International Conference for Convergence for Technology-2014最新文献

筛选
英文 中文
A novel 4T XOR based 1 bit full adder design 一种新颖的基于4T异或的1位全加法器设计
International Conference for Convergence for Technology-2014 Pub Date : 2014-04-06 DOI: 10.1109/I2CT.2014.7092062
N. Singh, P. Sharma
{"title":"A novel 4T XOR based 1 bit full adder design","authors":"N. Singh, P. Sharma","doi":"10.1109/I2CT.2014.7092062","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092062","url":null,"abstract":"This paper puts forward a methodology for designing 1 bit full adder using a newly proposed 4T xor gate. The 4T xor gate is formed of 2 pMOS and 2 nMOS transistors. The sum is formed using 2 xor gate and the carry is formed using a 2T mux. The resulting 1 bit full adder is made up of 10 transistors. The simulation is done using Cadence Virtuoso Simulator using 180nm technology and 1.8V power supply. The results show the efficiency of the design.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131175541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Compact tapered fed dual-band monopole antenna for WLAN and WiMAX application 用于WLAN和WiMAX应用的紧凑型锥形馈电双带单极天线
International Conference for Convergence for Technology-2014 Pub Date : 2014-04-06 DOI: 10.1109/I2CT.2014.7092251
S. Behera, Ambika Singh, S. Sahu, P. Behera
{"title":"Compact tapered fed dual-band monopole antenna for WLAN and WiMAX application","authors":"S. Behera, Ambika Singh, S. Sahu, P. Behera","doi":"10.1109/I2CT.2014.7092251","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092251","url":null,"abstract":"In this paper a compact tapered fed dual band monopole antenna based on complimentary split ring resonators(CSRR) used for WLAN and WiMAX application. Two CSRR are placed side by side symmetrically, which produces a narrow stop band in a single band for which dual band observed. As over all bandwidth reduces the gain is improved. The composite metamaterial CSRR can provide dual band operation at 1.9-2.6 and 2.92-4.3 GHz with reflection coefficient less than -10 dB by the two resonant modes due to CSRR and length of the patch. The gain at lower resonant band -2-0.2 dB and at higher resonant band 0.5-2 dB. A 50 Ω microstrip line, followed by parabolic feed and rectangle step feed is adopted for impedance matching. The uniqueness of this design is that the CSRR generates a narrow stop band in a wideband produced by an element without having any CSRR, which makes the dual band antenna very compact. Antenna parameters like reflection coefficient, radiation pattern, gain are analyzed with numerical simulation.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125073027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Acceleration of image blurring algorithm on multicore architecture 多核结构下图像模糊算法的加速研究
International Conference for Convergence for Technology-2014 Pub Date : 2014-04-06 DOI: 10.1109/I2CT.2014.7092182
Aman Arora, N. A. Pande
{"title":"Acceleration of image blurring algorithm on multicore architecture","authors":"Aman Arora, N. A. Pande","doi":"10.1109/I2CT.2014.7092182","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092182","url":null,"abstract":"Production chains featuring industrial vision are becoming more and more widespread. Those processes are often heavy and applied to high definition images with important frame rate. Powerful calculators are thus needed to follow the ever growing production rate. NVIDIA is currently designing interfaces providing a CUDA (Compute Unified Device Architecture) architecture allowing parallel data computation. This could increase the performance of every operating system using graphical processing units (GPU). Pure Data, thanks to its graphical modular development environment, allows fast prototype developments. Those factors led us to start a research program dedicated to the realizations of image processing modules for Pure Data written in CUDA. So in this we have implemented image blurring algorithm to get familiar with GPGPU.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121065008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient information retrieval using domain ontology 基于领域本体的高效信息检索
International Conference for Convergence for Technology-2014 Pub Date : 2014-04-06 DOI: 10.1109/I2CT.2014.7092229
Pratibha S. Sonakneware, S. Karale
{"title":"Efficient information retrieval using domain ontology","authors":"Pratibha S. Sonakneware, S. Karale","doi":"10.1109/I2CT.2014.7092229","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092229","url":null,"abstract":"Currently most of information is accessed from world wide web from many search engines. These search engine search information on the basis of keywords, and that keyword based search engine searches enormous amount of data. User takes more time to access relevant information. So, in order to overcome the limitation of keyword based search technic of conceptual search is done, i.e. search by meaning instead of search by literal string. Search engine interpret the meaning of user's query and the relations among the concepts that a document contains with respect to a particular domain. In this paper, we proposed Information Retrieval system in which, user enters a query and for that query meaningful concepts are Extracted using domain ontology, For all the terms (expanded and initial query terms), SPARQL query is formed and then it is fired on the knowledge base(ontology) that finds appropriate RDF triples in knowledge Base. In our proposed system we are converting the natural query to sparql query using quepy tool and creating the knowledge base system by using Protégé tool.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121228425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FPGA based data transfer using multi-port memory controller 基于FPGA的数据传输多端口存储器控制器
International Conference for Convergence for Technology-2014 Pub Date : 2014-04-06 DOI: 10.1109/I2CT.2014.7092230
S. Dighe, R. Pagare
{"title":"FPGA based data transfer using multi-port memory controller","authors":"S. Dighe, R. Pagare","doi":"10.1109/I2CT.2014.7092230","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092230","url":null,"abstract":"The meaning of Multi-port controller is that the sharing of the memory, which is mostly used for need of real time process. The main features of FPGA's are fast, flexible and strong characteristics of transplantation. In case of digital system, transmitting information through latch, a dedicated communication interface and the shared memory devices are required to achieve transmission of data. But for large data, large numbers of latches are required. For large number of latches large numbers of decoders are required. With the help of dedicated communication interface (USB, parallel port, serial port) speed can be fast or slow, also vary in the amount of data. However, the processor takes a long time to process real time applications. Multi-port DDR2 controller is used to realize the sharing of storage resources to meet the amount of data and real time requirements. Control module designed to consider the reliability of the factors of integration and portability. The FPGA's programmable logic device represented by the digital circuit design the most dynamic, most potential of a technology. The Multi-Port Memory Controller (MPMC) it allows number of entities to directly use memory by cancelling the system bus.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121324479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An effective way of mining knowledge from heterogeneous data sources 一种从异构数据源中挖掘知识的有效方法
International Conference for Convergence for Technology-2014 Pub Date : 2014-04-06 DOI: 10.1109/I2CT.2014.7092302
Venkateswara Rao Molli, M. Veeramanickam
{"title":"An effective way of mining knowledge from heterogeneous data sources","authors":"Venkateswara Rao Molli, M. Veeramanickam","doi":"10.1109/I2CT.2014.7092302","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092302","url":null,"abstract":"Big data related to large volume, multiple ways of growing data sets and autonomous sources. The study is defining the medical information, which needs to make logical and structural method of approaching the knowledge. And also effectually preparing and controlling the data generated during the diagnosis activities of medical application through sharing information among medical devices. These are achieved by applying the association rule mining. Specially, the study needs to prepare medical knowledge system or hospital management system to define the terminologies of medical which is technical that are serviceable by doctors to make clear of understanding of patients.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"467 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116026866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure file transmission using byte rotation algorithm in network security 安全文件传输使用字节旋转算法在网络安全
International Conference for Convergence for Technology-2014 Pub Date : 2014-04-06 DOI: 10.1109/I2CT.2014.7092190
Punam V. Maitri, S. Deokate, Rekha V. Sarawade, Mayuri P. Patil
{"title":"Secure file transmission using byte rotation algorithm in network security","authors":"Punam V. Maitri, S. Deokate, Rekha V. Sarawade, Mayuri P. Patil","doi":"10.1109/I2CT.2014.7092190","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092190","url":null,"abstract":"Secure file transmission from one android user to another android user is important issue in network security. Byte rotation algorithm (BRA) and AES algorithm solve the problem of secure file transmission using encryption and decryption. In this paper we have introduced BRA for file encryption and decryption within minim delay. These algorithms improves the security and reduce time for process of file encryption and decryption. To provide security for different types of file like image, text, audio and video using BRA. Results are taken using Net Bean java complier for AES and BRA. Compare result for various parameters like BRA and AES encryption time as well as decryption time. To improve file security using random key generation (128bit) is used. User can set time and frequency during file transmission. When these conditions are satisfied file and key used for encryption will be deleted.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116164408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Detector generation algorithm for self-nonself detection in Artificial Immune System 人工免疫系统中自我-非自我检测的检测器生成算法
International Conference for Convergence for Technology-2014 Pub Date : 2014-04-06 DOI: 10.1109/I2CT.2014.7092107
Mridul Goswami, Anirban Bhattacharjee
{"title":"Detector generation algorithm for self-nonself detection in Artificial Immune System","authors":"Mridul Goswami, Anirban Bhattacharjee","doi":"10.1109/I2CT.2014.7092107","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092107","url":null,"abstract":"In this paper a new algorithm for detector generation for self-nonself detection in Artificial Immune System is presented. The algorithm is inspired from the Negative Selection process of T cell maturation process in Biological Immune System. This algorithm is applicable where data are represented in the form of strings. R-chunk matching rule is used while checking two strings whether match or not. The algorithm is analyzed and compared with other relevant existing algorithms for detector generation.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"59 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116591659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Framework for evaluating Capture the Flag (CTF) security competitions 评估夺旗(CTF)安全竞赛的框架
International Conference for Convergence for Technology-2014 Pub Date : 2014-04-06 DOI: 10.1109/I2CT.2014.7092098
R. Raman, Sherin Sunny, V. Pavithran, K. Achuthan
{"title":"Framework for evaluating Capture the Flag (CTF) security competitions","authors":"R. Raman, Sherin Sunny, V. Pavithran, K. Achuthan","doi":"10.1109/I2CT.2014.7092098","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092098","url":null,"abstract":"A large number of ethical hacking competitions are organized worldwide as Capture The Flag (CTF) events. But there does not exist a framework to evaluate and rank CTFs that will guide participants as to which CTF's to participate. In a CTF event, the participants are required to either solve a set of challenges to gain points or they are required to defend their system by eliminating the vulnerabilities while attacking other's system vulnerabilities. We are proposing a framework that would evaluate and rank CTFs according to factors like similarity of the tasks to the common critical vulnerabilities, solvability of tasks, periodicity, training given prior to CTF, geographical reach, problem solving skills etc. In the next step these factors are systematically assigned weights using Analytic Hierarchy Process. As part of frame work creation and validation, ten CTFs have been analysed. Our analysis indicates that: All CTFs fall in to one of the three categories (jeopardy, attack-defence and mixed); CTFs often adopt popular software vulnerabilities and threats as tasks to be solved; Only few CTFs give formal training prior to the event; Complexity of the tasks to be solved varies from CTF to CTF. Five CTFs were ranked using the newly developed framework.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114881864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Stockwell transform reduces the Doppler frequency bin size of GPS receiver 斯托克韦尔变换减小了GPS接收机的多普勒频域尺寸
International Conference for Convergence for Technology-2014 Pub Date : 2014-04-06 DOI: 10.1109/I2CT.2014.7092077
Tamesh Halder, A. Bhattacharya
{"title":"Stockwell transform reduces the Doppler frequency bin size of GPS receiver","authors":"Tamesh Halder, A. Bhattacharya","doi":"10.1109/I2CT.2014.7092077","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092077","url":null,"abstract":"GPS or GNSS signal is contaminated with noise when it reaches the ground receiver because of which the receiver has poor performance. The Doppler frequency also make the acquisition system of receiver, more ambiguous. The acquisition system uses a code delay-Doppler frequency bin to detect the correct signal with threshold. Generally the resolution of code delay-Doppler frequency bin, depends upon the sampling frequency or the maximum number of FFT points for correlation and Doppler frequency spacing. In literature, we can find that the sampling rate or the FFT points are reduced by estimating the sparsity of the received signal. Till now, the Doppler frequency estimation using few number of measurement, is very much limited. So, we propose a novel Doppler frequency detection technique which reduces the size of delay-Doppler frequency bin drastically in software defined radio (SDR), using Stockwell transform.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129804851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信