes.Clustering has proven to be a more effective strategy in this series.In the proposed work,a hybrid meth-od is used for reducing the energy consumption among CHs.A Fuzzy Logic-based clustering protocol FLUC(unequally clustered)and Fuzzy Clustering with Energy-Efficient Routing Protocol(FCERP)are used.A Fuzzy Clustering with Energy Efficient Routing Protocol(FCERP)reduces the WSN power usage and increases the lifespan of the network.FCERP has created a novel cluster-based fuzzy routing mechanism that uses a limit value to combine the clustering and multi-hop routing capabilities.The technique creates uneven groups by using fuz-zy logic with a competitive range to choose the Cluster Head(CH).The input variables include the distance of the nodes from the ground station,concentra-tions,and remaining energy.The proposed FLUC-FCERP reduces the power usage and improves the lifetime of the network compared with the existing algorithms. 展开更多
关键词 Energy consumption LIFETIME wireless sensor network cluster head fuzzy logic unequally clustered fuzzy clustering energy-efficient protocol
下载PDF
Optimized ANFIS Model for Stable Clustering in Cognitive Radio Network
4
作者 C.Ambhika C.Murukesh 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期827-838,共12页
With the demand for wireless technology,Cognitive Radio(CR)technology is identified as a promising solution for effective spectrum utilization.Connectivity and robustness are the two main difficulties in cognitive rad... With the demand for wireless technology,Cognitive Radio(CR)technology is identified as a promising solution for effective spectrum utilization.Connectivity and robustness are the two main difficulties in cognitive radio networks due to their dynamic nature.These problems are solved by using clustering techniques which group the cognitive users into logical groups.The performance of clustering in cognitive network purely depends on cluster head selection and parameters considered for clustering.In this work,an adaptive neuro-fuzzy inference system(ANFIS)based clustering is proposed for the cognitive network.The performance of ANFIS improved using hybrid particle swarm and whale optimization algorithms for parameter tuning called PSWO.The consequent and antecedent parameters of ANFIS model are tuned by PSWO.The proper cluster heads from the network are identified using optimized ANFIS.The proposed optimized ANFIS based clustering model is analyzed in terms of number of clusters,number of common channels,reclustering rate and stability period.Simulation results indicate that proposed clustering effectively increase the stability of cluster with reduced communication overhead compared to other conventional clustering algorithms. 展开更多
关键词 ANFIS CLUSTER COGNITIVE hybrid optimization PSWO
下载PDF
Analysis of Power Quality for Distribution Networks Using Active Compensator
5
作者 K.Naresh Kumar S.Srinath 《Intelligent Automation & Soft Computing》 SCIE 2023年第6期2623-2638,共16页
This paper concentrates on compensating the power quality issues which have been increased in day-to-day life due to the enormous usage of loads with power electronic control.One such solution is compensating devices ... This paper concentrates on compensating the power quality issues which have been increased in day-to-day life due to the enormous usage of loads with power electronic control.One such solution is compensating devices like Pension Protection Fund(PPF),Active power filter(APF),hybrid power filter(HPF),etc.,which are used to overcome Power Quality(PQ)issues.The proposed method used here is an active compensator called unified power quality condi-tioner(UPQC)which is a combination of shunt and series type active filter con-nected via a common DC link.The primary objective is to investigate the behavior of the compensators in the distribution networks.The performance of two configurations of UPQC,Right Shunt UPQC(RS-UPQC)and Left Shunt UPQC(LS-UPQC)are tested in the distribution networks under various load con-ditions by connecting them at the source side of harmonic generation using a spe-cially constructed transformer called inductively filtered converter transformer which adopts special wiring scheme at the secondary side.PSCAD(Power Sys-tems Computer Aided Design)/EMTDC(Electromagnetic Transients with DC Analysis)software is used to model the compensators connected to the nonlinear load.Both RS-UPQC and LS-UPQC are tested at the distribution side of the sup-ply system with Hysteresis current controller for shunt and Sinusoidal pulse with modulation controller for series at various locations of power system network and their results are compared. 展开更多
关键词 New converter transformer(NCT) right shunt UPQC left shunt UPQC harmonics distribution system power quality
下载PDF
Wireless Sensor Network-based Detection of Poisonous Gases Using Principal Component Analysis
6
作者 N.Dharini Jeevaa Katiravan S.M.Udhaya Sankar 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期249-264,共16页
This work utilizes a statistical approach of Principal Component Ana-lysis(PCA)towards the detection of Methane(CH_(4))-Carbon Monoxide(CO)Poi-soning occurring in coal mines,forestfires,drainage systems etc.where the ... This work utilizes a statistical approach of Principal Component Ana-lysis(PCA)towards the detection of Methane(CH_(4))-Carbon Monoxide(CO)Poi-soning occurring in coal mines,forestfires,drainage systems etc.where the CH_(4) and CO emissions are very high in closed buildings or confined spaces during oxi-dation processes.Both methane and carbon monoxide are highly toxic,colorless and odorless gases.Both of the gases have their own toxic levels to be detected.But during their combined presence,the toxicity of the either one goes unidentified may be due to their low levels which may lead to an explosion.By using PCA,the correlation of CO and CH_(4) data is carried out and by identifying the areas of high correlation(along the principal component axis)the explosion suppression action can be triggered earlier thus avoiding adverse effects of massive explosions.Wire-less Sensor Network is deployed and simulations are carried with heterogeneous sensors(Carbon Monoxide and Methane sensors)in NS-2 Mannasim framework.The rise in the value of CO even when CH_(4) is below the toxic level may become hazardous to the people around.Thus our proposed methodology will detect the combined presence of both the gases(CH_(4) and CO)and provide an early warning in order to avoid any human losses or toxic effects. 展开更多
关键词 Wireless sensor network principal component analysis carbon monoxide-methane poisoning confined spaces
下载PDF
Data Mining with Privacy Protection Using Precise Elliptical Curve Cryptography
7
作者 B.Murugeshwari D.Selvaraj +1 位作者 K.Sudharson S.Radhika 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期839-851,共13页
Protecting the privacy of data in the multi-cloud is a crucial task.Data mining is a technique that protects the privacy of individual data while mining those data.The most significant task entails obtaining data from... Protecting the privacy of data in the multi-cloud is a crucial task.Data mining is a technique that protects the privacy of individual data while mining those data.The most significant task entails obtaining data from numerous remote databases.Mining algorithms can obtain sensitive information once the data is in the data warehouse.Many traditional algorithms/techniques promise to provide safe data transfer,storing,and retrieving over the cloud platform.These strategies are primarily concerned with protecting the privacy of user data.This study aims to present data mining with privacy protection(DMPP)using precise elliptic curve cryptography(PECC),which builds upon that algebraic elliptic curve infinitefields.This approach enables safe data exchange by utilizing a reliable data consolidation approach entirely reliant on rewritable data concealing techniques.Also,it outperforms data mining in terms of solid privacy procedures while maintaining the quality of the data.Average approximation error,computational cost,anonymizing time,and data loss are considered performance measures.The suggested approach is practical and applicable in real-world situations according to the experimentalfindings. 展开更多
关键词 Data mining CRYPTOGRAPHY privacy preserving elliptic curve information security
下载PDF
Secured Data Storage Using Deduplication in Cloud Computing Based on Elliptic Curve Cryptography 被引量:1
8
作者 N.Niyaz Ahamed N.Duraipandian 《Computer Systems Science & Engineering》 SCIE EI 2022年第4期83-94,共12页
The tremendous development of cloud computing with related technol-ogies is an unexpected one.However,centralized cloud storage faces few chal-lenges such as latency,storage,and packet drop in the network.Cloud storag... The tremendous development of cloud computing with related technol-ogies is an unexpected one.However,centralized cloud storage faces few chal-lenges such as latency,storage,and packet drop in the network.Cloud storage gets more attention due to its huge data storage and ensures the security of secret information.Most of the developments in cloud storage have been positive except better cost model and effectiveness,but still data leakage in security are billion-dollar questions to consumers.Traditional data security techniques are usually based on cryptographic methods,but these approaches may not be able to with-stand an attack from the cloud server's interior.So,we suggest a model called multi-layer storage(MLS)based on security using elliptical curve cryptography(ECC).The suggested model focuses on the significance of cloud storage along with data protection and removing duplicates at the initial level.Based on divide and combine methodologies,the data are divided into three parts.Here,thefirst two portions of data are stored in the local system and fog nodes to secure the data using the encoding and decoding technique.The other part of the encrypted data is saved in the cloud.The viability of our model has been tested by research in terms of safety measures and test evaluation,and it is truly a powerful comple-ment to existing methods in cloud storage. 展开更多
关键词 Cloud storage DEDUPLICATION fog computing and elliptic curve cryptography
下载PDF
A Survey on Modeling and Enhancing Reliability of Wireless Sensor Network 被引量:2
9
作者 Latha Venkatesan S. Shanmugavel Chandrasekaran Subramaniam 《Wireless Sensor Network》 2013年第3期41-51,共11页
Design of reliable wireless sensor network (WSN) needs to address the failure of single or multiple network components and implementation of the techniques to tolerate the faults occurred at various levels. The issues... Design of reliable wireless sensor network (WSN) needs to address the failure of single or multiple network components and implementation of the techniques to tolerate the faults occurred at various levels. The issues and requirements of reliability improvement mechanism depend on the available resources and application for which the WSN is deployed. This paper discusses the different modeling approaches to evaluate the reliability and classification of the approaches to improve it. Also the paper analyzes reliability enhancement by existing fault tolerant methods in WSN and compares the performance of these techniques with the technique we developed. From the results of the analysis we highlight the challenges and the characteristics of the sensor network affects the reliability and give some scope of future research directions in order to enhance reliability. 展开更多
关键词 Component RELIABILITY MODELING RELIABILITY MEASURE RELIABILITY Requirements FAULT TOLERANCE Quality of Information
下载PDF
Fault Diagnostics on Steam Boilers and Forecasting System Based on Hybrid Fuzzy Clustering and Artificial Neural Networks in Early Detection of Chamber Slagging/Fouling 被引量:1
10
作者 Mohan Sathya Priya Radhakrishnan Kanthavel Muthusamy Saravanan 《Circuits and Systems》 2016年第12期4046-4070,共25页
The slagging/fouling due to the accession of fireside deposits on the steam boilers decreases boiler efficiency and availability which leads to unexpected shut-downs. Since it is inevitably associated with the three m... The slagging/fouling due to the accession of fireside deposits on the steam boilers decreases boiler efficiency and availability which leads to unexpected shut-downs. Since it is inevitably associated with the three major factors namely the fuel characteristics, boiler operating conditions and ash behavior, this serious slagging/fouling may be reduced by varying the above three factors. The research develops a generic slagging/fouling prediction tool based on hybrid fuzzy clustering and Artificial Neural Networks (FCANN). The FCANN model presents a good accuracy of 99.85% which makes this model fast in response and easy to be updated with lesser time when compared to single ANN. The comparison between predictions and observations is found to be satisfactory with less input parameters. This should be capable of giving relatively quick responses while being easily implemented for various furnace types. 展开更多
关键词 Steam Boiler Fouling and Slagging Fuzzy Clustering Artificial Neural Networks
下载PDF
Optimal Adaptive Genetic Algorithm Based Hybrid Signcryption Algorithm for Information Security
11
作者 R.Sujatha M.Ramakrishnan +1 位作者 N.Duraipandian B.Ramakrishnan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2015年第5期47-68,共22页
The functions of digital signature and public key encryption are simultaneously fulfilled by signcryption,which is a cryptographic primitive.To securely communicate very large messages,the cryptographic primitive call... The functions of digital signature and public key encryption are simultaneously fulfilled by signcryption,which is a cryptographic primitive.To securely communicate very large messages,the cryptographic primitive called signcryption efficiently implements the same and while most of the public key based systems are suitable for small messages,hybrid encryption(KEM-DEM)provides a competent and practical way.In this paper,we develop a hybrid signcryption technique.The hybrid signcryption is based on the KEM and DEM technique.The KEM algorithm utilizes the KDF technique to encapsulate the symmetric key.The DEM algorithm utilizes the Adaptive Genetic Algorithm based Elliptic curve cryptography algorithm to encrypt the original message.Here,for the security purpose,we introduce the three games and we proved the attackers fail to find the security attributes of our proposed signcryption algorithm.The proposed algorithm is analyzed with Daniel of Service(DOS),Brute Force attack and Man In Middle(MIM)attacks to ensure the secure data transaction. 展开更多
关键词 HYBRID SIGNCRYPTION KEM DEM Adaptive GENETIC ALGORITHM EllipticCurve CRYPTOGRAPHY
下载PDF
A Hybrid Artificial Intelligence Model for Skin Cancer Diagnosis
12
作者 V.Vidya Lakshmi J.S.Leena Jasmine 《Computer Systems Science & Engineering》 SCIE EI 2021年第5期233-245,共13页
Melanoma or skin cancer is the most dangerous and deadliest disease.As the incidence and mortality rate of skin cancer increases worldwide,an automated skin cancer detection/classification system is required for early... Melanoma or skin cancer is the most dangerous and deadliest disease.As the incidence and mortality rate of skin cancer increases worldwide,an automated skin cancer detection/classification system is required for early detection and prevention of skin cancer.In this study,a Hybrid Artificial Intelligence Model(HAIM)is designed for skin cancer classification.It uses diverse multi-directional representation systems for feature extraction and an efficient Exponentially Weighted and Heaped Multi-Layer Perceptron(EWHMLP)for the classification.Though the wavelet transform is a powerful tool for signal and image processing,it is unable to detect the intermediate dimensional structures of a medical image.Thus the proposed HAIM uses Curvelet(CurT),Contourlet(ConT)and Shearlet(SheT)transforms as feature extraction techniques.Though MLP is very flexible and well suitable for the classification problem,the learning of weights is a challenging task.Also,the optimization process does not converge,and the model may not be stable.To overcome these drawbacks,EWHMLP is developed.Results show that the combined qualities of each transform in a hybrid approach provides an accuracy of 98.33%in a multi-class approach on PH2 database. 展开更多
关键词 Skin cancer multi-directional systems CURVELET CONTOURLET shearlet multi-layer perceptron
下载PDF
Mammogram Learning System for Breast Cancer Diagnosis Using Deep Learning SVM
13
作者 G.Jayandhi J.S.Leena Jasmine S.Mary Joans 《Computer Systems Science & Engineering》 SCIE EI 2022年第2期491-503,共13页
The most common form of cancer for women is breast cancer.Recent advances in medical imaging technologies increase the use of digital mammograms to diagnose breast cancer.Thus,an automated computerized system with hig... The most common form of cancer for women is breast cancer.Recent advances in medical imaging technologies increase the use of digital mammograms to diagnose breast cancer.Thus,an automated computerized system with high accuracy is needed.In this study,an efficient Deep Learning Architecture(DLA)with a Support Vector Machine(SVM)is designed for breast cancer diagnosis.It combines the ideas from DLA with SVM.The state-of-the-art Visual Geometric Group(VGG)architecture with 16 layers is employed in this study as it uses the small size of 3×3 convolution filters that reduces system complexity.The softmax layer in VGG assumes that the training samples belong to exactly only one class,which is not valid in a real situation,such as in medical image diagnosis.To overcome this situation,SVM is employed instead of the softmax layer in VGG.Data augmentation is also employed as DLA usually requires a large number of samples.VGG model with different SVM kernels is built to classify the mammograms.Results show that the VGG-SVM model has good potential for the classification of Mammographic Image Analysis Society(MIAS)database images with an accuracy of 98.67%,sensitivity of 99.32%,and specificity of 98.34%. 展开更多
关键词 Deep learning architecture support vector machine breast cancer visual geometric group data augmentation
下载PDF
Modified Mackenzie Equation and CVOA Algorithm Reduces Delay in UASN
14
作者 R.Amirthavalli S.Thanga Ramya N.R.Shanker 《Computer Systems Science & Engineering》 SCIE EI 2022年第5期829-847,共19页
In Underwater Acoustic Sensor Network(UASN),routing and propagation delay is affected in each node by various water column environmental factors such as temperature,salinity,depth,gases,divergent and rotational wind.H... In Underwater Acoustic Sensor Network(UASN),routing and propagation delay is affected in each node by various water column environmental factors such as temperature,salinity,depth,gases,divergent and rotational wind.High sound velocity increases the transmission rate of the packets and the high dissolved gases in the water increases the sound velocity.High dissolved gases and sound velocity environment in the water column provides high transmission rates among UASN nodes.In this paper,the Modified Mackenzie Sound equation calculates the sound velocity in each node for energy-efficient routing.Golden Ratio Optimization Method(GROM)and Gaussian Process Regression(GPR)predicts propagation delay of each node in UASN using temperature,salinity,depth,dissolved gases dataset.Dissolved gases,rotational and divergent winds,and stress plays a major problem in UASN,which increases propagation delay and energy consumption.Predicted values from GPR and GROM leads to node selection and Corona Virus Optimization Algorithm(CVOA)routing is performed on the selected nodes.The proposed GPR-CVOA and GROM-CVOA algorithm solves the problem of propagation delay and consumes less energy in nodes,based on appropriate tolerant delays in transmitting packets among nodes during high rotational and divergent winds.From simulation results,CVOA Algorithm performs better than traditional DF and LION algorithms. 展开更多
关键词 Gaussian process regression(GPR) golden ratio optimization method(GROM) corona virus optimization algorithm(CVOA) water column variation dissolved gases acoustic speed divergent wind rotational wind
下载PDF
Growth of Pure and Mo Doped Potassium Titanyl Phosphate (KTP) Crystals:Influence of KTP/Flux Ratios on the Growth Morphology
15
作者 J. Rajeev Gandhi B. Vijayalakshmi +1 位作者 M. Rathnakumari P. Sureshkumar 《Journal of Minerals and Materials Characterization and Engineering》 2011年第8期683-691,共9页
Pure and Molybdenum (Mo) doped Potassium Titanyl Phosphate (KTP) inorganic crystals were grown by high temperature solution growth (HTSG) from poly phosphate (K6P4O13) flux using different KTP/Flux ratios. The pure an... Pure and Molybdenum (Mo) doped Potassium Titanyl Phosphate (KTP) inorganic crystals were grown by high temperature solution growth (HTSG) from poly phosphate (K6P4O13) flux using different KTP/Flux ratios. The pure and doped KTP crystals of size 20x13x5 mm3 and 7x5x2.5 mm3 respectively were grown successfully by spontaneous nucleation. The grown crystals were characterized by XRD, UV, FTIR and Hardness studies. Micro hardness studies show that the pure crystals are harder than the Mo doped crystals. 展开更多
关键词 KTP crystal flux GROWTH SPONTANEOUS NUCLEATION MO doping
下载PDF
Chromatic Number of Graphs with Special Distance Sets-V
16
作者 Venkataraman Yegnanarayanan Angamuthu Parthiban 《Open Journal of Discrete Mathematics》 2013年第1期1-6,共6页
An integer distance graph is a graph G(Z,D) with the set of integers as vertex set and an edge joining two vertices u and?v if and only if ∣u - v∣D where D is a subset of the positive integers. It is known that x(G(... An integer distance graph is a graph G(Z,D) with the set of integers as vertex set and an edge joining two vertices u and?v if and only if ∣u - v∣D where D is a subset of the positive integers. It is known that x(G(Z,D) )=4 where P is a set of Prime numbers. So we can allocate the subsets D of P to four classes, accordingly as is 1 or 2 or 3 or 4. In this paper we have considered the open problem of characterizing class three and class four sets when the distance set D is not only a subset of primes P but also a special class of primes like Additive primes, Deletable primes, Wedderburn-Etherington Number primes, Euclid-Mullin sequence primes, Motzkin primes, Catalan primes, Schroder primes, Non-generous primes, Pell primes, Primeval primes, Primes of Binary Quadratic Form, Smarandache-Wellin primes, and Highly Cototient number primes. We also have indicated the membership of a number of special classes of prime numbers in class 2 category. 展开更多
关键词 PRIMES CHROMATIC Number DISTANCE GRAPHS
下载PDF
Multi-Dimension Support Vector Machine Based Crowd Detection and Localisation Framework for Varying Video Sequences
17
作者 Manoharan Mahalakshmi Radhakrishnan Kanthavel Divakaran Thilagavathy Dinesh 《Circuits and Systems》 2016年第11期3565-3588,共24页
In this paper, we propose a novel method for anomalous crowd behaviour detection and localization with divergent centers in intelligent video sequence through multiple SVM (support vector machines) based appearance mo... In this paper, we propose a novel method for anomalous crowd behaviour detection and localization with divergent centers in intelligent video sequence through multiple SVM (support vector machines) based appearance model. In multi-dimension SVM crowd detection, many features are available to track the object robustly with three main features which include 1) identification of an object by gray scale value, 2) histogram of oriented gradients (HOG) and 3) local binary pattern (LBP). We propose two more powerful features namely gray level co-occurrence matrix (GLCM) and Gaber feature for more accurate and authenticate tracking result. To combine and process the corresponding SVMs obtained from each features, a new collaborative strategy is developed on the basis of the confidence distribution of the video samples which are weighted by entropy method. We have adopted subspace evolution strategy for reconstructing the image of the object by constructing an update model. Also, we determine reconstruction error from the samples and again automatically build an update model for the target which is tracked in the video sequences. Considering the movement of the targeted object, occlusion problem is considered and overcome by constructing a collaborative model from that of appearance model and update model. Also if update model is of discriminative model type, binary classification problem is taken into account and overcome by collaborative model. We run the multi-view SVM tracking method in real time with subspace evolution strategy to track and detect the moving objects in the crowded scene accurately. As shown in the result part, our method also overcomes the occlusion problem that occurs frequently while objects under rotation and illumination change due to different environmental conditions. 展开更多
关键词 Multiple Support Vector Machine Crowd Detection Motion Blur Collaborative Model Gaber Feature
下载PDF
Implementation of FPGA Based Hybrid Power Generator for PV and Wind Grid Applications
18
作者 T. S. Balaji Damodhar Dr. A. Senthil Kumar 《Circuits and Systems》 2016年第13期4280-4290,共11页
This paper deals with implementation of Sinusoidal Pulse-Width-Modulation (SPWM) for a single-phase hybrid power filter generator for Photovoltaic (PV) and wind grid applications. Using policy iteration algorithm, an ... This paper deals with implementation of Sinusoidal Pulse-Width-Modulation (SPWM) for a single-phase hybrid power filter generator for Photovoltaic (PV) and wind grid applications. Using policy iteration algorithm, an improved variable step-size perturbation and observation algorithm is contrived and it is implemented proficiently using a hard-ware description language (VHDL) (Very High Speed Integrated Circuit Hardware Description Language). Subsequently, the new generated grid source supplements the existing grid power in rural houses during its cut off or restricted supply period. The software is used for generating SPWM modulation integrated with a solar-power & wind power grid system which is implemented on the Spartan 3 FPGA. The proposed algorithm performs as a conventional controller in terms of tracking speed and mitigating fluctuation output power in steady state operation which is shown in the experimental results with a commercial PV array and HPW (Height Weight Proportional) show. Simulation results demonstrate the validity with load of the proposed algorithm. 展开更多
关键词 Sinusoidal Pulse Width Modulation (SPWM) Hybrid Inverter VHDL PV & Wind System FPGA-Spartan 3
下载PDF
Developing Dijik-Primbert Algorithm for Finding Unpredictable Paths over Time-Varying Networks
19
作者 P. Sushmitha R. Kanthavel 《Circuits and Systems》 2016年第11期3541-3555,共16页
Cooperation among multiple unmanned vehicles is an intensely challenging topic from a theoretical and practical standpoint, with far reaching indications in scientific and commercial mission scenarios. The difficulty ... Cooperation among multiple unmanned vehicles is an intensely challenging topic from a theoretical and practical standpoint, with far reaching indications in scientific and commercial mission scenarios. The difficulty of time coordination for a rapid of multirotor UAVs includes predefined spatial paths according to mission necessities. With the solution proposed, cooperative control is accomplished in the presence of time-varying communication networks, as well as stringent temporal constraints, such as concurrent arrival at the desired final locations. The proposed explanation solves the time-coordination problem under the acceptance that the trajectory-genera- tion and the path-following algorithms meeting convinced cohesion conditions are given. Communication is processed in unpredictable paths by the use of path following and directed communication graph. Dijik-Primbert algorithm for finding the shortest collision free paths is used to avoid and detect collision/congestion in unpredictable paths. Without collision detection, it doesn’t seem agreeable to have collision avoidance because there wouldn’t be everything to avoid. Dijikloyd algorithm is used for finding shortest paths in a weighted directed graph with positive and negative edges. Primloyd algorithm is used for finding shortest paths in a weighted undirected graph for conquering the complexity in matrix coding. In case of conges-  tion or collision then the whole network is learned about it to all the communica- tors. Hence, communication is taken place in an unpredictable path in a secured manner. 展开更多
关键词 Multirotor Spacecraft Formation Flying UAV Control Collision Avoidance
下载PDF
Inverter Power Stage Connected with PV-Grid
20
作者 K. Kirubasankar Dr. A. Senthil Kumar 《Circuits and Systems》 2016年第13期4113-4123,共11页
This paper focuses on the design of the inverter power stage connected with PV-grid which supports the contrived PV system. The increased number of grid connected photovoltaic (PV) inverters gave rise to problems conc... This paper focuses on the design of the inverter power stage connected with PV-grid which supports the contrived PV system. The increased number of grid connected photovoltaic (PV) inverters gave rise to problems concerning the stability and safety of the utility grid, as well as power quality issues. The proposed systems can overcome these issues and improve standard regulation methods for gird connected PV inverter. The maximum available voltage in the PV string is tracked by the power stage which has been planned and designed in such a way. The tracked voltage is boosted then. The important components to voltage source inverter (VSI) are boost inductor and input capacitor which are calculated. To get a clear sinusoidal output phase voltage of 230 V from a DC capacitance bus projected to deal with 400 V, the important inverter stage parameters have been planned and modeled in Mat lab. Each block stage of the converter is easily understandable by the Simlink of the dual stage DC-AC converter explanation. The control schemes which have been proposed would compromise with the inverter power stage which forms the neat grid system. The existing renewable energy sources in the laboratory are integrated by the proposed control. 展开更多
关键词 PV-Grid Maximum Power Point Tracking Inverter Power Stage Converter
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部