2012 Third International Conference on Emerging Applications of Information Technology最新文献

筛选
英文 中文
A 500 kS/s 8-bit charge recycle based 2-bit per step SAR-ADC 一个500 k /s的8位电荷回收基于2位每步sar adc
P. Shrivastava, K. G. Bhat, T. Laxminidhi, M. S. Bhat
{"title":"A 500 kS/s 8-bit charge recycle based 2-bit per step SAR-ADC","authors":"P. Shrivastava, K. G. Bhat, T. Laxminidhi, M. S. Bhat","doi":"10.1109/EAIT.2012.6408018","DOIUrl":"https://doi.org/10.1109/EAIT.2012.6408018","url":null,"abstract":"This paper presents a low power 3.3 V, 500 kS/s 8bit successive approximation register ADC in 0.18μm technology. The DAC architecture employs charge recycling to produce 2-bits in one cycle i.e, it takes N/2 clock cycles to generate N-bits. The DAC architecture uses four rail to rail unity gain buffers and seven unit size capacitors in which one is half of the unit size to design ADC. Three comparators have been used to decide the 2-bits in each cycle. The simulated SNDR, at the input frequency of 56.64 kHz, is 48.14 dB and at 232.42 kHz is 47.03 dB. The simulated maximum INL as well as DNL is 0.5 LSB. The design consumes a low power of 1.8mW from the power supply of 3.3 V.","PeriodicalId":194103,"journal":{"name":"2012 Third International Conference on Emerging Applications of Information Technology","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115824496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Optimal scheduling of computational task in cloud using Virtual Machine Tree 基于虚拟机树的云计算任务优化调度
R. Achar, P. S. Thilagam, D. Shwetha, H. Pooja, Roshni, Andrea
{"title":"Optimal scheduling of computational task in cloud using Virtual Machine Tree","authors":"R. Achar, P. S. Thilagam, D. Shwetha, H. Pooja, Roshni, Andrea","doi":"10.1109/EAIT.2012.6407881","DOIUrl":"https://doi.org/10.1109/EAIT.2012.6407881","url":null,"abstract":"The increasing demand in computing resources and widespread adaptation of Service Oriented Architecture (SOA) has made cloud as a new IT delivery mechanism. In cloud, computing resources are provided to the requester as a service, which include Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). Cloud Computing is still in developing stage and faces many challenges. Out of the various issues, scheduling plays a very important role in determining the efficient execution of tasks in cloud environment. In this paper we present a scheduling algorithm which uses tree based data structure called Virtual Machine Tree (VMT) for efficient execution of tasks. The proposed algorithm is tested using CloudSim simulator and the results shows that algorithm gives better performance compared to other traditional scheduling algorithms.","PeriodicalId":194103,"journal":{"name":"2012 Third International Conference on Emerging Applications of Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129821951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Channel-aware key management in MANET with artificial noise forwarding 基于人工噪声转发的MANET信道感知密钥管理
H. Dey, R. Datta
{"title":"Channel-aware key management in MANET with artificial noise forwarding","authors":"H. Dey, R. Datta","doi":"10.1109/EAIT.2012.6407984","DOIUrl":"https://doi.org/10.1109/EAIT.2012.6407984","url":null,"abstract":"Due to the dynamic configuration property and shared broadcast wireless medium in MANET, security is of much concern in this type of network. The existing resource-efficient schemes require the presence of a Trusted-Third-Party to distribute key-shares among nodes offline, or propose that the nodes should contain a set of large number of key-identifiers before forming the network. However, these schemes are not practically suitable as physical capture or betrayal of a node may expose the stored set of secret keys and key-identifiers to the attackers. In this paper we propose a channel-aware key-distribution scheme that utilizes symmetric property of wireless broadcast channels in presence of passive attackers. Our distributed scheme applies superposition property of the wireless medium to forward artificial noise towards unintended passive eavesdroppers during key-distribution among intended receiver network nodes. The scheme requires co-ordination between Key distribution centre transmitters and key-share receiving receivers, and a basic transmission infrastructure during scheduling of secret transmission. Therefore, we also propose a procedure to induce a virtual periodic infrastructure inside the MANET to monitor the network topology.","PeriodicalId":194103,"journal":{"name":"2012 Third International Conference on Emerging Applications of Information Technology","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128583137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reputation based trust management system for MANET 基于声誉的MANET信任管理系统
Arijita Banerjee, S. Neogy, C. Chowdhury
{"title":"Reputation based trust management system for MANET","authors":"Arijita Banerjee, S. Neogy, C. Chowdhury","doi":"10.1109/EAIT.2012.6407975","DOIUrl":"https://doi.org/10.1109/EAIT.2012.6407975","url":null,"abstract":"Trust can be interpreted as a subjective belief resulting from past interactions that predicts the future behavior of the trustee. Trust management in distributed and resource-constraint networks, such as mobile ad hoc networks (MANETs) is much more difficult but more crucial than in traditional hierarchical architectures, such as the base station- or access point-centered wireless LANs. Generally, MANET is characterized by decentralized control. Hence no Trusted Third Parties can be used. The trust information or evidence used to evaluate trustworthiness is only provided by peers, i.e. other nodes that form the network. Due to the dynamically changing topology and limited resources (power, bandwidth, computation etc.) the trust evaluation procedure should only rely on local information. In this paper, we propose a reputation-based trust management system for detecting and preventing MANET vulnerabilities. Both active (malicious nodes) and passive (selfish nodes) attacks are investigated and our scheme cooperatively helps the nodes to exclude them from the network while tolerating transient faults. The scheme can work with any on-demand routing protocol. We evaluated the performance of our scheme in a discrete event-simulation environment. The results indicate scalability and robustness of our proposed scheme.","PeriodicalId":194103,"journal":{"name":"2012 Third International Conference on Emerging Applications of Information Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123882662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Transmission-efficient group-key generation in large dynamic MANET environments 大型动态MANET环境中传输效率高的组密钥生成
H. Dey, R. Datta
{"title":"Transmission-efficient group-key generation in large dynamic MANET environments","authors":"H. Dey, R. Datta","doi":"10.1109/EAIT.2012.6407965","DOIUrl":"https://doi.org/10.1109/EAIT.2012.6407965","url":null,"abstract":"Cryptographic key-management in a large dynamic environment such as mobile ad hoc network is a challenging task due to the limited availability of communication resources in wireless domain. This paper describes a novel key-management system using cluster-based group multicasting technique. The method employs Identity-based threshold-cryptographic group-key share distribution among participating nodes to form a secure group. There exist several clusters in each group to generate combined group key share using aggregate signcryption. The clusters inside same group collaborate with each other to generate a combined group-secret-share at cluster level and then contact with other clusters for mutual exchange of the combined group-secret-share to produce the final group key. This approach reduces the number of required encrypted transmitted messages containing group key shares. The scheme is highly applicable to other distributed dynamic environments with high security demand.","PeriodicalId":194103,"journal":{"name":"2012 Third International Conference on Emerging Applications of Information Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133830009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Low jitter hybrid Phase Locked Loop 低抖动混合锁相环
R. P. Raj, S. Balaji, K. Srinivasan, S. Senthilnathan
{"title":"Low jitter hybrid Phase Locked Loop","authors":"R. P. Raj, S. Balaji, K. Srinivasan, S. Senthilnathan","doi":"10.1109/EAIT.2012.6408017","DOIUrl":"https://doi.org/10.1109/EAIT.2012.6408017","url":null,"abstract":"In this paper, we present Low jitter hybrid Phase Locked Loop (PLL). PLL are widely used in digital communication receivers because they generate a necessary clock signal, the PLLs used in communication receivers require to generate a low-jitter clock with fast frequency and phase lock. Our hybrid PLL (HPLL) architecture consists of a LC-PLL followed by a Ring-PLL. The HPLL achieves improved jitter performance with a wide frequency range. The Ring PLL noise performance is improved using an LCPLL as a reference clock generator.","PeriodicalId":194103,"journal":{"name":"2012 Third International Conference on Emerging Applications of Information Technology","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114555177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Text detection from camera captured images using a novel fuzzy-based technique 使用一种新的基于模糊的技术从相机捕获的图像中进行文本检测
A. F. Mollah, S. Basu, M. Nasipuri
{"title":"Text detection from camera captured images using a novel fuzzy-based technique","authors":"A. F. Mollah, S. Basu, M. Nasipuri","doi":"10.1109/EAIT.2012.6407926","DOIUrl":"https://doi.org/10.1109/EAIT.2012.6407926","url":null,"abstract":"Text information extraction from camera captured text embedded images has a wide variety of applications. In this paper, a fuzzy membership based robust text detection technique is presented. The given image is partitioned into blocks that are assigned two types of fuzyy memberships. The membership values are post-processed for finer classification as foreground block or background block. Adjacent foreground blocks form foreground components. Then, a feature-based Multi Layer Perceptron is used to classify the foreground components as text or non-text. Experiments show that the number of false negative is very small compared to that of the false positives. The technique yields an average of 99.75% recall and 93.75% precision rates.","PeriodicalId":194103,"journal":{"name":"2012 Third International Conference on Emerging Applications of Information Technology","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124799115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
GSM based condition reporting system for power station equipments 基于GSM的电站设备状态报告系统
J. Datta, S. Datta, S. Chowdhuri, J. Bera
{"title":"GSM based condition reporting system for power station equipments","authors":"J. Datta, S. Datta, S. Chowdhuri, J. Bera","doi":"10.1109/EAIT.2012.6407917","DOIUrl":"https://doi.org/10.1109/EAIT.2012.6407917","url":null,"abstract":"This work describes a condition based reporting system of Power plant components using GSM technology. In this present approach, a dedicated microcontroller based hardware unit (DHU) has been developed to continuously measure the parameters of the viz. voltage, current, speed of turbine, frequency of generation etc. of the alternator to monitor the running condition of it also. Other than the generator there are subsystems which also need continuous monitoring. In this monitoring system each equipment is connected with one such DHU which is also connected to a Global System for Mobile Communication (GSM) modem. The preliminary level of fault or abnormality in operation of each component is diagnosed by the respective DHU and the fault or abnormalities details are reported to the pre-assigned operator through an SMS service. In extreme case, the provision of equipment shut down by a return SMS is also provided. A proto-type laboratory model has been set up and is working satisfactorily.","PeriodicalId":194103,"journal":{"name":"2012 Third International Conference on Emerging Applications of Information Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128562447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Wavelet versus contourlet features for automatic defect detection on hot rolled steel sheet 小波与轮廓波特征在热轧钢板缺陷自动检测中的应用
S. Ghorai, R. Singh, M. Gangadaran
{"title":"Wavelet versus contourlet features for automatic defect detection on hot rolled steel sheet","authors":"S. Ghorai, R. Singh, M. Gangadaran","doi":"10.1109/EAIT.2012.6407883","DOIUrl":"https://doi.org/10.1109/EAIT.2012.6407883","url":null,"abstract":"The automatic visual inspection systems (AVIS) are being obvious now-a-days in modern manufacturing industries for quality control, ease of documentation and reduced labor cost. The automatic detection of hot rolled steel surface defects in a real process is challenging due to the localization of it on a large surface and its rare occurrences. In this work an effort has been made to extract a set of features that can effectively address the problem of defect detection on hot rolled steel surface by using machine learning algorithm. It is intended to extract two types of features, namely wavelet and contourlet features with two and three resolution levels separately, and then make a comparison of performance of classification accuracy using these features. Here it is proposed to use state-of-the art support vector machine (SVM) classifier as the machine learning algorithm for detecting the defect surface and normal (defects free) surface. Experimental results on 14 different types of steel surface defects show that `haar' wavelet features with three decomposition levels performs better than two levels `haar' feature set or two and three decomposition levels contourlet feature set.","PeriodicalId":194103,"journal":{"name":"2012 Third International Conference on Emerging Applications of Information Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127370037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of low power fault tolerant reversible multiplexer using QCA 基于QCA的低功耗容错可逆多路复用器设计
M. Maity, P. Ghosal, B. Das
{"title":"Design of low power fault tolerant reversible multiplexer using QCA","authors":"M. Maity, P. Ghosal, B. Das","doi":"10.1109/EAIT.2012.6408019","DOIUrl":"https://doi.org/10.1109/EAIT.2012.6408019","url":null,"abstract":"Reversible logic has emerged as a promising computing paradigm having its applications in low power CMOS design, quantum computing and nanotechnology in recent years. In this paper a fault tolerant reversible multiplexer (MUX) has been proposed using a parity preserving Fredkin gate for the first time. Proposed 2:1 MUX has been designed using only one Fredkin gate which has produced two garbage outputs. The proposed parity preserving reversible multiplexer circuit is more efficient in power dissipation and fault tolerance. It should be a promising step towards the low power, nano-scale circuit design for the future generation quantum computer.","PeriodicalId":194103,"journal":{"name":"2012 Third International Conference on Emerging Applications of Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130160198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信