IMPLEMENTING SMART WHITE LED LIGHTNING SYSTEM IN BUILDINGS USING 32-BIT MICROCONTROLLER
Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRONICS, ELECTRICAL AND COMPUTER SCIENCE ENGINEERING
Author(s): PRITHIPAL SINGH , RAMANDEEP SINGH , SIDDHARTH LALIT
Abstract: Increasing user's comfort and reducing the wastage of our electricity power is the major objective of this paper. Current designs used in building are not successful in incorporating the occupant comfort for the user and use of the power efficiently at the same time. In this paper, we present a novel utility-based building control system that optimizes the trade-offs between meeting the user comfort and reduction in the cost of operation by reducing the excess usage of energy. We present an implementation of the proposed approach as an intelligent interior lighting control system that significantly reduces the energy cost. Today in our lighting system for institutes and offices either incandescent lamps or fluorescent tubes are being used. The luminous efficiency of fluorescent tube is 67 (lux) while that of an incandescent lamp is just 22 (lux). So LED panels are a very efficient alternative for them which have a luminous efficiency as high as 100 (lux). Although LED panels have initi
- Publication Date: 09-Jul-2012
- DOI: 10.15224/978-981-07-2950-9-9827
- Views: 0
- Downloads: 0
GENERATION OF IMAGE ENCRYPTION KEY ON THE BASIS OF CHAOS AND STRANGE ATTRACTORS
Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRONICS, ELECTRICAL AND COMPUTER SCIENCE ENGINEERING
Author(s): DEVENDER JHA , SAURABH PRATAP SINGH , SUNIL KR. SINGH
Abstract: In the paper, a chaotic key-based algorithm (CKBA) for image encryption methodology is proposed, which is a value substitution cipher. This paper estimates its security and points out that known-plaintext and chosen-plaintext attacks can break it with only one known plain-image making it highly secure and brute force attacks cannot break it. In addition, its security to brute-force attack is very high due to the stochastic behavior occurring in a deterministic system. So this key is secure atall from the strongly cryptographic viewpoints. Lorentz attractors are heavily dependent on initial condition and have the lowest level of predictability lead to use fullness in the encryption of any form of information either image or text.Encryption based on Lorenz strange attractor has been studied and applied.
- Publication Date: 09-Jul-2012
- DOI: 10.15224/978-981-07-2950-9-9836
- Views: 0
- Downloads: 0