{"title":"An approach for data privacy in hybrid cloud environment","authors":"C. Ray, Uttam Ganguly","doi":"10.1109/ICCCT.2011.6075158","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075158","url":null,"abstract":"The cloud computing immerges as a new computing technology where all required services are available as a service. In a cloud environment, location of data is generally maintained by a third party (service provider/vendor) and hence an individual has no control over its own data. In this context, data privacy is an important issue for cloud computing both in terms of legal compliance and user trust. In this paper, an approach for data privacy in hybrid cloud environment is focused. Initially, a data privacy model for cloud computing is provided in which sensitive and non-sensitive data are maintained separately. In order to maintain data privacy, an authentication monitor is introduced in this privacy model. Finally, the authentication algorithm is implemented in a very small setup cloud environment and experimental results are provided at the end of the paper.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129442695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal transmit power and energy level performance of random WSN in Rayleigh fading channel","authors":"A. Nandi, S. Kundu","doi":"10.1109/ICCCT.2011.6075110","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075110","url":null,"abstract":"In Wireless Sensor Networks (WSNs) where nodes are power-driven by batteries, it is important to extend the network lifetime by minimizing the energy consumption of each node. Excessive high transmit power consumes more energy and increases internode interference significantly, while low transmit power may cause network failure. Thus choice of optimal transmit power is one of the prime concern in such network. Optimal transmit power is the minimum power required to sustain the network connectivity while maintaining a predetermined maximum tolerable Bit Error Rate (BER). In this paper, optimal transmit power is derived for a WSN deployed based on a random topology. Further impact of Rayleigh fading on optimal transmit power, route BER and energy consumption for successful delivery of data in multihop using ARQ in each hop is studied for such random WSN. In random network, an intermediate node in the route selects the nearest node within a sector of angle (θ) towards the direction of the destination as the next hop. The effects of search angle (θ) on optimal transmit power, route BER performance and energy consumptions are also indicated.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127144114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web based access and control environment for experiment on electronic circuits","authors":"A. P. J. Chandra, C. R. Venugopal","doi":"10.1109/ICCCT.2011.6075170","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075170","url":null,"abstract":"Electronic laboratory experiments mainly describe the design and implementation of various circuits which assists theoretical study. Web based environment for these experiments helps the learners with any time accessibility of the remote hardware resources through online environment. The graphical programming language LabVIEW and data acquisition facilities provide an attractive solution through the availability of rich functions to acquire and analyze the signals. The custom interface circuits are designed to configure the circuit remotely based on the design requirement. The remote switching of different components to the circuit experimentation is achieved through the transistor switching circuitry. The switching circuitry is operated by the Boolean control actuations on graphical user interface, which can be remotely operated through a common web browser. A case study is presented with the circuit experimentation on the generation of frequency modulation signal.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"78 4 Suppl 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131945740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An emulation based impact analysis of DDoS attacks on web services during flash events","authors":"M. Sachdeva, Gurvinder Singh, Krishan Kumar","doi":"10.1109/ICCCT.2011.6075134","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075134","url":null,"abstract":"The phenomenal growth of Internet has changed the way traditional essential services such as banking, transportation, medicine, education and defense are operated. In present era, the Internet is considered as main infrastructure of the global information society. Therefore, the availability of Internet is very critical. Distributed denial-of-service (DDoS) attacks pose an immense threat to the availability of these services. The services are severely degraded and hence lot of business loses are incurred due to these attacks. To objectively evaluate DDoS attack's impact, its severity and the effectiveness of a potential defense, a precise, quantitative and comprehensive DDoS impact metrics that are applicable to web services are required. In this paper, network topology is emulated and Flash Event (legitimate web traffic at high Rate) is generated. The attack traffic is generated at different strengths using different protocols to measure attack impact on web service. The impact is measured in terms of metrics such as Throughput, Response Time, Active Connections, Percentage of Failed transactions, Legitimate Packet Survival Ratio; Percentage of Packets Lost, Percentage of Request Packets Lost and Bottleneck Bandwidth","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125271990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WEP implementation using Linear Feedback Shift Register (LFSR) and dynamic key","authors":"Nidhi Gupta, G. P. Biswas","doi":"10.1109/ICCCT.2011.6075144","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075144","url":null,"abstract":"The WEP (wired equivalent privacy) is an IEEE 802.11's optional stream cipher scheme implemented in its MAC layer for confidentiality of the data frames. It uses RC4 for pn-sequence generation and the same is xored with the plain text and added integrity check value produced by the CRC-32. In this paper, the WEP has been implemented using the Linear Feedback Shift Register (LFSR) as a pn-sequence generator, i.e., the RC4 in WEP has been replaced by LFSR. Also the static key used in WEP is replaced by a dynamic key; as a result the proposed WEP implementation is more secured than the original one. The pn-sequence generated by LFSR is more random than the pn-sequence generated by RC4. In this regard, a randomness test, called Diehard test, has been carried out on the outputs of both RC4 and LFSR, and it has been found that more tests are satisfied by the LFSR, the details test results are included in this paper for ready reference.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134134115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of Diffserv enabled NAT","authors":"D. Guha, S. Pathak","doi":"10.1109/ICCCT.2011.6075101","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075101","url":null,"abstract":"In this paper we discuss evaluating performance of Network edge device like DiffServ enabled Network Address Translator or Session Border Controller for protecting cluster of VoIP servers. Incoming connections coming from outside to VoIP cluster is terminated at NAT for the purpose of enforcing security policies and connection mapping to identify the ongoing session and new session. We have taken a further step to equip the NAT with Quality of Service policy in order to make NAT as a application aware gateway or Session Border Controller. The performance is evaluated by considering the NAT buffer as a Vacational Queueing model. Mean queue length, and sojourn time analysis is made here.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130360667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adiabatic logic: Energy efficient technique for VLSI applications","authors":"A. Maurya, G. Kumar","doi":"10.1109/ICCCT.2011.6075164","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075164","url":null,"abstract":"This paper proposes an energy efficient technique with two-phase clocked adiabatic logic. A simulative investigation on the proposed circuit has been carried out in SPICE at 0.18μm technology node. Further NAND and NOR gates have been implemented by this technique and hence compared with the standard CMOS, Positive Feedback Adiabatic Logic (PFAL) and Two-Phase Adiabatic Static Clocked Logic (2PASCL) logic. Comparison has shown a significant power saving to the extent of 70% in case of proposed technique as compared to CMOS logic within 10 to 150MHz transition frequency range. Simulation results obtained from the technique cited just before have strongly ratified its validation & use in low power digital devices operated at low frequency.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115756950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Barik, Omprakash Chandrakar, B. Patel, Ankita Barik
{"title":"HKDA — Design pattern system architecture","authors":"L. Barik, Omprakash Chandrakar, B. Patel, Ankita Barik","doi":"10.1109/ICCCT.2011.6075124","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075124","url":null,"abstract":"Software Design Patterns (DPs) have been recognized as very important and useful in real software development since they provide an elegant way of getting around problems that often occur. Researcher has built an ITS known as Human Knowledge Discovery Agent System-HKDA, which provides adaptive learning environment for the students by providing personalized instructions. The HKDA System makes inferences about student knowledge and interacts intelligently with students based upon individual representations of their knowledge. The design pattern system architecture of HKDA consists of eight main components. In this research, researchers are going to discuss about Student Modeller and Pedagogical Module. However, to provide a clear idea about design patterns, a small description about other components such as Domain Knowledge/Domain Model, Knowledge Management, Student Knowledge-base, Presentation Planner, Pedagogical Experts and Communication Knowledge are also given.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124446088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An FPGA implementation of real-time QRS detection","authors":"H. K. Chatterjee, R. Gupta, J. Bera, M. Mitra","doi":"10.1109/ICCCT.2011.6075114","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075114","url":null,"abstract":"This paper illustrates a simple algorithm for real time QRS detection from ECG data. The algorithm is implemented on Xilinx field programmable gate array using very small number of memory cells. Single lead Synthetic ECG using ptb-db database (from Physionet) is generated from a personal computer using the parallel port (LPT1) at 1 ms sampling interval and delivered to the FPGA (Field Programmable Gate Array) board. At first, from the first 1500 samples, the QRS detection algorithm calculates some characteristic amplitude and slope based signatures which are used to form a rule base. These rules are used for detecting the next incoming QRS regions accurately. The index points of R-peaks are determined and shown in the LEDs using switch-based commands.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125146664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of L-strip feed slot loaded dual band microstrip patch antenna","authors":"J. A. Ansari, Ashish Singh, Kamakshi, A. Mishra","doi":"10.1109/ICCCT.2011.6075186","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075186","url":null,"abstract":"A dual band L-strip proximity fed slot loaded rectangular microstrip patch antenna is proposed and investigated theoretically as well as simulated by IE3D. Numerical results for the input impedance, VSWR and return loss are presented and compared with simulated results. The effect on varying height h2, slot width and width of the strip are analyzed to obtained the optimum values for dual band operation. The resonance frequency of proposed antenna is found to be 3.26GHz and 6.20 GHz for lower and upper resonance frequency. The frequency ratio is found to be 1.95. The bandwidth of the proposed antenna is found to be 1.63% and 1.18 % (simulated) and 3.35 % and 2.5 % (theoretical) for lower and upper resonance frequency respectively.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134295641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}