2015 IEEE Bombay Section Symposium (IBSS)最新文献

筛选
英文 中文
Performance analysis of vedic multiplication technique using FPGA 基于FPGA的吠陀乘法技术性能分析
2015 IEEE Bombay Section Symposium (IBSS) Pub Date : 2015-09-01 DOI: 10.1109/IBSS.2015.7456657
S. Chopade, Rama Mehta
{"title":"Performance analysis of vedic multiplication technique using FPGA","authors":"S. Chopade, Rama Mehta","doi":"10.1109/IBSS.2015.7456657","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456657","url":null,"abstract":"Today, it is necessary to increase the speed of multiplier as the need of high speed processors is increasing. Multiplier is a main block of any processor. Conventional processors need great hardware resources and take more time in multiplication operation. This paper present a high speed multiplier based on ancient popular Vedic Mathematics. Implementation is done on digital circuits. Vedic multiplication is accomplished in the same way as that of normal multiplier using digital hardware. In this paper a comparison of concerned multipliers in 8, 16 and 32 bits multiplications is performed. 8 bit and 16bit Urdhva algorithm shows 50% improvement in delay than that of Nikhilam, whereas 100% better than that of Binary multiplier. 32bit Nikhilam multiplier gives 52% improvement in delay than that of Urdhva multiplier and 16% better than that of binary multiplier.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121124049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A novel low power, high performance design technique for domino logic 一种新颖的低功耗、高性能的多米诺逻辑设计技术
2015 IEEE Bombay Section Symposium (IBSS) Pub Date : 2015-09-01 DOI: 10.1109/IBSS.2015.7456636
Sunil Kavatkar, Girish Gidaye
{"title":"A novel low power, high performance design technique for domino logic","authors":"Sunil Kavatkar, Girish Gidaye","doi":"10.1109/IBSS.2015.7456636","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456636","url":null,"abstract":"Domino logic circuits are most often used in high performance designs such as microprocessors because of high speed and less area over the static logic. But these domino logics suffer from high power dissipation and low noise tolerance. In this paper the earlier proposed techniques to reduce power consumption of Domino logic such as Dual Threshold Voltage (DTV), Dual Threshold Voltage-Voltage Scaling (DTVS) and Stacked Transistor Dual Threshold Voltage (ST-DTV) are analyzed. A novel technique using Dual Threshold Voltage technique with Stacked Transistor only in pull-up path along with Voltage Scaling and Charge Sharing technique is proposed in this paper. The proposed technique gives smaller power dissipation with better Power Delay Product (PDP) compared to earlier power reduction techniques. The gate length biasing technique can be used to further reduce the leakage power. The impact of gate length biasing on the proposed design is shown in the later part of the paper. The proposed design is simulated using 3 input OR gate at 28 nm bulk CMOS technology. The simulations are performed with Mentor Graphics ELDO 13.2 and EZ-wave simulators.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124623733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Impact analysis of preventing cross site scripting and SQL injection attacks on web application 防止跨站脚本和SQL注入攻击对web应用程序的影响分析
2015 IEEE Bombay Section Symposium (IBSS) Pub Date : 2015-09-01 DOI: 10.1109/IBSS.2015.7456668
Rathod Mahesh Pandurang, D. Karia
{"title":"Impact analysis of preventing cross site scripting and SQL injection attacks on web application","authors":"Rathod Mahesh Pandurang, D. Karia","doi":"10.1109/IBSS.2015.7456668","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456668","url":null,"abstract":"Web applications provide immeasurable large facilities to the users. The usability and popularity of web applications have expanded. This has caused various types of attacks over them. SQL injection and XSS (Cross Site Scripting) attacks are very famous to exploit the web applications. To sneak into the web application database, one can use SQL injection attack that may cause database alteration or imparting vital details while XSS is one more threat in which malicious user tricks the input data given that may steer to the modification in webpage viewing or redirection of user to attacker's working space. The proposed Intrusion Detection System is a container based approach that is based on a mapping model. In this, a request to query mapping is applied to recognise and prevent such class of attacks. The container based approach to identify two different client requests have been used. The impact measurement of this container based approach on the web server is calculated using http_load and autobench tool. The web application performance measurement based on various parameters such as average page time, pages per second, memory and processing time for container based approach has been carried out and compared with the existing approach.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117090635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A leader based intrusion detection system for preventing intruder in heterogeneous wireless sensor network 针对异构无线传感器网络中入侵防御问题,提出了一种基于引线的入侵检测系统
2015 IEEE Bombay Section Symposium (IBSS) Pub Date : 2015-09-01 DOI: 10.1109/IBSS.2015.7456671
D. Rajkumar, R. Vayanaperumal
{"title":"A leader based intrusion detection system for preventing intruder in heterogeneous wireless sensor network","authors":"D. Rajkumar, R. Vayanaperumal","doi":"10.1109/IBSS.2015.7456671","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456671","url":null,"abstract":"Nowadays communication and data transmission among various heterogeneous networks is growing speedily and drastically. More number of heterogeneous networks are created and deployed by government as well as by private firms. Due to the distance, mobility, behavior of nodes in the networks and dynamic in nature, it is essential to provide security for all the networks separately or distributed. Various existing approaches discuss about the security issues and challenges for heterogeneous networks. In this paper a Leader Based Intrusion Detection System [LBIDS] is proposed to detect and prevent DOS as well as other attacks such as Sybil and Sinkhole in the networks by deploying the Leader Based Intrusion Detection System into access points in the networks. The proposed approach utilizes three core security challenges such as Authentication, positive incentive provision and preventing DOS. In addition to that it will do packet verification and IP verification for improving the efficiency in terms of detection and prevention against attacks in heterogeneous networks. The simulation of our proposed approach is carried out in NS2 software and the results were given.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115692113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Selective review of fingerprint enhancement, classification and matching techniques 选择性回顾指纹增强,分类和匹配技术
2015 IEEE Bombay Section Symposium (IBSS) Pub Date : 2015-09-01 DOI: 10.1109/IBSS.2015.7456656
S. Sandip, P. H. Zope
{"title":"Selective review of fingerprint enhancement, classification and matching techniques","authors":"S. Sandip, P. H. Zope","doi":"10.1109/IBSS.2015.7456656","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456656","url":null,"abstract":"Dry and wet fingerprint degrades the performance of fingerprint verification system, There are various issues in dry and wet fingerprint verification, like fingerprint skin quality, missing features and minimizing the matching efforts. Therefore, it is important for a dry and wet fingerprint recognition system to enhance, classify and match the fingerprint. In this work, we reviewed selective approaches for fingerprint enhancement, classification and matching.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125007519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Parallel architecture based fast algorithm for image enhancement 基于并行架构的快速图像增强算法
2015 IEEE Bombay Section Symposium (IBSS) Pub Date : 2015-09-01 DOI: 10.1109/IBSS.2015.7456650
K. K. Singh, D. Kumar, Shubham Chauhan, M. Bajpai
{"title":"Parallel architecture based fast algorithm for image enhancement","authors":"K. K. Singh, D. Kumar, Shubham Chauhan, M. Bajpai","doi":"10.1109/IBSS.2015.7456650","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456650","url":null,"abstract":"Parallel algorithms is having wide application in the field of image processing. This paper encompasses a new approach based on parallel (multi-processor) based programming for image enhancement. Chebyshev polynomial based fractional order differentiator has been used for enhancement purpose. It has been found that the use of parallel approach speeds up the enhancement process with respect to serial approach. The proposed algorithm has been tested on different clusters. To validate the applicability, proposed algorithm has been applied for three test cases. The effect of order of differentiation on speed of enhancement process has also been shown in experiments.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124108041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wave propagation model for wireless communication in underground mines 井下无线通信的波传播模型
2015 IEEE Bombay Section Symposium (IBSS) Pub Date : 2015-09-01 DOI: 10.1109/IBSS.2015.7456655
A. Ranjan, H. B. Sahu, P. Misra
{"title":"Wave propagation model for wireless communication in underground mines","authors":"A. Ranjan, H. B. Sahu, P. Misra","doi":"10.1109/IBSS.2015.7456655","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456655","url":null,"abstract":"Characteristics of Electromagnetic (EM) waves in underground mines are different from those of typical wireless channels because of the features of the underground mines. For reliable wireless communication in underground mines, an accurate channel model is crucial. In this work, an enhanced hybrid channel model is proposed with loss due to surface roughness for mine tunnel roadways based on the concept of multimode wave propagation. Based on the proposed model, we then analyzed the radio signal behaviour considering the significant parameters operating frequency, mine tunnel size, antenna gain, and transmitter and receiver position.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126159203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cryptographic techniques for wireless sensor networks: A survey 无线传感器网络的加密技术:综述
2015 IEEE Bombay Section Symposium (IBSS) Pub Date : 2015-09-01 DOI: 10.1109/IBSS.2015.7456652
Aiman Faquih, Priya U. Kadam, Zia U H. Saquib
{"title":"Cryptographic techniques for wireless sensor networks: A survey","authors":"Aiman Faquih, Priya U. Kadam, Zia U H. Saquib","doi":"10.1109/IBSS.2015.7456652","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456652","url":null,"abstract":"The world is approaching towards more promising application of wireless communication and electronics has enabled the development of low-cost sensor networks. Wireless Sensor Networks (WSNs) has vast range of applications but as the sensor network becomes more complex, security of these WSN becomes even more important. WSN faces major security threats due to deployment of sensors in remote area and its geographical distributions. This has led the researchers to explore solution in this emerging area. In this paper, key aspect for the WSN security is discussed. Various cryptography techniques are studied such as symmetric key and public key which further contains Elliptic Curve Cryptography (ECC), Pair based Cryptography (PBC) and Identity Based Cryptography (IBC).","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127161923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Optimized data migration within OpenStack cloud 优化OpenStack云内的数据迁移
2015 IEEE Bombay Section Symposium (IBSS) Pub Date : 2015-09-01 DOI: 10.1109/IBSS.2015.7456626
R. Vaidya, Sumedh N. Pundkar
{"title":"Optimized data migration within OpenStack cloud","authors":"R. Vaidya, Sumedh N. Pundkar","doi":"10.1109/IBSS.2015.7456626","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456626","url":null,"abstract":"Cloud computing is a collection of computing resources provided with the help of Internet. Cloud has various benefits such as broad area network access; cost reduction, ease of use, time saving, on-demand delivery of its services and all device support which has Internet connection. However, data migration within clouds is a challenging task. This paper proposes a migration approach that provides a secure and optimized way to handling data in large (MB or GB) amount. Compression reduces the total size of a file upto 30-50 percent, which results into efficient statistics and enhanced performance. Encryption results into data confidentiality and data integrity. Thus, this system deals with optimized data Migration and Data Security.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133740199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distributed data management in energy sector using Hadoop 基于Hadoop的能源行业分布式数据管理
2015 IEEE Bombay Section Symposium (IBSS) Pub Date : 2015-09-01 DOI: 10.1109/IBSS.2015.7456653
M. Vaidya, Shrinivas P. Deshpande
{"title":"Distributed data management in energy sector using Hadoop","authors":"M. Vaidya, Shrinivas P. Deshpande","doi":"10.1109/IBSS.2015.7456653","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456653","url":null,"abstract":"Eefficient use of energy is the need of an hour. Improving energy efficiency requires understanding of the usage patterns and practices. The outage is a wakeup call to modernize the infrastructure in the country to the collapse of the grids that knocked out power. When started analyzing on industry estimates, came to know that nearly 30 percent of the power generated in India is wasted in transmission and distribution primarily because of leakages and theft. There are certain mechanisms which have been used like legacy power distribution systems, SCADA etc. But Smart Metering technology is the one which is growing and in some years time will be seen implemented all over India. This is a review done to make load analysis of the power distribution to the customers on some such technologies to avoid sustained outages by analyzing momentary outage data and power theft using Hadoop MapReduce.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132605852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信