{"title":"Performance analysis of modified RC4 encryption algorithm","authors":"P. Jindal, Brahmjit Singh","doi":"10.1109/ICRAIE.2014.6909247","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909247","url":null,"abstract":"RC4 is one of the most widely accepted stream cipher on account of its structural simplicity, encryption and decryption speed and efficiency. In this paper, we report on several vulnerabilities of RC4 algorithm and further propose a modified RC4 (MRC4) algorithm to overcome the weaknesses of RC4. Working of RC4 consists of two parts: key scheduling algorithm (KSA) and pseudo random number generator algorithm (PRGA). In MRC4, additional layers are added to both KSA and PRGA without modifying its basic structure. Performance analysis of the conventional RC4 algorithm and its proposed variant has been performed in terms of running time, security, and randomness analysis. Through numerical results it is shown that while retaining the simplicity of RC4, MRC4 enhances the security of the stream cipher.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123087533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Venkata Rao Tavanam, D. S. Venkateswarlu, Karuna Sagar Dasari
{"title":"BFCA-VF: Best fit channel allocation and void filling by burst segmenting and scheduling","authors":"Venkata Rao Tavanam, D. S. Venkateswarlu, Karuna Sagar Dasari","doi":"10.1109/ICRAIE.2014.6909111","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909111","url":null,"abstract":"Optical Burst Switching (OBS) is a novel data transferring paradigm in rapidly growing Internet communication. The QoS factor of this OBS is syncing the bursts and available channels through a scheduling strategy such that the burst drop is minimal. Affirmation of the recent literature confirms that only 3 strategies Horizon, FFUC-VF and LAUC-VF are considerably performing to schedule bursts. But none of these models are considering all the QoS factors such as minimal Burst loss, speedy scheduling and minimal scheduling time complexity. In this paper, we propose a novel segmentation based algorithms for scheduling bursts in OBS networks without Fiber Delay Lines (FDLs). In networks without FDLs, our proposed burst scheduling algorithm can achieve scalability and linear time complexity (O(m) time, where m is the total number of void intervals) in channel scheduling and void filling by burst re-segmentation and scheduling strategy. Simulation results indicating that the proposed scheduling strategy is with minimal loss rate and time complexity that compared to LAUC-VF, ODBR and ABR, performs faster as like as Horizon scheduling strategy.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122185758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative analysis of maximum power point (MPP) tracking techniques for solar PV application using MATLAB simulink","authors":"S. K. Dash, D. Verma, S. Nema, R. Nema","doi":"10.1109/ICRAIE.2014.6909110","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909110","url":null,"abstract":"The renewable energy sources such as PV cells, fuel cells or energy storage devices are most popular. Among which photovoltaic energy is becoming one of the main power suppliers. This paper presents a comparative analysis between Perturb & Observe (P&O) and Incremental Conductance (Inc-Cond) algorithm for extracting the maximum power from photovoltaic Array. Because of the nonlinear characteristics of PV cell, the maximum power can be extracted under particular whether condition. Therefore, maximum power point tracking (MPPT) techniques are used to maximize the output power of PV array, continuously to track the maximum power point (MPP), which depends on atmospheric temperature and solar insolation. This paper addresses the comparison between of the existing maximum power point tracking (MPPT) techniques used in photovoltaic systems as reported in literature by using MATLAB/Simulink and PSPICE.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122335909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of PV MPPT performance and DC link voltage ripples compensation using a duty cycle modifier","authors":"J. H. Vardhana, B. K. Naick","doi":"10.1109/ICRAIE.2014.6909121","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909121","url":null,"abstract":"A number of algorithms have been proposed for the MPPT of PV modules, but the performance of these algorithms depends on the environmental conditions and also on the type of load (resistive and battery). In this paper, a duty cycle modifier is introduced which optimizes the performance of the existing MPPT techniques by modifying the duty cycle obtained from the MPPT algorithm. The duty cycle modifier also takes into account the variation in the output voltage to provide DC link voltage ripple compensation in grid connected PV systems providing a solution to the reliability issues due to the use of electrolytic capacitors.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125158030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jaypal Baviskar, Afshan Mulla, Saili K. Pandit, Radhika D. Naik, Amol Baviskar
{"title":"GPS based real time Emergency Aid System with analysis of latency in satellite communication","authors":"Jaypal Baviskar, Afshan Mulla, Saili K. Pandit, Radhika D. Naik, Amol Baviskar","doi":"10.1109/ICRAIE.2014.6909166","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909166","url":null,"abstract":"Around 4.2 million people commute by vehicles every day. The breakdowns and accidents augment the traffic woes, adding to the misery of these commuters. In order to obtain control over these situations, immediate assistance should be extended. This paper proposes an `Emergency Aid System (EAS) and Remote tracking of Vehicles', which ensures prompt assistance in case of unfortunate events like accidents and breakdowns. This is possible by sending an SMS to the nearest service aid station via 2G technology. The system implements latest technology of GSM modem with a sufficient baud rate and a GPS antenna that continuously tracks the coordinates of the vehicle. The complete analysis of the system, along with the study of time taken (latency) in exchanging the data between the GPS antenna and Satellite is studied and the results are presented.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125611231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An energy saving algorithm for variable cache ways","authors":"S. Subha","doi":"10.1109/ICRAIE.2014.6909223","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909223","url":null,"abstract":"Set associative caches with variable ways extending to one additional set is proposed in literature. In this model, two sets are searched for tag match during address mapping. Assuming the cache operates in two energy modes - high power mode and low power mode, both the sets associated with address mapping are enabled in high energy mode. This paper proposes an algorithm based on principle of locality to reduce the energy consumption. The last access to set among the two possible choices is chosen as the set to access during current access to a set. If the line is found in the set, it is accessed. If the line is absent, the other set associated with the mapped set is accessed for match. If it is a hit, the line is accessed. If it is a miss, the line is placed in vacant way if available. In case the set and associated set is full, the least recently used way in the mapped set is replaced. The proposed algorithm is simulated with SPEC2K benchmarks. An improvement of 79% in energy is observed with 9% improvement in AMAT.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127553317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reduced robust facial feature descriptor using DTCWT and PCA","authors":"Gauri Agrawal, S. Maurya","doi":"10.1109/ICRAIE.2014.6909107","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909107","url":null,"abstract":"This paper present a robust reduced facial feature descriptor for face recognition by using dual tree complex wavelet transform and principal component analysis. Proposed approach uses extra dyadic down sampling strategy on coefficient of DT-CWT to reduce the size of feature vector and further without loss of generality principal component analysis is used on reduced feature vector significantly. Geometrical structure in facial image can be represented efficiently and effectively with low redundancy by using extra dyadic down sampling strategy. To extract facial feature this method is robust against the discrepancy of shift and illumination than the DWT. It has been verified experimentally that the proposed method is more dominant to reduce the size of feature vector.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122709532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New call and handoff call management scheme for reuse partitioning based cellular systems","authors":"Abhijit Sharma, Suvendu Konai, U. Bhattacharya","doi":"10.1109/ICRAIE.2014.6909314","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909314","url":null,"abstract":"In cellular networks, blocking occurs when a Base Station has no free channel to allocate to a mobile user. There are two kinds of blocking. New call blocking refers to blocking of newly originated calls and the handoff dropping refers to blocking of ongoing calls due to the mobility of the users. From the user's point of view, the service of a handoff request is more important, as the forced termination of an ongoing call is more annoying than the blocking of new calls. In this paper, an adaptive guard channel based call admission control scheme is proposed which also deals with the problem of non-uniform traffic demand in different cells of the cellular network. A common set of channels are determined dynamically which can be used simultaneously in all the cells. Cell tiers with different radii are used to cope with the interference introduced by using same set of channels simultaneously in all cells. The adaptive guard channels alleviate the considerable amount of increase in the new call blocking probability due to guard channels while it can still protect handoff calls. The performance of the proposed scheme is presented in terms of call blocking probability, call dropping probability and channel utilization. Simulation results show that the proposed scheme can reduce the call blocking as well as call dropping significantly in highly congested cell.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127594441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Static analysis approaches to detect SQL injection and cross site scripting vulnerabilities in web applications: A survey","authors":"M. K. Gupta, M. C. Govil, Girdhari Singh","doi":"10.1109/ICRAIE.2014.6909173","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909173","url":null,"abstract":"Dependence on web applications is increasing very rapidly in recent time for social communications, health problem, financial transaction and many other purposes. Unfortunately, presence of security weaknesses in web applications allows malicious user's to exploit various security vulnerabilities and become the reason of their failure. Currently, SQL Injection (SQLI) and Cross-Site Scripting (XSS) vulnerabilities are most dangerous security vulnerabilities exploited in various popular web applications i.e. eBay, Google, Facebook, Twitter etc. Research on defensive programming, vulnerability detection and attack prevention techniques has been quite intensive in the past decade. Defensive programming is a set of coding guidelines to develop secure applications. But, mostly developers do not follow security guidelines and repeat same type of programming mistakes in their code. Attack prevention techniques protect the applications from attack during their execution in actual environment. The difficulties associated with accurate detection of SQLI and XSS vulnerabilities in coding phase of software development life cycle. This paper proposes a classification of software security approaches used to develop secure software in various phase of software development life cycle. It also presents a survey of static analysis based approaches to detect SQL Injection and cross-site scripting vulnerabilities in source code of web applications. The aim of these approaches is to identify the weaknesses in source code before their exploitation in actual environment. This paper would help researchers to note down future direction for securing legacy web applications in early phases of software development life cycle.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134037122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vishwambhar Pathak, P. Dhyani, M. Dhyani, Praveen Sharma
{"title":"Circular morphological feature extraction for nuclear medicine facilitation","authors":"Vishwambhar Pathak, P. Dhyani, M. Dhyani, Praveen Sharma","doi":"10.1109/ICRAIE.2014.6909235","DOIUrl":"https://doi.org/10.1109/ICRAIE.2014.6909235","url":null,"abstract":"Nuclear medicine applications of computing have largely been on demand due to expensive and time consuming pathological processes for detection of diseases like cancer. Automation tools exploiting morphological characteristics have been employed successfully. Limitations of the existing automated tools in handling specific situations keep the domain alive for research aimed at effective solutions. Detection and counting of circular regions representing the blood cells or bacterial nuclei is an important task in such solutions. The paper investigates traditional image processing methods like region-thresholding, circular Hough transform, Gabor Annulus and Otsu's discriminant in handling of overlapping regions. The paper contributes a semi-supervised method for circular feature extraction and automatic counting. The method is shown to have an edge over existing methods.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115567871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}