D. Sharma, S. Mittal, B. Kaushik, Ranjan Sharma, K. Yadav, M. Majumder
{"title":"Dynamic Crosstalk Analysis in RLC Modeled Interconnects Using FDTD Method","authors":"D. Sharma, S. Mittal, B. Kaushik, Ranjan Sharma, K. Yadav, M. Majumder","doi":"10.1109/ICCCT.2012.72","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.72","url":null,"abstract":"Accurate time domain analysis and cross talk estimation in VLSI interconnects has emerged as an essential design criteria. This paper presents the description of a finite difference time domain (FDTD) method that is intended for estimation of voltages and currents on coupled transmission line. A numerical method based on FDTD is opted for the estimation of cross talk induced time delay in lossy RLC interconnects. Both functional and dynamic cross talk effects in coupled line configuration are analyzed. Effect of line resistance on delay is also evaluated. A linear resistive driver is used to drive distributed RLC transmission line for lossy interconnect. It has been observed that the analytical results for proposed FDTD model are in good agreement with HSPICE simulation results. The proposed model using FDTD results in an average error of 4.1% with respect to HSPICE.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129748081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alpika Tripathi, B. Kumar, A. Sharma, D. S. Kushwaha
{"title":"SRS Based Estimation of Software Maintenance Effort","authors":"Alpika Tripathi, B. Kumar, A. Sharma, D. S. Kushwaha","doi":"10.1109/ICCCT.2012.38","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.38","url":null,"abstract":"Software maintenance effort estimation has always been a challenge for the software practitioners, as it consumes about half of the overall development costs. The effort required to develop or maintain software depend on the complexity of yet to be developed software. The proposed measure estimates the requirement-based complexity based on SRS document of yet to be developed software for systematic and early prediction of software maintenance effort using Software Requirements Specifications (SRS) document of the proposed software. The result obtained validates that, the proposed maintenance measure is a comprehensive one and compares well with various other prevalent measures proposed in the past. The computation of proposed maintenance effort estimation involves least overhead as compared to others.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"119 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129255688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Time Error Estimation Technique for OFDM System","authors":"A. P. Rathkanthiwar, A. Gandhi","doi":"10.1109/ICCCT.2012.19","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.19","url":null,"abstract":"OFDM based systems are extremely sensitive to time and frequency synchronization errors. This paper addresses the issue of time synchronization. In this paper we are presenting a simple and novel technique for time synchronization. The time synchronization error causes Inter Symbol Interference and hence must be corrected at receiver. In many wireless communication systems, the data packets or frame start with the preamble called training symbol followed by data symbols. The training symbol consists of some specific pattern. The similar frame structure is used for this new algorithm which consists of training symbol followed by OFDM data symbols. This novel technique uses new pattern for training symbol which consists of all identical samples. After applying our new algorithm, a peak is obtained at the end of training symbol. This is used to mark beginning of frame and estimation of timing error. Estimation error graph and BER graph are presented for 4QAM and 16 QAM in this paper. The results are shown for AWGN channel. The technique used is simple and results are encouraging and can be used in any of the OFDM based system.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126152972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Mobile SET Protocol with Formal Verification","authors":"S. Ahamad, N. Sastry, S. Udgata","doi":"10.1109/ICCCT.2012.65","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.65","url":null,"abstract":"In this paper we propose an Enhanced Mobile SET (EMSET) protocol with formal verification using Mobile Agent technology and Digital Signature with Message Recovery based on ECDSA mechanism. Mobile Agent technology and Digital Signature with Message Recovery (DSMR) based on ECDSA mechanism provides in proposing EMSET protocol in Mobile Networks. Mobile Agent technology has many benefits such as bandwidth conservation, reduction of latency, reduction of completion time, Asynchronous (disconnected) communications. Digital Signature with Message Recovery based on ECDSA eliminates the need of adopting PKI cryptosystems. Our proposed protocol EMSET ensures Authentication, Integrity, Confidentiality and Non Repudiation, achieves Identity protection from merchant and Eavesdropper, achieves Transaction privacy from Eavesdropper and Payment Gateway, achieves Payment Secrecy, Order Secrecy, forward secrecy, and prevents Double Spending, Overspending and Money laundering. In addition to these our proposed protocol withstands Replay, Man in the Middle and Impersonation attacks. The security properties of the proposed protocol have been verified using Scyther Tool and presented with results.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128670807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy Preserving Data Mining Techniques: Current Scenario and Future Prospects","authors":"Majid Bashir, Malik, M. A. Ghazi, Rashid Ali","doi":"10.1109/ICCCT.2012.15","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.15","url":null,"abstract":"Privacy preserving has originated as an important concern with reference to the success of the data mining. Privacy preserving data mining (PPDM) deals with protecting the privacy of individual data or sensitive knowledge without sacrificing the utility of the data. People have become well aware of the privacy intrusions on their personal data and are very reluctant to share their sensitive information. This may lead to the inadvertent results of the data mining. Within the constraints of privacy, several methods have been proposed but still this branch of research is in its infancy. The success of privacy preserving data mining algorithms is measured in terms of its performance, data utility, level of uncertainty or resistance to data mining algorithms etc. However no privacy preserving algorithm exists that outperforms all others on all possible criteria. Rather, an algorithm may perform better than another on one specific criterion. So, the aim of this paper is to present current scenario of privacy preserving data mining tools and techniques and propose some future research directions.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128092996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Black Hole Attack on WiMAX-WLAN Interface Network","authors":"R. Jha, U. Dalal, Idris Z. Bholebawa","doi":"10.1109/ICCCT.2012.68","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.68","url":null,"abstract":"In this paper, we have observed that the performance analysis of one of the most challenging security issue for wireless network i.e. Black hole attack. WiMAX-WLAN interface will play a important role in the NGN (Next generation Network) scenario. This attack is possible in WiMAX-WLAN interface network i.e. in current scenarios. In this paper we analyzed the performance analysis of Performance Analysis of Black Hole Attack on WiMAX-WLAN Interface Network. In this type of attack an intruder is a malicious node with less buffer size moving on its defined trajectory and passing from WiMAX-WLAN converter. In black hole attack, a malicious node uses its routing protocol in order to advertise itself for having the shortest path to the destination node or to the packet it wants to intercept. This aggressive node advertises its availability of fresh routes irrespective of checking its routing table. In this technique attacker node will always have the accessibility in replying to the route request and thus intercept the data packet and retain it.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128239873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Demand Based File Replication and Consistency Mechanism","authors":"M. Vardhan, A. Goel, A. Verma, D. S. Kushwaha","doi":"10.1109/ICCCT.2012.74","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.74","url":null,"abstract":"File replication and consistency are well known techniques in distributed systems to address the key issues such as scalability, reliability and fault tolerance. For many years, file replication and consistency in distributed environment has been researched to enhance and optimize the availability and reliability of the entire system. An effort has been made in the present work to propose a file popularity based, adaptive, on demand, reliable and comprehensive file replication and consistency mechanism. This paper introduces a group of File Replication Servers (FRS) that is responsible for ensuring the file availability, in order to fulfill the file request. The present work proposes Hybrid file update propagation mechanism so as to minimize the number of updates. Proposed model replicates the file, from one node to the other node, when the total number of request for a particular file reaches a threshold value. Proposed approach is implemented on JAVA platform. Based on the file popularity, model creates and updates the file replica on the server. The proposed Hybrid approach is compared with write invalidate and write update propagation policies. Comparison results show that for balanced load hybrid file update propagation model updates the optimum number of replicas. Whereas, for unbalanced load, hybrid approach outperforms other two approaches by handling all the file requests with minimum number of updates.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132938466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speaker Recognition","authors":"Supriya Tripathi, Smriti Bhatnagar","doi":"10.1109/ICCCT.2012.64","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.64","url":null,"abstract":"Speech processing has emerged as one of the important application area of digital signal processing. The objective of automatic speaker recognition is to extract, characterize and recognize the information about speaker identity. This paper proposes the comparison of the MFCC and the Vector Quantisation technique for speaker recognition. Feature vectors from speech are extracted by using Mel-frequency cepstral coefficients which carry the speaker's identity characteristics and vector quantization technique is implemented through Linde-Buzo-Gray algorithm. Vector quantization uses a codebook to characterize the short-time spectral coefficients of a speaker. These coefficients are used to identify an unknown speaker from a given set of speakers. The effectiveness of these methods is examined from the viewpoint of robustness against utterance variation such as differences in content, temporal variation, and changes in utterance speed.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133612534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Choudhary, D. Chakraborty, N. M. Kakoty, S. Hazarika
{"title":"Development of Cost Effective EMG Controlled Three Fingered Robotic Hand","authors":"S. Choudhary, D. Chakraborty, N. M. Kakoty, S. Hazarika","doi":"10.1109/ICCCT.2012.29","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.29","url":null,"abstract":"One of the major problems confronted in the development of robotic hand prostheses is the achievement of electromyogram (EMG) based control in terms of grasping adaptability. Moreover prosthetic hands that have appeared in the market are out of the reach of common people because of high cost. In this paper, we report the development and control of a three fingered robotic hand motivated by these facts. The developed hand possess six degrees of freedom and can grasp oval, cuboid, circular and cylindrical objects with self adaptability. A grasp planner based on EMG signals commands the controller for actuating the hand opening and closing. In the grasp planner, a fuzzy classifier recognizes shoulder abduction and adduction based on the root mean square value of EMG. The control is through a proportional controller customized with position and touch sensors. The envisaged cost of the proposed hand would be appreciably low compared to most of the hands available in the market.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128339748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of 2x2 Mach-Zehnder Interferometer Electro-Optic Switch","authors":"K. Jain, R. Mehra, H. K. Dixit","doi":"10.1109/ICCCT.2012.41","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.41","url":null,"abstract":"This paper presents enhanced performance of a 2x2 optoelectronic switch based on Mach-Zehnder Interferometer made by titanium diffusion in lithium niobate substrate. The electro-optic switches have wide application in next generation optical networks due to their high speed operation. The optimization of switching characteristics is performed for low switching losses such as insertion loss, excess loss, high extinction ratio and low switching voltage by varying the gap of 3dB couplers, gap of interferometric arms and wave guide width. The present structure has been optimized in order to reduce the overall switch losses (= 0.1 dB) and to achieve the best possible extinction ratio (≥ 20 dB). Further by changing wave guide width the switching voltage is reduced from 7.8 V to 7.4 V.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115482253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}