Volume-2 (National Conference on Wireless Communication, Microelectronics and Emerging Technologies (NC-WiCOMET2013))
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Detection of Packet Droppers and Modifiers in Wireless Sensor Networks |
Country | : | India |
Authors | : | Sruthi S., Devu M. S. |
Abstract: Packet dropping and modification are two common attacks that can disrupt communication in wireless multi-hop sensor networks. Many schemes have been proposed to alleviate the attacks but none can effectively and efficiently identify the intruders. To address the problem, we propose a simple yet effective scheme, which can identify misbehaving forwarders that drop or modify packets.
Keywords: Topology, dynamic routing, heuristic ranking.
[1] H.Chan and A. Perrig, "Security and Privacy in Sensor Networks," IEEE Computer, October 2003.
[2] C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," the First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127, May 2003.
[3] V. Bhuse, A. Gupta, and L. Lilien, "Dpdsn: Detection of packet-dropping attacks for wireless sensor networks," In the Trusted Internet Workshop, International Conference on High Performance Computing,
December 2005.
[4] S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," ACM MobiCom, August 2000.
[5] R. Roman, J. Zhou, and J. Lopez, "Applying intrusion detection systems to wireless sensor networks," Third IEEE Annual Consumer Communications and Networking Conference (CCNC), pp. 640–644, Jan. 2006.
[6] S. Lee and Y. Choi, "A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks," Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
(SASN), pp. 59–70, 2006.
[7] F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical En-route Filtering of Injected False Data in Sensor
Networks," IEEE INFOCOM, March 2004.
[8] S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks," IEEE Symposium on Security and Privacy, 2004.
[9] H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, "Toward Resilient Security in Wireless Sensor Networks," ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), May 2005.
[10] Z. Yu and Y. Guan, "A Dynamic En-route Scheme for Filtering False Data in Wireless Sensor Networks," IEEE Infocom 2006, April 2006.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Watermarking Moble Phone Color Images With Error Correction Codes |
Country | : | India |
Authors | : | Praseeja P. S.,Thamizharasi A. |
Abstract: This paper proposes a scheme for embedding phone numbers into color images captured by a mobile phone camera. Firstly, the phone number digits are transformed using BCD encoder and the generated binary vector is appended by the phone number checksum represented in binary format. Then, this binary vector is encoded before inserting it in the DCT blocks of the image. The coded watermark information are embedded into a predefined low frequency coefficient in the DCT domain. The proposed algorithm is found to be robust against JPEG compression and different image manipulation algorithms.
Keywords: Watermarking, DCT, Error detection, color image, scrambling.
[1] S. Katzenbeisser and F. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking. London: Artech House,2000.
[2] COX I. J., MILLER M., BLOOM J.: Digital Watermarking. Morgan-Kaufmann, 2002. 4] K. Krasavin, J.
Parkkinen, and T. Jaaskelainen, "Digital watermarking on mobile devices," in International Conference on
Information and Communication Technologies: From Theory to Applications, Damascus, Syria, 2004, pp. 319-
320.
[5] PETITCOLAS F., KUHN M.: Information hiding: A survey.IEEE Special Issue on the Protection of
Multimedia Content87, 7 (July 1999), 1062–1077.
[6] J.-S. Sohn, S.-l. Lee, and D.-G. Kim, "Image adaptive watermarking technique for digital phone," in
International Conference on Computational Intelligence and Security, Guangzhou, China, 2006, pp.1190 - 1194.
[7] A. Al-Gindy, H. Al-Ahmad, R. Qahwaji & A. Tawfik, "A new watermarking scheme for colour images
captured by mobile phonecameras," International Journal of Computer Science.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Optimized Multispectral Palmprint Recognition System Based On Contourlet Transform |
Country | : | India |
Authors | : | Faseela Harshad, Alphonse Devasia |
Abstract: Reliability and accuracy in personal identification system is a dominant concern to the security world. Many types of personal identification systems have been developed, and palmprint identification is one of the emerging technologies that attracted the researchers due to its stable and unique characteristics. Recently, multispectral imaging has attracted considerable attention as it can acquire more discriminative information in a short time. This paper presents a novel biometric technique to automatic personal identification system using multispectral palmprint technology. In this method, each of spectrum images are aligned and then used to extract palmprint features using Contourlet Transform CT. It is a multiresolution and multidirection transform which can be effective in capturing the palm features. Finally, Genetic Algorithm is used for feature selections in order to have high performance. The expected results showed that the proposed method achieve an excellent identification rate and provide more security in noisy environment.
Key-Words: Biometric, Contourlet Transform, Genetic Algorithm, Multispectral Image Fusion, Palmprint Recognition.
[1] K. Shanmugapriya1, M.Karthika, Dr. S.Valarmathy, M.Arunkumar "Performance Evaluation of Contourlet Transform based Palmprint Recognition using Nearest Neighbour Classifier" International Journal of Emerging Technology and Advanced
Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 1, January 2013.
[2] A. K. Jain, A. Ross & S. Prabhakar. (2004). An Introduction to Biometric Recognition, In: IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14, N. 1, pp 4-20, January 2004.
[3] W.K. Kong and D. Zhang, "Palmprint Texture Analysis based on Low-Resolution Images for Personal Authentication", 16th International Conference on Pattern Recognition, Vol. 3, pp. 807-810, August 2002.
[4] S. Valarmathy, M. A. Kumar, M. Sudha, "Improvement in palmprint recognition rate using fusion of multispectral palmprint images", Proceedings of Int. Conf. on Computing Communication and Application (ICCCA), pp. 1-5, 2012.
[5] Yan Jin1, Miao Qi,Yinghua Lu, Yao Fu, JunKong. Palmprint Verification Based on Genetic Algorithm Proceedings of 2008 3rd International Conference on Intelligent System and Knowledge Engineering.
[6] Priyanka Somvanshi, Milind Rane "Survey of Palmprint Recognition" International Journal of Scientific& Engineering Research Volume 3, Issue 2, February-2012 1 ISSN 2229-5518.
[7] David Zhang, Zhenhua Guo, Guangming Lu, Lei Zhang, and Wangmeng Zuo, "An Online System of Multispectral Palmprint Verification", IEEE transactions on instrumentation and measurement, vol. 59, no. 2, February 2010, pp 480-490.
[8] Minh N. Do, Member, IEEE, and Martin Vetterli, Fellow, IEEE Transaction On Image Processing "The Contourlet Transform, an Efficient Directional Multiresolution Image Representation"
[9] The PolyU Palmprint Database. Available at http://www.comp.polyu.edu.hk/~biometrics.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A New Object Detection and Tracking Using FPGA |
Country | : | India |
Authors | : | Ahinus H, Gopalakrishnasamy M. E. |
Abstract: According to the result of moving object detection research on video sequences, this paper proposes a method to detect moving object based on background subtraction. Computational using local variable such as Lucas Kanade algorithm does not provide a good segmentation which indirectly affects the pattern of the optical flow obtained. Currently, both the market and the academic communities have required applications based on image and video processing with several real-time constraints. On the other hand, detection of moving objects is a very important task in mobile robotics and surveillance applications. In order to achieve an alternative design that allows for rapid development of real time motion detection systems, this paper proposes a hardware architecture based on the background subtraction algorithm, which is implemented on FPGAs (Field Programmable Gate Arrays).Here we will calculate total power consumed by our hardware.
Keywords: noise removal, image segmentation, FPGA
[1] Y. Matsushita, E. Ofek, W. Ge, X. Tang, and H.-Y. Shum, "Full-frame video stabilization with motion inpainting," IEEE Trans. Patt. Anal. Mach. Intell., vol. 28, no. 7, pp. 1150–1163, Jul. 2006.
[2] F. Barranco, J. Diaz, E. Ros, and B. del Pino, "Visual system based on artificial retina for motion detection," IEEE Trans. Syst., Man, Cybern., vol. 39, no. 3, pp. 752–762, Jun. 2009.
[3] M. Anguita, J. Diaz, E. Ros, and F. J. Fernandez-Baldomero, "Optimization strategies for high-performance
computing of optical-flow in general-purpose processors," IEEE Trans. Circuits Syst. for Video Technol., vol. 19, no.
10, pp. 1475–1488, Oct. 2009.
[4] J. Diaz, E. Ros, F. Pelayo, E. M. Ortigosa, and S. Mota, "FPGA-based real-time optical-flow system," IEEE
Trans. Circuits Syst. for Video Technol., vol. 16, no. 2, pp. 274–279, Feb. 2006.
[5] Y. Matsushita, E. Ofek, W. Ge, X. Tang, and H.-Y. Shum, "Full-frame video stabilization with motion
inpainting," IEEE Trans. Patt. Anal. Mach. Intell., vol. 28, no. 7, pp. 1150–1163, Jul. 2006.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Energy Efficiency Improvement Using IEEE 802.15.4 in Cooperative Wireless Sensor Networks |
Country | : | India |
Authors | : | Lakshmy Sasidharan Nair, Vinu R., George M. Jacob |
Abstract: Wireless Sensor Networks is an emerging technology in modern communication. The rapid and increased use of these networks results in the decreased lifetime of the sensor nodes. The life time reduction is due to the increased battery drain. As a result many methods have been developed to cope this. One such technique is the cooperative routing scheme. Compared to the present existing schemes cooperative routing scheme was found to give around 40% improvement in energy efficiency. As a modification to the original cooperative routing scheme the Mac protocol was changed from IEEE 802.11 to IEEE 802.15.4. The result obtained shows much greater energy efficiency for all the nodes in the network.
Keywords: cooperative routing scheme, energy efficiency, IEEE 802.11, IEEE 802.15.4, wireless sensor networks.
[1] Mohamed Elhawary and Zygmunt J. Haas, Fellow "energy-efficient protocol for cooperative networks". IEEE/ACM Transactions on networking, vol. 19, no. 2, April 2011.
[2] Jing Deng, Pramod K. Vars hney and Zygmunt J. Haas "A New Backoff Algorithm for the IEEE 802.11 Distributed
Coordination Function" 01/2009; pp.455-459 In proceeding of: FSKD 2009, SixthInternational Conference on Fuzzy Systems and
Knowledge Discovery, Tianjin, China, 14-16 August 2009, 6 Volumes.
[3] S.M. Rifat Ahsan, Mohammad Saiful Islam and Naeemul Hassan "Tunable Parameters for IEEE 802.11 based Ad-Hoc
Network" UG Thesis work from Bangladesh University of Engineering &Technology October 2009.
[4] Abdelmalik Bachir, Mischa Dohler, Thomas Watteyneand Kin K. Leung "MAC Essentials for Wireless Sensor Networks" IEEE Communications Survey and tutorial Volume 12, Number 2, 222-248 .Second Quarter 2010.
[5] Anis KOUBAA, Mário ALVES, Eduardo TOVAR "A Comprehensive Simulation Study of Slotted CSMA/CA for IEEE 802.15.4
Wireless Sensor Networks" Published in: Factory Communication Systems, 2006 IEEE International Workshop 183 – 192, and NOV 2006.
[6] Anis Koubaa, Mário Alves,Bilel Nefzi,Ye-Qiong Song "Improving the IEEE 802.15.4 Slotted CSMA/CA MAC for Time-
Critical Events in Wireless Sensor Networks" proceedings of the Workshop of Real-Time Networks (RTN2006), Satellite Workshop to
ECRTS 2006.
[7] Giuseppe Anastasi_, Marco Contiy, Mario Di Francescoz and Vincenzo Neri "Reliability and Energy Efficiency in Multi-hop
IEEE 802.15.4/ZigBee Wireless Sensor Networks" ISCC 2010: 336-341.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | WATERMARKING OF COMPRESSED AND ENCRYPTED JPEG 2000 IMAGES |
Country | : | India |
Authors | : | Deepika R, Dhanya S. |
Abstract: In digital rights management (DRM) systems [1]-[4], digital media is often distributed by multiple levels of distributors in a compressed and encrypted format. So it become necessary for distributors to watermark these compressed encrypted media items in the compressed-encrypted domain itself for tamper detection, ownership declaration and for copyright management purposes. But it is a challenge to watermark these compressed encrypted streams as the compression process would pack the raw media into a lower number of bits and encryption would have randomized the compressed bit stream. Hence attempting to watermark such a randomized bit stream can cause degradation of the media quality. Thus it is necessary to choose an encryption scheme that is both secure and will allow watermarking in a predictable manner in the compressed encrypted domain. This paper proposes a watermarking algorithm to watermark JPEG2000 compressed and encrypted images. The encryption algorithm used is RC4 stream cipher. Here the proposed algorithm embeds watermark in the compressed-encrypted domain and the extraction of watermark is done in the decrypted domain.
Keywords: Compression, DRM Systems, Encryption, JPEG2000, Watermarking.
[1] S.Hwang,K.Yoon,K.Jun,andK.Lee, "Modeling and implementation of digital rights," J. Syst. Softw., vol. 73,
no. 3, pp. 533–549, 2004.
[2] A. Sachan, S. Emmanuel, A. Das, and M. S. Kankanhalli, "Privacy preserving multiparty multilevel
DRMarchitecture," in Proc. 6th IEEE Consumer Communications and Networking Conf., Workshop Digital
Rights Management, 2009, pp. 1–5.
[3] T. Thomas, S. Emmanuel, A. Subramanyam, and M. Kankanhalli, "Joint watermarking scheme for
multiparty multilevel DRM architecture," IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 758–767, Dec.
2009.
[4] S. Lian, Z. Liu, R. Zhen, and H. Wang, "Commutative watermarking and encryption for media data," Opt.
Eng., vol. 45, pp. 1–3, 2006.
[5] M. Cancellaro, F. Battisti, M. Carli, G. Boato, F. De Natale, and A Neri, "A joint digital watermarking and
encryption method," in Proc SPIE Security, Forensics, Steganography, and Watermarking of Multimedia
Contents X, 2008, vol. 6819, pp. 68 191C–68 191C.
[6] J. Prins, Z. Erkin, and R. Lagendijk, "Anonymous fingerprinting with robust QIM watermarking
techniques," EURASIP J. Inf. Security, vol.2007.
[7] Z. Li, X. Zhu, Y. Lian, and Q. Sun, "Constructing secure content-dependent watermarking scheme using
homomorphic encryption," in Proc. IEEE Int. Conf. Multimedia and Expo, 2007, pp. 627–630.
[8] Q. Sun, S. Chang, M. Kurato, and M. Suto, "A quantitive semi-fragile JPEG2000 image authentication
system," in Proc. Int. Conf. Image Processing, 2002, vol. 2, pp. 921–924.
[9] A.Subramanyam,S.Emmanuel, and M. Kankanhalli, "Compressed-encrypted domain JPEG2000 image
watermarking," in Proc. IEEE Int.Conf. Multimedia and Expo, 2010, pp. 1315–1320.
[10] H.WuandD.Ma,"Efficient and secure encryption schemes for JPEG 2000," in Proc. IEEE Int. Conf.
Acoustics, Speech and Signal Processing, 2004, vol. 5, pp. 869–872.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Data Collection Capacity in Arbitrary Wireless Sensor Networks |
Country | : | India |
Authors | : | VIDYA.P., Ms. Shalini L. |
Abstract: Data collection is a fundamental function provided by wireless sensor networks. The performance of wireless network can be measured by how efficiently collect sensing data from all sensor nodes. Previously, the study of data collection capacity has concentrated on large-scale random networks. But in most of the practical sensor applications, the sensor network is not uniformly deployed and the number of sensors may not be as huge as in theory. Therefore, it is necessary to study the capacity of data collection in an arbitrary network. In this paper a simple BFS tree based method is used which can lead to order-optimal performance for any arbitrary sensor networks. We then study the capacity bounds of data collection under a general graph model, where two nearby nodes may be unable to communicate due to barriers or path fading, and discuss performance implications. From this study among this two BFS tree based method find which one is better.
Keywords: Capacity, data collection, arbitrary networks, wireless sensor networks.
[1] E.J. Duarte-Melo and M. Liu, "Data-gathering wireless sensor networks:Organization and capacity," Computer Networks, 43, 519-537, 2003.
[2] D. Marco, E.J. Duarte-Melo, M. Liu, and D.L. Neuhoff, "On the manyto-one transport capacity of a
dense wireless sensor network and the compressibility of its data," in Proc. Int'l Workshop on
Information Processing in Sensor Networks, 2003
[3] H.E. Gamal, "On the scaling laws of dense wireless sensor networks:the data gathering channel," IEEE
Trans. on Information Theory, vol.51, no. 3, pp. 1229–1234, 2005.
[4] B. Liu, D. Towsley, and A. Swami, "Data gathering capacity of large scale multihop wireless
networks," in Proc. of IEEE MASS, 2008.
[5] S. Chen, Y. Wang, X.-Y. Li, X. Shi, "Order-optimal data collection inwireless sensor networks: Delay
capacity," in IEEE SECON, 2009.
[6] X.-Y. Li, J. Zhao, Y.W. Wu, S.J. Tang, X.H. Xu, X.F. Mao, "Broadcastcapacity for wireless ad hoc
networks," in IEEE MASS, 2008.
[7] www.google.com
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Neural network based control for PEM fuel cells |
Country | : | India |
Authors | : | Vinu R, Dr. Varghese Paul |
Abstract: The main objective of this paper is to overcome the transient variations in the dynamic loads of PEM fuel cells. These variations will affect the overall performance of the fuel cell. So a control strategy based on neural network is proposed in this paper. This neural network predictive system behavior is investigated under random current variations. The proposed neural network model is a fast and proper control system for controlling the fuel cell terminal voltage and improving the system performance.
Keywords: Reversible voltage, Irreversible losses, flow rate, predictive control.
[1] S. M.Rakhtala, R.Ghaderi, A.Ranjbar , "Proton Exchange Membrane Fuel Cell Voltage-Tracking using Artificial Neural
Networks",J.Springer 2011 P.no338-344
[2]M.Sedighizadeh,M.Razei,V.Najmi,"A Predictive Control based on neural network for Proton Exchange Membrane Fuel Cell",World
Academy of Science, Engineering and Technology, 2011
[3] Sachin V. Puranik, Ali Keyhani, and Farshad Khorrami, "State Space Modeling of Proton Exchange Membrane Fuel Cell", Ieee
transactions on energy conversion, vol. 25, no. 2, pp.474-483,Sep 2010.
[4] H. Nasir aghdam,N. Ghadimi ,A. Ataei," Adjusting PID Controllers Coefficients to Control Fuel Cell using Genetic Algorithm",IEEE
2011
[5] Hung-cheng chen,Sin-yuan tzeng,Po-hung chen," Optimization design of controllers for pemfc with reformer using genetic algorithm",
Proceedings of the Ninth International Conference on Machine Learning and Cybernetics, Qingdao, 11-14 July 2010.
[6] Mustapha HATTI, Mustapha TIOURSI," Neural network Controller for Proton exchange membrane fuel cells", 2IWH 2007, 27-29
October 2007, Ghardaïa – Algeria
[7] M. Karimi, M. Imanzadeh, P. Farhadi, and N. Ghadimi," Voltage Control of PEMFC Using A New Controller Based on Reinforcement
Learning", International Journal of Information and Electronics Engineering, Vol. 2, No. 5, September 2012
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Review of Digital control schemes for Active Power Filters |
Country | : | India |
Authors | : | G. Arthy, Dr. C. N. Marimuthu |
Abstract: Most of the pollution issues created in power systems are due to the non-linear characteristics and fast switching of power electronic equipment. The use of the power electronic devices in power distribution system gives rise to harmonics and reactive power disturbances. The harmonics and reactive power cause a number of undesirable effects in the power system. Active Power Filters(APF) have been developed over the years to solve these problems to improve power quality .This paper presents a comprehensive review of Active Power filter configurations, control strategies and the Total Harmonic Distortion(THD) for different control strategies both in analog and digital(DSP, FPGA) environments.
Index Terms: FPGA, Harmonics, p-q theory, PWM, THD.
[2] Amoli M. E. and Florence T., Voltage, current harmonic content of a utility system-A summary of 1120 test measurements, IEEE Trans. Power Delivery, vol. 5, 1990, 1552– 1557.
[3] Robert D Henderson, Patrick J. Rose ,Harmonics: The effect on power quality and transformer,IEEE Trans. Industry Applications, vol. 30, no.3, 1994,528-532.
[4] Chen C. and Divan D.M., Simple topologies for single-phase AC line conditioning, IEEE Trans. Industry Applications, vol. 30, 1994, 606–612.
[5] Nastran J., Cajhen R., Seliger M., and Jereb P., Active power filter for nonlinear AC loads, IEEE Trans. Power Electron., vol. 9, 1994, 92–96.
[6] Hafner J., Aredes M. and Heumann K., A shunt active power filter applied to high voltage distribution line, IEEE Trans. Power Delivery., vol. 12, 1997, 266–272.
[7] Mendalek N., Al-Haddad K., Fnaiech F and Dessaint L.A., Nonlinear control technique to enhance dynamic performance of a shunt active power filter, IEEE Trans. Power application,vol. 150,2003, 373–379.
[8] Moran S., A line voltage regulator/conditioner for harmonic-: sensitive load isolation, in Conf. Rec. IEEE IAS Annu. Meeting, 1989,945–951.
[9] Akagi H., Kanazawa Y., and Nabae A., Instantaneous reactive power compensators comprising switching devices without energy storage components, IEEE Trans. Ind. Applicat.,vol. IA-20, 1984, 625–630.
[10] Akagi, H., Modern active filters and traditional passive filters; Bulletin of The Polish Academy of Sciences Technical Sciences, Vol. 54, No. 3,2006, 255-269.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Fuzzy-PID controller for PEM Fuel cell in Automobile Application |
Country | : | India |
Authors | : | Dhanya S., Dr. Varghese Paul |
Abstract: A fuel cell (FC) is an electro-chemical device that converts chemical energy to electrical energy by combining a gaseous fuel and oxidizer. New advances in membrane material, reduced usage of noble metal catalysts, and efficient power electronics have put the fuel cell system under the spotlight as a direct generator for electricity. Of all the varieties of fuel cells, the Proton Exchange Membrane (PEM) fuel cell has shown the effectiveness for automotive applications because of their lower operating temperature(50-1000C)s and fast start-up times. They can reach efficiencies of above 60% at normal operating conditions. A typical PEM-FC provides up to 0.6 W/cm2 depending on the catalyst loading, the membrane and electrode material, and the reactant (oxygen O2 & hydrogen H2) concentration in the anode and cathode. To satisfy different power requirements, many FCs are connected electrically in series to form a FC stack (FCS). Maintaining a fuel cell system in correct operating conditions requires good controller. Based on the mathematical model of proton exchange membrane fuel cell, a fuzzy logic controller in the feed forward path and a PID controller in the feedback path was designed for the PEM FC to make it possible to output constant voltage.
Index Terms: breathing control, fuel cell stack, fuzzy controller, oxygen starvation, PEM FC, PID.
[2] Logan B. E., Scaling up Microbial Fuel Cells and Other Bioelectrochemical Systems. Applied Microbiology and Biotechnology, 85 (2010), No. 6. 1665–1671.
[3] Pukrushpan J., Stefanopoulou A., Peng H. Control of fuel cell breathing IEEE Control Systems, 24 (2004), No. 2, 30-46.
[4] Kunusch C., Puleston P. F., Mayosky M. A., Riera J., Sliding Mode Strategy for PEM Fuel Cells Stacks Breathing Control Using a Super-Twisting Algorithm IEEE Transactions on Control Systems Technology, 17 (2009), No. 1, 167-174.
[5] Chen, D. & Peng, H. (2004). Modeling and Simulation of a PEM Fuel Cell Humidification System proceeding og the 2004 American Control Conference.
[6] CORRˆ EA, J. M.—FARRET, F. A.—CANHA, L. N.—SIMˆ OES,M. G. : An Electrochemical-Based Fuel-Cell Model Suitable for Electrical Engineering Automation Approach, IEEE Transactions on Industrial Electronics 51 No. 5 (October 2004).
[7] Yang, W. C., Bates, B., Fletcher, N., Pow, R., Control challenges and methodologies in fuel cell vehicle development, SAE international, Paper No. 98C054.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design of ARM based Surveillance System with Ethernet interface |
Country | : | India |
Authors | : | Rekha George, Dr. Varghese Paul |
Abstract: Embedded systems are now used in almost all areas like industries, medical, military, household appliances. As the communication technologies are advancing day by day we should think about improving the range of usefulness of embedded systems by including network connectivity to it. In this paper the design of an embedded system with Ethernet interface is proposed which can be used for surveillance in hazardous environments. Ethernet has the advantages of stability, upgradeability and reliability. Ethernet has a speed from 1Mbps to 100Gbps with a maximum range of 100km over optical fiber cable. The protocol used is micro internet protocol (MicroIP) which is a tiny version of TCP/IP used in embedded systems with limited memory resources.
Index Terms: ARM, Wi-Fi, Biometric Device, LAN, Ethernet.
[2] Zhao Ruimei, Wang Mei, "Design of ARM-based Embedded Ethernet Interface" 978-1-4244-6349-7/10/ 2010 IEEE.
[3] Lu Xiao-chun , Huang Jiao , Wu Ming-chun , LiuXiu-feng , Ding Yan "IP-based Connectivity with IEEE 802.11 Embedded Networks", 978-1-4244- 7618-3 /10/2010 IEEE
[4] ENC28j60 User's manual
[5] Allen Bradley "EtherNet/IP network Configuration" user manual
[6] Arul Prabakar A, Brahmandha Prabhu R, "Development of A Distributed Data CollectionSystem based on Embedded Ethernet", 978-1-4244-9799-711$26.00 ©20 11 IEEE
[7] YU Cheng-bo, LIU Jie, and TAO Hong-yan, "Reseach on remote monitoring technology of equipment," Information and Control, Magn. China, vol.31 (3), pp.236-240, June 2002.
[8] B. Srinivas Raj and G. Srinivas Babu, " Design of Web based Remote Embedded Monitoring system", International Journal of Technology And Engineering System(IJTES):Jan –March 2011- Vol.2.No.2.