{"title":"A novel 4T XOR based 1 bit full adder design","authors":"N. Singh, P. Sharma","doi":"10.1109/I2CT.2014.7092062","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092062","url":null,"abstract":"This paper puts forward a methodology for designing 1 bit full adder using a newly proposed 4T xor gate. The 4T xor gate is formed of 2 pMOS and 2 nMOS transistors. The sum is formed using 2 xor gate and the carry is formed using a 2T mux. The resulting 1 bit full adder is made up of 10 transistors. The simulation is done using Cadence Virtuoso Simulator using 180nm technology and 1.8V power supply. The results show the efficiency of the design.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131175541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compact tapered fed dual-band monopole antenna for WLAN and WiMAX application","authors":"S. Behera, Ambika Singh, S. Sahu, P. Behera","doi":"10.1109/I2CT.2014.7092251","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092251","url":null,"abstract":"In this paper a compact tapered fed dual band monopole antenna based on complimentary split ring resonators(CSRR) used for WLAN and WiMAX application. Two CSRR are placed side by side symmetrically, which produces a narrow stop band in a single band for which dual band observed. As over all bandwidth reduces the gain is improved. The composite metamaterial CSRR can provide dual band operation at 1.9-2.6 and 2.92-4.3 GHz with reflection coefficient less than -10 dB by the two resonant modes due to CSRR and length of the patch. The gain at lower resonant band -2-0.2 dB and at higher resonant band 0.5-2 dB. A 50 Ω microstrip line, followed by parabolic feed and rectangle step feed is adopted for impedance matching. The uniqueness of this design is that the CSRR generates a narrow stop band in a wideband produced by an element without having any CSRR, which makes the dual band antenna very compact. Antenna parameters like reflection coefficient, radiation pattern, gain are analyzed with numerical simulation.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125073027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Acceleration of image blurring algorithm on multicore architecture","authors":"Aman Arora, N. A. Pande","doi":"10.1109/I2CT.2014.7092182","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092182","url":null,"abstract":"Production chains featuring industrial vision are becoming more and more widespread. Those processes are often heavy and applied to high definition images with important frame rate. Powerful calculators are thus needed to follow the ever growing production rate. NVIDIA is currently designing interfaces providing a CUDA (Compute Unified Device Architecture) architecture allowing parallel data computation. This could increase the performance of every operating system using graphical processing units (GPU). Pure Data, thanks to its graphical modular development environment, allows fast prototype developments. Those factors led us to start a research program dedicated to the realizations of image processing modules for Pure Data written in CUDA. So in this we have implemented image blurring algorithm to get familiar with GPGPU.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121065008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient information retrieval using domain ontology","authors":"Pratibha S. Sonakneware, S. Karale","doi":"10.1109/I2CT.2014.7092229","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092229","url":null,"abstract":"Currently most of information is accessed from world wide web from many search engines. These search engine search information on the basis of keywords, and that keyword based search engine searches enormous amount of data. User takes more time to access relevant information. So, in order to overcome the limitation of keyword based search technic of conceptual search is done, i.e. search by meaning instead of search by literal string. Search engine interpret the meaning of user's query and the relations among the concepts that a document contains with respect to a particular domain. In this paper, we proposed Information Retrieval system in which, user enters a query and for that query meaningful concepts are Extracted using domain ontology, For all the terms (expanded and initial query terms), SPARQL query is formed and then it is fired on the knowledge base(ontology) that finds appropriate RDF triples in knowledge Base. In our proposed system we are converting the natural query to sparql query using quepy tool and creating the knowledge base system by using Protégé tool.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121228425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA based data transfer using multi-port memory controller","authors":"S. Dighe, R. Pagare","doi":"10.1109/I2CT.2014.7092230","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092230","url":null,"abstract":"The meaning of Multi-port controller is that the sharing of the memory, which is mostly used for need of real time process. The main features of FPGA's are fast, flexible and strong characteristics of transplantation. In case of digital system, transmitting information through latch, a dedicated communication interface and the shared memory devices are required to achieve transmission of data. But for large data, large numbers of latches are required. For large number of latches large numbers of decoders are required. With the help of dedicated communication interface (USB, parallel port, serial port) speed can be fast or slow, also vary in the amount of data. However, the processor takes a long time to process real time applications. Multi-port DDR2 controller is used to realize the sharing of storage resources to meet the amount of data and real time requirements. Control module designed to consider the reliability of the factors of integration and portability. The FPGA's programmable logic device represented by the digital circuit design the most dynamic, most potential of a technology. The Multi-Port Memory Controller (MPMC) it allows number of entities to directly use memory by cancelling the system bus.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121324479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An effective way of mining knowledge from heterogeneous data sources","authors":"Venkateswara Rao Molli, M. Veeramanickam","doi":"10.1109/I2CT.2014.7092302","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092302","url":null,"abstract":"Big data related to large volume, multiple ways of growing data sets and autonomous sources. The study is defining the medical information, which needs to make logical and structural method of approaching the knowledge. And also effectually preparing and controlling the data generated during the diagnosis activities of medical application through sharing information among medical devices. These are achieved by applying the association rule mining. Specially, the study needs to prepare medical knowledge system or hospital management system to define the terminologies of medical which is technical that are serviceable by doctors to make clear of understanding of patients.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"467 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116026866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Punam V. Maitri, S. Deokate, Rekha V. Sarawade, Mayuri P. Patil
{"title":"Secure file transmission using byte rotation algorithm in network security","authors":"Punam V. Maitri, S. Deokate, Rekha V. Sarawade, Mayuri P. Patil","doi":"10.1109/I2CT.2014.7092190","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092190","url":null,"abstract":"Secure file transmission from one android user to another android user is important issue in network security. Byte rotation algorithm (BRA) and AES algorithm solve the problem of secure file transmission using encryption and decryption. In this paper we have introduced BRA for file encryption and decryption within minim delay. These algorithms improves the security and reduce time for process of file encryption and decryption. To provide security for different types of file like image, text, audio and video using BRA. Results are taken using Net Bean java complier for AES and BRA. Compare result for various parameters like BRA and AES encryption time as well as decryption time. To improve file security using random key generation (128bit) is used. User can set time and frequency during file transmission. When these conditions are satisfied file and key used for encryption will be deleted.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116164408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detector generation algorithm for self-nonself detection in Artificial Immune System","authors":"Mridul Goswami, Anirban Bhattacharjee","doi":"10.1109/I2CT.2014.7092107","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092107","url":null,"abstract":"In this paper a new algorithm for detector generation for self-nonself detection in Artificial Immune System is presented. The algorithm is inspired from the Negative Selection process of T cell maturation process in Biological Immune System. This algorithm is applicable where data are represented in the form of strings. R-chunk matching rule is used while checking two strings whether match or not. The algorithm is analyzed and compared with other relevant existing algorithms for detector generation.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"59 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116591659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Framework for evaluating Capture the Flag (CTF) security competitions","authors":"R. Raman, Sherin Sunny, V. Pavithran, K. Achuthan","doi":"10.1109/I2CT.2014.7092098","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092098","url":null,"abstract":"A large number of ethical hacking competitions are organized worldwide as Capture The Flag (CTF) events. But there does not exist a framework to evaluate and rank CTFs that will guide participants as to which CTF's to participate. In a CTF event, the participants are required to either solve a set of challenges to gain points or they are required to defend their system by eliminating the vulnerabilities while attacking other's system vulnerabilities. We are proposing a framework that would evaluate and rank CTFs according to factors like similarity of the tasks to the common critical vulnerabilities, solvability of tasks, periodicity, training given prior to CTF, geographical reach, problem solving skills etc. In the next step these factors are systematically assigned weights using Analytic Hierarchy Process. As part of frame work creation and validation, ten CTFs have been analysed. Our analysis indicates that: All CTFs fall in to one of the three categories (jeopardy, attack-defence and mixed); CTFs often adopt popular software vulnerabilities and threats as tasks to be solved; Only few CTFs give formal training prior to the event; Complexity of the tasks to be solved varies from CTF to CTF. Five CTFs were ranked using the newly developed framework.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114881864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stockwell transform reduces the Doppler frequency bin size of GPS receiver","authors":"Tamesh Halder, A. Bhattacharya","doi":"10.1109/I2CT.2014.7092077","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092077","url":null,"abstract":"GPS or GNSS signal is contaminated with noise when it reaches the ground receiver because of which the receiver has poor performance. The Doppler frequency also make the acquisition system of receiver, more ambiguous. The acquisition system uses a code delay-Doppler frequency bin to detect the correct signal with threshold. Generally the resolution of code delay-Doppler frequency bin, depends upon the sampling frequency or the maximum number of FFT points for correlation and Doppler frequency spacing. In literature, we can find that the sampling rate or the FFT points are reduced by estimating the sparsity of the received signal. Till now, the Doppler frequency estimation using few number of measurement, is very much limited. So, we propose a novel Doppler frequency detection technique which reduces the size of delay-Doppler frequency bin drastically in software defined radio (SDR), using Stockwell transform.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129804851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}