2012 Second International Conference on Advanced Computing & Communication Technologies最新文献

筛选
英文 中文
Security Analysis of Identity Based Cryptography and Certificate Based in Wimax Network Using Omnet++ Simulator 基于omnet++模拟器的Wimax网络中基于身份的密码和证书的安全性分析
N. Chauhan, R. Yadav
{"title":"Security Analysis of Identity Based Cryptography and Certificate Based in Wimax Network Using Omnet++ Simulator","authors":"N. Chauhan, R. Yadav","doi":"10.1109/ACCT.2012.100","DOIUrl":"https://doi.org/10.1109/ACCT.2012.100","url":null,"abstract":"WiMAX is a promising technology that provides high data throughput with low delays for various user types and modes of operation. These advantages make WiMAX applicable both for infrastructure purposes and end-client usage. Since WiMAX is presented as a network framework and a last-mile technology, it is believed to be capable of handling a wide range of usage scenarios. Many security problems remain to be addressed in different modes and for different user types even in the final security standard of WiMAX, privacy and key management version 2 (PKMv2). Identity Based Cryptography (IBC) has potential benefits that can provide enhancements to the overall security and efficiency of the security standard. WiMAX as the primary connection medium for acquiring services such as on-demand video streaming, VoIP connections and mobile bank transactions, the service providers may use it for data relaying purposes among access points. To meet the technical requirements of these various scenarios, majority of the WiMAX research has been conducted on physical and MAC layers, however little has been invested in a comprehensive and efficient security solution, which has resulted in a wide range of security weaknesses and reactive solutions. One such enhancement is combining user identity with the public key and therefore eliminating the public key distribution load from the network. However, IBC has a few caveats, such as the necessity of a secure medium to distribute private keys. To compensate for these disadvantages, in this study, IBC is combined with certificate-based security. As a result, the benefits of IBC are maintained while the disadvantages are eliminated.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115616046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Implementation of Symmetric Key Using Dlcs for Wireless Sensor Network 无线传感器网络中使用dlc实现对称密钥
N. Singla, M. Tripathy
{"title":"Implementation of Symmetric Key Using Dlcs for Wireless Sensor Network","authors":"N. Singla, M. Tripathy","doi":"10.1109/ACCT.2012.65","DOIUrl":"https://doi.org/10.1109/ACCT.2012.65","url":null,"abstract":"In the design of WSN protocols the harsh environments and the existence of threats demand more careful security considerations. Cryptography is the art of achieving security by encoding messages to keep the information non-readable. Cryptography actually is a mathematical scrambling and unscrambling of data to achieve, Confidentiality (Readable only to sender and receiver), Integrity (not modified by any one to integrity of message), Availability (sender can't refuse the claim of not sending), and Entity authentication. While sending or receiving the data, special keys are used to encrypt/decrypt data to verify the original contents. This key makes the process of cryptography secure. There are two approaches for the generation of encryption/decryption keys i.e. software and hardware. The purpose of this paper is to generate encryption key using hardware technique. To design electronics circuit basic concept is derived from encoding and decoding of data via four different channels at different times. Selections of channels will be guided by timer and decoder circuits. As in the defense there are different hierarchy levels and they need secure communication. The purpose of this paper is to generate the key codes using electronic circuits to make the data more secure. The technique used in this paper is more secure then discussed in prior papers.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125810174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Temperature Control Using Intelligent Techniques 利用智能技术控制温度
S. Saini, S. Rani
{"title":"Temperature Control Using Intelligent Techniques","authors":"S. Saini, S. Rani","doi":"10.1109/ACCT.2012.110","DOIUrl":"https://doi.org/10.1109/ACCT.2012.110","url":null,"abstract":"This paper presents the comparison of various intelligent techniques used for temperature control of water bath system. Different control schemes namely PID, PID using Genetic Algorithms(GA-PID), Fuzzy Logic Control, Neural Network, Adaptive Neuro-Fuzzy Inference System(ANFIS), and GA-ANFIS have been compared through experimental studies with respect to set-points regulation, ramp-points tracking, influence of unknown impulse noise and large parameter variation. The merits and limitations of each scheme has been brought out. It has been found that the use of advanced techniques such as Artificial Neural Networks (ANN) and GA with the conventional FLC offers encouraging advantages. The superiority of FLC over PID, ANFIS over FLC and GA-ANFIS over other schemes has been highlighted.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126817631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
VLSI Implementation of Advanced Encryption Standard 高级加密标准的VLSI实现
C. Sangwan, C. Bhardwaj, N. Nisha, T. Sikka
{"title":"VLSI Implementation of Advanced Encryption Standard","authors":"C. Sangwan, C. Bhardwaj, N. Nisha, T. Sikka","doi":"10.1109/ACCT.2012.120","DOIUrl":"https://doi.org/10.1109/ACCT.2012.120","url":null,"abstract":"Information Security is always the primary concern for a user. Information Security is required to save data There are number of approaches as well number of available software's to achieve the information security. The proposed work is representing one of such cryptographic technique called AES. The proposed work is the implementation of AES for a hardware using the VHDL. For the simulation and implementation we are using Active HDL software. The system will accept the input and form the encoding and later the decoding process is defined. The results are presented in the waveforms.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126358685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Approach for Improvement in LEACH Protocol for Wireless Sensor Network 无线传感器网络LEACH协议的改进方法
R. Munjal, B. Malik
{"title":"Approach for Improvement in LEACH Protocol for Wireless Sensor Network","authors":"R. Munjal, B. Malik","doi":"10.1109/ACCT.2012.30","DOIUrl":"https://doi.org/10.1109/ACCT.2012.30","url":null,"abstract":"This paper studies the problems with LEACH protocol and presents improved ideas to select the cluster head node. The main problem with the LEACH lies in the random selection of cluster heads. There exists a probability that cluster heads formed are unbalanced and may remain in one part of network making some part of network unreachable. Here our main purpose is to select a cluster head depending upon its current energy level and distance from the sink node. This increases the energy efficiency and hence network lifetime.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124368556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Testing and Formal Verification of Decoder Circuit 解码器电路的测试与形式化验证
Indu Bhuria, P. Inaniya, P. Kaler
{"title":"Testing and Formal Verification of Decoder Circuit","authors":"Indu Bhuria, P. Inaniya, P. Kaler","doi":"10.1109/ACCT.2012.111","DOIUrl":"https://doi.org/10.1109/ACCT.2012.111","url":null,"abstract":"Testing of 2-to-4 decoder circuit are been done using tetraMAX. It is observed that 54 possible stuck-at faults can be there in the 2-to-4 decoder circuit, tetraMAX ATPG can provide test coverage of 100 % Using design compiler. db file is generated which is used for functional verification of the design with respect to RTL design. Compare points are shown by cone views of the design.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133487938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of Low Power 7T SRAM Cell in 45nm Technology 45纳米低功耗7T SRAM单元优化
A. Jain, S. Sharma
{"title":"Optimization of Low Power 7T SRAM Cell in 45nm Technology","authors":"A. Jain, S. Sharma","doi":"10.1109/ACCT.2012.81","DOIUrl":"https://doi.org/10.1109/ACCT.2012.81","url":null,"abstract":"In this paper a low power SRAM cell is proposed. In the proposed SRAM topology, additional circuitry has been added to a standard 6T-SRAM cell to improve the performance. A seven transistor (7T) cell at a 45nm feature size in CMOS is proposed to accomplish improvements in stability, power dissipation and performance compared with previous designs for low-power memory operation. By optimizing size and employing the proposed write circuitry scheme, a saving of 45% in power consumption is achieved in memory array operation compared with a conventional 6T SRAM based design. The impact of process variations is investigated in detail, and the CADENCE simulation shows that the 7T SRAM cell has an excellent tolerance to process variations.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114139558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Revisiting Interestingness Measures for Knowledge Discovery in Databases 数据库中知识发现的兴趣度测度
J. Vashishtha, D. Kumar, S. Ratnoo
{"title":"Revisiting Interestingness Measures for Knowledge Discovery in Databases","authors":"J. Vashishtha, D. Kumar, S. Ratnoo","doi":"10.1109/ACCT.2012.97","DOIUrl":"https://doi.org/10.1109/ACCT.2012.97","url":null,"abstract":"The voluminous amount of data stored in databases contains hidden knowledge which could be valuable to improve decision making process of any organization. As it is not humanely possible to analyze large databases, it has become essential to apply advanced data mining algorithms for extracting patterns (models) from data to support decision making. A number of data mining algorithms produce information of a statistical nature that allows the user to assess how accurate and reliable the discovered knowledge is? However, in many cases this is not enough for the users. Even if the discovered knowledge is highly accurate from a statistical point of view, it might not be interesting to the user. Therefore the process of knowledge discovery in databases (KDD) aims at discovering knowledge that is interesting and useful to the user. Most of the data mining algorithms so far have paid lot of attention to discovery of accurate and comprehensible knowledge. Though, the question of interestingness has been addressed time to time, it is being increasingly realized by data mining community that this subject needs a renewed focus. This paper is an attempt to review the measures of interestingness used in the data mining literature. The main contribution of the paper is to improve the understanding of interestingness measures for discovery of knowledge and identify the unresolved problems to set the directions for the future research in this area.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134376646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Data-Aware Virtual Machine Placement and Rate Allocation in Cloud Environment 云环境下数据感知的虚拟机布局和速率分配
K. Zamanifar, N. Nasri, M. Nadimi-Shahraki
{"title":"Data-Aware Virtual Machine Placement and Rate Allocation in Cloud Environment","authors":"K. Zamanifar, N. Nasri, M. Nadimi-Shahraki","doi":"10.1109/ACCT.2012.40","DOIUrl":"https://doi.org/10.1109/ACCT.2012.40","url":null,"abstract":"Infrastructure-as-a-service cloud provides a suitable environment where cloud users can run data-intensive applications and store their required data files. The performance of data-intensive applications strongly depends on data transmission delay. This delay is a function of the size of data files, the location of virtual machines that run the applications as well as the allocation of data rates to virtual machines. In this paper, we propose a novel virtual machine placement algorithm that jointly optimizes the placement of virtual machines as well as their allocated data rates. Through Simulation results we show that the proposed algorithm can significantly reduce the data transfer delay for virtual machines compared to placement algorithms previously proposed in the literature.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134113300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Face Recognition Using PCA and LDA Algorithm 基于PCA和LDA算法的人脸识别
A. Bansal, K. Mehta, S. Arora
{"title":"Face Recognition Using PCA and LDA Algorithm","authors":"A. Bansal, K. Mehta, S. Arora","doi":"10.1109/ACCT.2012.52","DOIUrl":"https://doi.org/10.1109/ACCT.2012.52","url":null,"abstract":"Face and facial feature detection plays an important role in various applications such as human computer interaction, video surveillance, face tracking, and face recognition. Efficient face and facial feature detection algorithms are required for applying to those tasks. Recently face recognition is attracting much attention in the society of network multimedia information access. Face recognition not only makes hackers virtually impossible to steal one's \" password\" but also increases the user-friendliness in human-computer interaction. Face recognition systems are now replenishing the need for security to cope up with the present day crime. It is really convincing with the market report which clearly depicts the growing popularity of the face recognition system. The face recognition system is proving to be very efficient in the present day market. In today's networked world, the need to maintain the security of information or physical property is becoming both increasingly important and increasingly difficult. From time to time it has been noticed about the crimes of credit card fraud, computer hackings, or security breaches in a company or government building. Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weaknesses in today's safety mechanisms.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134177833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信