O. Verma, R. Agarwal, Dhiraj Dafouti, Shobha Tyagi
{"title":"Peformance analysis of data encryption algorithms","authors":"O. Verma, R. Agarwal, Dhiraj Dafouti, Shobha Tyagi","doi":"10.1109/ICECTECH.2011.5942029","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942029","url":null,"abstract":"The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. However, for all practical applications, performance and speed are also important concerns. These are the two main characteristics that differentiate one encryption algorithm from another. This paper provides the performance comparison between four of the most commonly used encryption algorithms: DES(Data Encryption Standard), 3DES(Triple DES), BLOWFISH and AES (Rijndael). The comparison has been conducted by running several setting to process different sizes of data blocks to evaluate the algorithms encryption and decryption speed. Based on the performance analysis of these algorithms under different hardware and software platform, it has been concluded that the Blowfish is the best performing algorithm among the algorithms under the security against unauthorized attack and the speed is taken into consideration.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121518113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saeid Jafari Zadeh, Abbas Khosravi, A. Moghimi, Najme Roozmand
{"title":"A review and analysis of the trajectory gait generation for humanoid robot using inverse kinematic","authors":"Saeid Jafari Zadeh, Abbas Khosravi, A. Moghimi, Najme Roozmand","doi":"10.1109/ICECTECH.2011.5942115","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942115","url":null,"abstract":"In this paper, a control strategy based on the Inverse Kinematic (IK) is proposed for gate generation for a two — legged humanoid. According to this approach, a pattern oscillation plan is designed by some of walking basic feature such as: the sole-maximum height of the ground, time of walking and etc, at the first time. Then all of the body coordination position (X, Y, Z) — Joints and links — was adapted from the oscillation plan using Forward Kinematic (FK), after determination positions, every joint angle has been calculated using inverse kinematic and is sent to every joint motor controller as a specifics Command string periodically. For determination positions, a trajectories must be designed that shown sole coordination(X, Y) at the space. In other to implementation this algorithm, we use a model of the humanoid robot that is called Nao Robot and implement our algorithm on its simulation environment (that is used for international soccer humanoid robotic simulation participates, its name is \"rcssserver3D\").","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124044435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward a new foundation of human-computer interaction","authors":"Deepika Sharma","doi":"10.1109/ICECTECH.2011.5942123","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942123","url":null,"abstract":"Human Computer Interaction has grown to be broader, larger and much more diverse than computer science. It expanded from individual and generic user behavior to include social and organizational computing, creativity, and accessibility for the elderly, the cognitively impaired, and for all people. It expanded from desktop office applications to include games, e-learning, e-commerce, military systems, and process control. It expanded from early graphical user interfaces to include myriad interaction techniques and devices, multi-modal interactions, and host of emerging ubiquitous, handheld and context-aware interactions. This paper focuses on emerging technologies that can help further enhancement and effectiveness of Human-Computer Interaction by providing new ways to discover data and information by embedding elements of the virtual world into reality and/or bringing attributes of the real world into a virtual environment. The future of HCI puts vast amounts of information at peoples fingertips, helping them see the \"big picture.\"","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127706118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid GA-BF based intelligent PID active queue management control design for TCP network","authors":"Amir Esmaeili Abharian, Mehdi Alireza","doi":"10.1109/ICECTECH.2011.5941892","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941892","url":null,"abstract":"Active queue management (AQM) is a key congestion control scheme for reducing packet loss and improving network utilization in TCP/IP networks. This paper proposes a hybrid intelligent proportional-integral-derivative (PID) controller as an active queue manager for Internet routers. This paper deals with hybrid system (GA-BF) based on the conventional GA (Genetic Algorithm) and BF (Bacterial Foraging) which is social foraging behavior of bacteria. A hybrid (GA-BF) is employed to derive optimal or near optimal PID controller gains such that an objective function of step response characteristic's parameter is minimized, and thereby a stable queue length, low packet loss, and high link utilization for TCP networks are guaranteed. The performance of the proposed control scheme is evaluated in various network scenarios via a series of numerical simulations.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127741908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of Violation of IEEE Publication PrinciplesApplication of AHP to support information security decision making in case of Indian e-government systems","authors":"Mayur Gaigole, Nilay Khere","doi":"10.1109/ICECTECH.2011.5941820","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941820","url":null,"abstract":"This paper examines the application of AHP in evaluating information security policy decision making with respect to Indian e-government systems. We suggest a new model based on four aspects of information security (management, technology, economy and culture) and three information security components (confidentiality, integrity and availability). AHP methodology was applied to analyze the decision making process. It is found that management and technology were the dominant aspects of information security, while availability was the main concern of information security elements for e-government information systems.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126548215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel file system that facilitates improved Digital Forensics and generalized solution to fragmented file recovery","authors":"K. Srinivas, T. Bhaskar","doi":"10.1109/ICECTECH.2011.5942122","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942122","url":null,"abstract":"Reassembly of file fragments in the absence of file table information is a challenging problem in Digital Forensics and File Recovery. In literature we find file type specific solutions to this problem. In this paper we investigate a generalized solution that can be applied to every type of file. We present a technique to reassemble any type of fragmented file without using file table information. We have also presented time and space complexities of the algorithms in O-notation. In this technique each file on the disk is a Doubly Linked List with clusters as its nodes. We indicate some sections of Operating System that needs to be modified.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125635529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study and comparison of OLSR, AODV and TORA routing protocols in ad hoc networks","authors":"P. Kuppusamy, K. Thirunavukkarasu, B. Kalaavathi","doi":"10.1109/ICECTECH.2011.5941974","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941974","url":null,"abstract":"Mobile Ad hoc Network (MANET) is a collection of mobile nodes in which the wireless links are frequently broken down due to mobility and dynamic infrastructure. Routing is a significant issue and challenge in ad hoc networks. Many routing protocols have been proposed like OLSR, AODV, DSR, ZRP, and TORA so far to improve the routing performance and reliability. This research paper describes the characteristics of ad hoc routing protocols OLSR, AODV and TORA based on the performance metrics like packet delivery ratio, end-to-end delay, routing overload by increasing number of nodes in the network. This comparative study proves that AODV, TORA performs well in dense networks than OLSR in terms of packet delivery ratio.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125727604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vlsi implementation of nonlinear variable cutoff high pass filter algorithm","authors":"O. KalaiPriya, S. Ramasamy, D. Ebenezer","doi":"10.1109/ICECTECH.2011.5941753","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941753","url":null,"abstract":"The focus of this paper is the actual implementation of the algorithm onto FPGA hardware. A simple nonlinear median based high pass filter algorithm has been implemented using Xilinx ISE 12.2 targeted for FPGA — xc6slx4–3tqg144. The filter structure consists of a median filter followed by a high pass filter. The signal to be filtered is the input to median filter and its output becomes the input to high pass filter. The high pass filter algorithm identifies and separates the high frequency components by sliding a time ordered window of size-3 over the median filter's output samples. This high pass filter preserves the details of filtered low frequency components for reconstruction and not lost as in the case of conventional high pass filter. The hardware performance is studied using Spartan 6.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115897220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CLIQUE: Clustering based on density on web usage data: Experiments and test results","authors":"K. Santhisree, A. Damodaram","doi":"10.1109/ICECTECH.2011.5941893","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941893","url":null,"abstract":"Clustering web sessions is to group web sessions based on similarity and consists of minimizing the intra-group similarity and maximizing the inter-group similarity. The other question that arises is how to measure similarity between web sessions. Here in this paper we adopted a CLIQUE (CLUstering in QUEst) algorithm for clustering web sessions for web personalization. Then we adopted various similarity measures like Euclidean distance, projected Euclidean distance Jaccard, cosine and fuzzy dissimilarity measures to measure the similarity of web sessions using sequence alignment to determine learning behaviors. This has significant results when comparing similarities between web sessions with various measures, we performed a variety of experiments in the context of density based clustering, based on sequence alignment to measure similarities between web sessions where sessions are chronologically ordered sequences of page visits.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130066531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low power and area efficient implementation of N-phase non overlapping clock generator using GDI technique","authors":"O. Hari, A. K. Mai","doi":"10.1109/ICECTECH.2011.5941814","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941814","url":null,"abstract":"This paper proposes a low power implementation of a non-overlapping clock (NOC) generator based on area efficient realization of Gate-Diffusion-Input (GDI) D flip-flops. The design is programmable for the number of required phases of the NOC and the amount of non-overlap period, legitimate over the wide range of frequency. The derived clocking scheme can be used for various dynamic or multi-phase clocked logic gates to decrease complexity and increase speed. The benefits derived proportionate multi-folds when utilized for low frequency bio-medical applications. Simulation results stand unanimous suggesting the design to be area and power efficient while maintaining a low complexity of logic design. Process and temperature invariance adds its acceptability over a wide range of applications. Various alternate realizations of NOC generator are proposed based on design requirements.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130146100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}