2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)最新文献

筛选
英文 中文
Design high performance and low power 10T full adder cell using double gate MOSFET at 45nm technology 采用45纳米双栅MOSFET技术设计高性能低功耗10T全加法器单元
A. Shrivastava, S. Akashe
{"title":"Design high performance and low power 10T full adder cell using double gate MOSFET at 45nm technology","authors":"A. Shrivastava, S. Akashe","doi":"10.1109/ICCCCM.2013.6648903","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648903","url":null,"abstract":"Design of complex arithmetic logic circuits considering leakage current, active power and delay is an important and challenging task in deep submicron circuits. Double gate transistor circuit consider as a promising candidate for low power application domain as well as used in Radio Frequency (RF) devices. In this paper we designed full adder with the help of double gate transistor, the used parameters value has been varied significantly thus improving the performance of full adder. Power Gating is one of the most used circuit techniques to reduce the leakage current in idle circuit. In this paper different parameters are analysed on Power Gating Technique. Power Gating technique achieves 93% reduction of leakage current, active power is reduced by 60% and delay is reduced by 14% as compared with conventional double gate full adder. Simulation results of double gate full adder have been performed on cadence virtuoso with 45nm technology.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114880227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A design pattern for symmetric encryption 对称加密的设计模式
Yash Bharadwaj, S. Chakraverty
{"title":"A design pattern for symmetric encryption","authors":"Yash Bharadwaj, S. Chakraverty","doi":"10.1109/ICCCCM.2013.6648912","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648912","url":null,"abstract":"Symmetric encryption is widely used to enforce data security and provide other cryptographic primitives. Despite significant research that has led to the development of sophisticated symmetric encryption algorithms, very little has been done to develop systematic frameworks that can support the creation of adaptable, application-specific encryption techniques with varying levels of security. In this paper, we tackle this challenge by proposing a new Circular Design Pattern (CDP) which serves as a template for generating Dynamic Symmetric Encryption Frameworks (DSEF). The layout of a DSEF remains the same but the underlying algorithms may vary during run time. We illustrate how the proposed CDP can be used to create new DSEF from the set of existing algorithms. We propose a modified version of conventional cryptosystem model to deploy the DSEF. We analyze the enhanced security level of any new symmetric encryption algorithm generated by the CDP. We also present a comparison of the proposed CDP with some existing design patterns that may be used for creating DSEF.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128584573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analyze the ATMOS configuration with VTH abolition logic in 4×1 MUX 分析4×1 MUX中带有VTH取消逻辑的ATMOS配置
Prateek Jain, S. Akashe
{"title":"Analyze the ATMOS configuration with VTH abolition logic in 4×1 MUX","authors":"Prateek Jain, S. Akashe","doi":"10.1109/ICCCCM.2013.6648916","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648916","url":null,"abstract":"A speculative configuration of MOS transistors with a threshold rejection technique is modified. The design configuration is analyzed logic in aspect cum internal threshold abolition (ITA) and discloses circuit imminent and recital confines. Consequent circuit equations exemplify the exchange between the voltage drop and the reverse leakage. Moreover, a circuit development process for the improvement of the power transmission efficiency (PTE) of a 4×1 MUX with ITA MOS configuration was modified based on the design. A 4×1 MUX was optimized and employed in a digital system 45-nm CMOS technology, and Cadence simulation experimental implementation results of the leakage power and PCE illustrate superior conformity through the proposed configuration.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126133002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trajectory tracking of two wheeled mobile robot using higher order sliding mode control 基于高阶滑模控制的两轮移动机器人轨迹跟踪
Himajit Aithal, S. Janardhanan
{"title":"Trajectory tracking of two wheeled mobile robot using higher order sliding mode control","authors":"Himajit Aithal, S. Janardhanan","doi":"10.1109/ICCCCM.2013.6648908","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648908","url":null,"abstract":"This paper presents a robust control method for trajectory tracking of a two wheeled mobile robot. A second order sliding mode control methodology is used to ensure continuity in the torque inputs, in addition to disturbance rejection. The results are validated through two simulations.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124248972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
3D - Playfair cipher with additional bitwise operation 3D -游戏公平密码与额外的位操作
Versha Verma, D. Kaur, Ravindra Kumar Singh, A. Kaur
{"title":"3D - Playfair cipher with additional bitwise operation","authors":"Versha Verma, D. Kaur, Ravindra Kumar Singh, A. Kaur","doi":"10.1109/ICCCCM.2013.6648913","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648913","url":null,"abstract":"3D-Playfair cipher is multiple letter encryption cipher. In this, trigraphs of plaintext are treated as single units and converted into corresponding cipher text trigraphs. 3D-Playfair Ciphers originates due to the limitations in classical Playfair as it supports only alphabets and may not support two alphabets at the same time. It also eliminates the fact that a diagram and its reverse will encrypt in a similar fashion. 3D-Playfair cipher supports all 26 alphabets, 10 digits and 28 special characters. The theme of research is to furnish security to data which contains alphabets numerals and special characters during transmission that's why additional bitwise operations are introduced and applied on the cipher text of 3D-Playfair cipher with a random key. Linear Feedback Shift Register is a good candidate for generation of random sequences and is selected for generating random keys for bitwise operations to offer better security to cipher text before transmission over the internet. Here X-OR or X-NOR operations are taken into consideration for the bitwise operations based on the key.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123842822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Computation of multimetalmultiligand complex formation equilibria in aqueous medium involving glutamic acid as primary ligand and Uracil as secondary ligand 以谷氨酸为一级配体,尿嘧啶为二级配体的水溶液中多金属多配体络合物形成平衡的计算
Divya Bartaria, Surabhi Sinha, P. Chandra, V. Krishna
{"title":"Computation of multimetalmultiligand complex formation equilibria in aqueous medium involving glutamic acid as primary ligand and Uracil as secondary ligand","authors":"Divya Bartaria, Surabhi Sinha, P. Chandra, V. Krishna","doi":"10.1109/ICCCCM.2013.6648910","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648910","url":null,"abstract":"Metallic complexes of multimetal and multiligand systems are complicated for calculating equilibrium concentrations in solution. Complexation equilibria have been deduced on the basis of speciation curves obtained through SCGOS computer program. The formation constants of ternary(1:1:1) quaternary(1:1:1:1) complexes of CuII, PbII, HgII, CdII, ZnII, CoII and NiII with Glutamic acid(A) and Uracil(B) as ligands have been determined potentiometrically in aqueous medium.Study of metal complexes of said ligands with respect to their stability, solution structure and quantitative aspects has been done. Acid dissociation constants of the ligands used and the formation constants of the ternary and quaternary complexes were determined at 37±1°C and in ionic strength I = 0.1 M NaNO3. Different concentration of species as a function of pH was examined and sequence of overall stability constants for MA, MB, MAB and M1M2AB type of complexes have been discussed which seem to follow Irving William order.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121361073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SWART: Secure Web Application Response Tool 安全的Web应用程序响应工具
Kanika Sharma, Naresh Kumar
{"title":"SWART: Secure Web Application Response Tool","authors":"Kanika Sharma, Naresh Kumar","doi":"10.1109/ICCCCM.2013.6648920","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648920","url":null,"abstract":"Web applications are increasingly used to provide e-services such as online banking, online shopping, and social networking over the internet. With this advancement, the attacks over the web applications have also increased. According to Cenzic 2013 report 99% of web applications are vulnerable tested in 2012 [1]. The root causes behind these vulnerabilities are lack of security awareness, design flaws & implementation bugs. Writing secure code for web application is a complex task as developer emphasis more on implementation of business logic for web application rather than implementing it with secure logic. These vulnerabilities might be exploited by malicious users which can harm the database & reputation of an organization. In this paper we have proposed an Application Intrusion Detection System tool which can detect & prevent web application attacks at the time of occurrence. We have implemented proposed approach with ASP.NET web application and also perform Chi Square test to validate our assumptions. Once completed SWART has future potential to detect and prevent maximum attacks with less complexity.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126422765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An offensive algorithm for multi-pattern parameterized string matching 多模式参数化字符串匹配的攻击性算法
Swati Tevatia, R. Prasad, D. Rai
{"title":"An offensive algorithm for multi-pattern parameterized string matching","authors":"Swati Tevatia, R. Prasad, D. Rai","doi":"10.1109/ICCCCM.2013.6648922","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648922","url":null,"abstract":"Finding a pattern P[0...m-1] in a large body of text T[0...n-1], m≤n, is called pattern matching. One of its variation is parameterized string matching. Two strings are said to parameterized match, if one can be transformed into other via some bijective mapping. The parameterized matching has important applications in software maintenance and plagiarism detection. In this paper, we propose a new algorithm for multi-pattern parameterized string matching problem. This is an extension of quick multiple matching algorithm for exact string matching. Experimental results show that the new algorithm is very fast in practice.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123418943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A robust third order sliding mode control of rigid underactuated robotic manipulator 刚性欠驱动机械臂的鲁棒三阶滑模控制
Manjusha Bhave, S. Janardhanan, L. Dewan
{"title":"A robust third order sliding mode control of rigid underactuated robotic manipulator","authors":"Manjusha Bhave, S. Janardhanan, L. Dewan","doi":"10.1109/ICCCCM.2013.6648907","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648907","url":null,"abstract":"Robotic manipulators are widely used in space applications. It is a very tough task to handle actuator failure. Purposely, the system could also be designed to be underactuated to lower the weight and power consumption and make it cost effective. Higher order sliding mode control could prove to be a good control philosophy for controlling such underactuated systems. In the present work a strategy of choosing sliding function for tracking control of end effector in underactuated manipulator has been demonstrated by designing the third order sliding mode control and finite time convergence to sliding surface has also been achieved.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134258213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Minimum variance functional filtering for multirate sampled systems 多速率采样系统的最小方差函数滤波
N. Satyanarayana, S. Janardhanan
{"title":"Minimum variance functional filtering for multirate sampled systems","authors":"N. Satyanarayana, S. Janardhanan","doi":"10.1109/ICCCCM.2013.6648906","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648906","url":null,"abstract":"In this paper, we propose a new method of minimum-variance functional filtering for a class of sampled-data systems. The proposed method is based on multirate sampling of the plant output. This work includes the formulation of multirate output model for continuous-time system having noise in plant dynamics and measurement and necessary and sufficient conditions are given for existence of functional with minimal number of output samples. Numerical example is given to illustrate the procedure and its merits.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125230090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信