{"title":"Sleepy lector: A novel approach for leakage reduction in DSM technology","authors":"Ajay Kumar Dadoria, K. Khare, R. Singh","doi":"10.1109/CONFLUENCE.2016.7508201","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508201","url":null,"abstract":"Leakage power consumption is a major contribution of total power dissipation in Deep Sub-Micron (DSM) technology for CMOS circuit design. In this paper we have proposed a Novel circuit technique known as “Sleepy LECTOR” which mitigates various type of leakage current in DSM regime. In proposed technique we insert p-type sleep transistor above pull up network, and n-type sleep transistor below pull down network, which rail of from Vdd to GND for reduction of leakage power. Another Leakage controlled transistor (LCTs) PMOS and NMOS inserted between pull up and pull down network, these transistors are always near cut OFF voltage which increases the path resistance from supply to ground reducing leakage power, it is self controlling transistor. Lector transistors produce the stacking effect and producing high resistance path from Vdd to ground. By using Sleep transistors we can turn off the circuit by rail from power supply (Vdd) during standby mode for reduction of leakage power. The proposed circuit technique reduces the Power with respect to basic NAND gate 37.69%, 83.93%, N AND gate with sleep 79.15%, 86.69%, NAND gate with Lector 36.79%, 12.05% respectively in 65nm and 45nm Process Technology.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120926977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Akashdeep Bhardwaj, G. Subrahmanyam, V. Avasthi, Hanumat G. Sastry
{"title":"Solutions for DDoS attacks on cloud","authors":"Akashdeep Bhardwaj, G. Subrahmanyam, V. Avasthi, Hanumat G. Sastry","doi":"10.1109/CONFLUENCE.2016.7508107","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508107","url":null,"abstract":"The internet has become the key driver for virtually every organization's growth, brand awareness and operational efficiency. Unfortunately cyber terrorists and organized criminals know this fact too. Using a Distributed Denial of Service attack they can deny corporates and end users the access to internet, make web site going slow, and deny access to corporate network and data, unable to service legitimate users. It is not just these that are vulnerable, DDoS attacks are diversions.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"117-119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121232294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Perceptually transparent watermarking of audio signals","authors":"Anshul Atriek, A. Kaur","doi":"10.1109/CONFLUENCE.2016.7508163","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508163","url":null,"abstract":"Digital watermarking captivates within remarkable promise as one of the silver bullets to fortify and insulate proprietary digital material in the times to come. It focuses on embedding watermark information into a digital host object in an inseparable bond to authenticate the latter. This paper proposes a high-capacity blind audio watermarking technique within perceptual constraints, i.e., the manipulations performed during the embedding process are imperceptible to unaided human senses. The suggested scheme uses high-frequency wavelet coefficients obtained during the quantization in Discrete Wavelet Transform (DWT) domain since redundant information can be accommodated with more ease in the high-frequency sub-band. Arnold Transformation is used for watermark permutation to ensure increased security and robustness of the scheme. From the experimental results, it follows that the illustrated scheme offers a healthy trade-off between payload, imperceptibility and robustness. The algorithm offers a fairly high Payload of 2755.6 bits per second while constantly maintaining the SNR, NCC and BER values well within the specified standards - even when been subjected to signal processing attacks.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"AES-4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126498663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud-based CAPTCHA service","authors":"A. Shumilov, A. Philippovich","doi":"10.1109/CONFLUENCE.2016.7508098","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508098","url":null,"abstract":"The majority of modern CAPTCHAs are prone to hacking, sometimes difficult to pass for humans, and cannot be tuned to fit the design of the website. This paper proposes a new, more robust and configurable, cloud-based CAPTCHA service that uses animated hand gestures to represent the sequence of characters the user needs to type in order to pass the test.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132468078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Tanwar, G. Sidhu, R. Majumdar, Abhishek Srivastava
{"title":"Removing traffic congestion at traffic lights using GPS technology","authors":"R. Tanwar, G. Sidhu, R. Majumdar, Abhishek Srivastava","doi":"10.1109/CONFLUENCE.2016.7508185","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508185","url":null,"abstract":"In present-day the most common issues that concerns everyone is traffic congestion on road at crossings where traffic light poles are placed. The objective is to flow and maintain traffic system automatically but unfortunately jamming queue exists while everything is fine from technology point of view because of predefined static time duration. This predefined time slots fail to capture real time scenarios in terms of traffic load and that leads to congestion. To avoid such type of problem, this work contributes the concept of dynamic traffic light slots as a best possible solution. Dynamic traffic light is a concept of controlling the time duration of RED and GREEN light according to traffic flow or by sensing flow of traffic on road in movement. This can be achieved by using Global Positioning System which will convey the details of traffic flow and by considering that, time slots are provided to traffic lights i.e. whole controlling and managing will work like Real Time System.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134409876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feature selection in software defect prediction: A comparative study","authors":"Misha Kakkar, Sarika Jain","doi":"10.1109/CONFLUENCE.2016.7508200","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508200","url":null,"abstract":"Software has become a vital part of human's life - hence building defect free software is a must. Various studies have been carried out to predict defects, probability of defect prone modules, and implementation of defect prediction for real life softwares. The focus of this paper is towards building a framework using attribute selection for defect prediction based on five classifiers IBk, KStar, LWL, Random Tree and Random Forest. Performance comparison is done on the basis of accuracy and ROC values. The result and analysis shows that the framework has reduced total number of attributes used for each dataset by 6 folds on average, also LWL performed better than other four classifiers when tested with 10 Cross Validation (10CV) and percentage split of 66%.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"37 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132865144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploration of application migration to cloud environment","authors":"Ahmed Kandil, H. El-Deeb","doi":"10.1109/CONFLUENCE.2016.7508097","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508097","url":null,"abstract":"Cloud computing has strongly imposed itself on the area of research for both industry and academics requirements. Cloud providers are moving or planning to move their applications to the cloud environment attaining infrastructures and different cloud service organizations. This task includes a lot of details to be academic selected to tackle such a task raising up a lot of questions which needs to be addressed in a scientific and practical approach. Most researches concerning this issue stressing on the challenges of the migration process to the cloud. But few studies stresses on the life running of practical applications in the cloud environment monitoring some selected performance measures to be compared before and after migration .The objective of this process could assist in taking a critical decision regarding either to keep or modify the practical migrated application. The Objective of this research is to evaluate the performance measures of a real running transaction processing system (TPS) as a selected case study before and after migration to the cloud environment. Plotting and analysis of the conducted results over the Amazon EC2 cloud environment as public cloud and a selected specific private cloud indicates 52% compared to the performance measures before migration which strongly support the usage of cloud computing approach for practical case studies without concerning about any performance degradation. The lower overhead cost for migration to public cloud environments proves the robustness of the proposed approach for this research.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133354011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A conformal microstrip patch antenna on cylinder back-to-back E and U shape slot for triple band operation","authors":"Brajlata Chauhan, A. Negi","doi":"10.1109/CONFLUENCE.2016.7508202","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508202","url":null,"abstract":"The paper presents the design of a microstrip patch antenna having E and U shape slot which is back to back connected to each other mounted on the finite cylindrical surface that can operate on a triple band 2.057 GHz, 3.6102 GHz, and 6.2624 GHz. This conformal structure with truncated corner used for circular polarization. This antenna is simulated through CST microwave studio finite element package. All the simulated parameters like return loss, Directivity, Gain , Radiation pattern in 2D/3D for port one and port two are presented.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132958258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Canonization rules for detecting different URLs","authors":"Chanchal Kumari, Divya Joshi, Shailendra Narayan Singh","doi":"10.1109/CONFLUENCE.2016.7508093","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508093","url":null,"abstract":"A Uniform Resource Locator (URL) represents the address of a web page in World Wide Web (WWW). A URL grants access to a single web page on the WWW. Here in this paper the main focus is on the URLs addressing the same web page/same content. A web Page can have two or more URLs with which the web page can be accessed. These duplicate URLs can be a serious threat to the entire pipeline of internet searcher administration for indexing and creeping. I am presenting a novel algorithm for detecting canonization rules for normalizing URLs to the original single URL. Here a pattern recognition approach has been used for analyzing textual data. This approach benefits search engines from information about duplicate URLs to optimize the performance of search engine in terms of reduced cost and improved quality.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127952091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on Shadow Detection and Removal in images and video sequences","authors":"Arti Tiwari, P. Singh, Sobia Amin","doi":"10.1109/CONFLUENCE.2016.7508175","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508175","url":null,"abstract":"Shadow Detection and Removal is the process to enhance the performance, reliability and accuracy of the computer vision applications including image segmentation and object recognition, object tracking, surveillance etc. Detection and Removal of shadow from the images and videos can reduce the undesirable outcomes in the computer vision applications and algorithms. The prime objective of this survey paper is to analyze the performance of various currently used shadow detection techniques. In this paper we have discussed the techniques for detecting and removing shadow from the still images and video sequences. The scope of discussed shadow detection and removal techniques is limited to different scenarios: (i) Shadow detection for Indoor and Outdoor scenes, (ii) Shadow detection using fixed or moving camera, (iii) Shadow detection of umbra and penumbra shadows etc.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125591639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}