2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE)最新文献

筛选
英文 中文
Fault attack for scalar multiplication over finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm 椭圆曲线数字签名算法有限域(E(Fq))上标量乘法的故障攻击
Deepti Jyotiyana, V. P. Saxena
{"title":"Fault attack for scalar multiplication over finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm","authors":"Deepti Jyotiyana, V. P. Saxena","doi":"10.1109/ICRAIE.2016.7939539","DOIUrl":"https://doi.org/10.1109/ICRAIE.2016.7939539","url":null,"abstract":"Elliptic Curve Cryptosystems are very much delicate to attacks or physical attacks. This paper aims to correctly implementing the fault injection attack against Elliptic Curve Digital Signature Algorithm. More specifically, the proposed algorithm concerns to fault attack which is implemented to sufficiently alter signature against vigilant periodic sequence algorithm that supports the efficient speed up and security perspectives with most prominent and well known scalar multiplication algorithm for ECDSA. The purpose is to properly injecting attack whether any probable countermeasure threatening the pseudo code is determined by the attack model according to the predefined methodologies. We show the results of our experiment with bits acquire from the targeted implementation to determine the reliability of our attack.","PeriodicalId":400935,"journal":{"name":"2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125344438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application layer proxy detection, prevention with predicted load optimization 应用层代理检测,预防与预测负载优化
V. Dhaka, V. Lamba, Anubhav, Divyanshu Pathania
{"title":"Application layer proxy detection, prevention with predicted load optimization","authors":"V. Dhaka, V. Lamba, Anubhav, Divyanshu Pathania","doi":"10.1109/ICRAIE.2016.7939513","DOIUrl":"https://doi.org/10.1109/ICRAIE.2016.7939513","url":null,"abstract":"In this paper, we have formulated a solution for proxy usages in a network. We all are surrounded with digital signatures around us, we just need to filter those to make our network clean, secure, efficient. Is what we did in this research work. There is also a great need of load optimization at different points in the network. We have proposed a way to use machine learning and neural networks to apply it on a network. Our basic approach to do this work is a time quantum analysis for load prediction over a network and digital signature validation for proxy detection at the application layer. There are many methods to detect network statistics and security at different layers, but we need real-time analysis in the network and prevention measure right before it happens.","PeriodicalId":400935,"journal":{"name":"2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116437435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Chaos based image encryption using two step iterated logistic map 基于混沌的两步迭代逻辑映射图像加密
Malika Sharma, Anuja Bhargava
{"title":"Chaos based image encryption using two step iterated logistic map","authors":"Malika Sharma, Anuja Bhargava","doi":"10.1109/ICRAIE.2016.7939535","DOIUrl":"https://doi.org/10.1109/ICRAIE.2016.7939535","url":null,"abstract":"Information is sent over internet very frequently. Images are one of the major sources of information growing over internet. Images may contain sensitive information. So, security of images is major issue. Cryptography is one of the major techniques for security of images. Because of various features of Chaos it is used in encryption process. Different techniques of image encryption based on chaos defined. Multiple iterations are used by encryption algorithms mostly. There is need to design an image encryption algorithm which encrypts the image in single scan and uses proper mix of confusion and diffusion. The proposed image encryption technique uses the two step iterative logistic map. It uses large key space. The result comes out through experiment show that the proposed system has better security and performance respective to other techniques.","PeriodicalId":400935,"journal":{"name":"2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE)","volume":"441 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122128619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Advances in the field of insulating liquids used in electric power equipment and their perspectives-a review 电力设备用绝缘液体研究进展及展望
Sakshi Singh, M. M. Mohsin, A. Masood, S. Khatoon
{"title":"Advances in the field of insulating liquids used in electric power equipment and their perspectives-a review","authors":"Sakshi Singh, M. M. Mohsin, A. Masood, S. Khatoon","doi":"10.1109/ICRAIE.2016.7939476","DOIUrl":"https://doi.org/10.1109/ICRAIE.2016.7939476","url":null,"abstract":"Petroleum-based oils have been widely used as liquid insulation in electric power industry for over a century because of their ready availability, low viscosity, good aging behavior, and low cost. But, growing environmental concern, material sustainability, and desire for a safe nonflammable insulating liquid in power equipment have driven the researchers and engineers to explore alternative liquids with improved properties, and significance improvements have been achieved in this field. The objective of this review paper is to discuss about some of the developments in the field of liquid insulations, main features, applications, perspectives and engineering problems of several types of insulating liquids such as natural and synthetic organic liquids, cryogenic liquids, and liquefied gases. Properties like fire point, flash point and biodegradability for mineral oil, vegetable oil, silicon oil, and synthetic ester fluids are compared. A few recently installed liquid-filled power equipment with advanced insulating fluids are also mentioned.","PeriodicalId":400935,"journal":{"name":"2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128725174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Electricity price forecasting by linear regression and SVM 基于线性回归和支持向量机的电价预测
D. Saini, Akash Saxena, R. Bansal
{"title":"Electricity price forecasting by linear regression and SVM","authors":"D. Saini, Akash Saxena, R. Bansal","doi":"10.1109/ICRAIE.2016.7939509","DOIUrl":"https://doi.org/10.1109/ICRAIE.2016.7939509","url":null,"abstract":"Power system has appeared as a complex interconnected network due to competitive business environment. Power producers and consumers obligate for a precise price forecasting, as this information is an important part of decision making process. Decisions, regarding optimal scheduling of generators, bidding tactics and demand side organizations are based on price forecast. In recent years, development of new approaches for short term price forecasting has attracted the interest of the researchers. Electricity as a commodity consists of some distinct features that, firstly it can't be stock piled & secondly the volatile nature of the electricity price. With these two issues, forecasting of electricity price becomes an intimidating task for system planners and designers. This paper presents a hybrid approach based on linear regression and Support Vector Machine (SVM) to forecast short term electricity price. Linear Regression patterns are developed with the help of different factors of historical data of the electricity price. Two philosophies are developed with the combination of different factors. It is observed that method of similar days is effective. Further forecasted results of the regression models are given to SVM based supervised learning model which have tuned by Particle Swarm Optimization (PSO) technique. It is observed that proposed hybrid approach shows better accuracy as compared with others.","PeriodicalId":400935,"journal":{"name":"2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124603389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Research on Intelligent Video Surveillance techniques for suspicious activity detection critical review 面向可疑活动检测的智能视频监控技术研究
Garima Mathur, Mahesh M. Bundele
{"title":"Research on Intelligent Video Surveillance techniques for suspicious activity detection critical review","authors":"Garima Mathur, Mahesh M. Bundele","doi":"10.1109/ICRAIE.2016.7939467","DOIUrl":"https://doi.org/10.1109/ICRAIE.2016.7939467","url":null,"abstract":"Surveillance denotes close observation and monitoring of behavior, activities, or other dynamic information, of people or objects for the purpose of influencing, managing, directing, or protecting them. With advancement in technology and emerging of various intelligent prediction techniques, it has now become possible to imbibe the traditional video surveillance with intelligence to identify or take decision according to the scenarios. Intelligent video surveillance system (IVS) based on image recognition is widely employed to effectively avert crimes and provide public security. Due to the high complexity of processing real time data and analysis/understanding of image contents, a well-developed user friendly and cost effective product is not present for use. This paper is an outcome of comparative analysis of extracts drawn from literature review of 57 IEEE papers ranging from year 1977 to the year 2015, carried out to understand the suspicious activity detection methodologies used for detecting abnormal human behavior, tracing abandoned object, or unattended baggage etc., which led to an extensive comparison between various proposed methods. Many technologies, mostly based on intelligent techniques like Neural Systems, Fuzzy Logic, Support Vector Machine, Genetic Algorithm etc. emerged out as basis for intelligence in such systems. The outcome of the review is presented in form of various findings, which includes techniques and methods used to solve particular research problem, along with their strengths and weaknesses and the scope for the future work in the area.","PeriodicalId":400935,"journal":{"name":"2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121544797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Bit parallel multiplication based 64 Point Pipeline FFT Processor for OFDM application 基于位并行乘法的64点流水线FFT处理器的OFDM应用
Bhawna Kalra, J. B. Sharma
{"title":"Bit parallel multiplication based 64 Point Pipeline FFT Processor for OFDM application","authors":"Bhawna Kalra, J. B. Sharma","doi":"10.1109/ICRAIE.2016.7939572","DOIUrl":"https://doi.org/10.1109/ICRAIE.2016.7939572","url":null,"abstract":"Orthogonal frequency division multiple access is a technique in which single data stream is transmitted with small rate of subcarriers. OFDM system needs FFT processor for generation of subcarriers. A Radix-2 Based 32 bit and 64 Point Pipeline FFT Processor Using bit parallel multiplication process for OFDM system is presented in this paper. Proposed architecture uses single path delay feedback FFT architecture. This is an ROM less architecture. In this architecture ROM is replaced by complex constant multiplier and all twiddle factors are multiplied using bit parallel multiplication module. Pipelining methodology provides good latency to the FFT processor. Propagation delay of proposed architecture is calculated by test bench waveform on Xilinx ISE simulator and it is equal to 630ns at 10ns clock period. Due to small propagation delay speed of the OFDM system gets increases and latency also gets improve.","PeriodicalId":400935,"journal":{"name":"2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121635341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Indoor and outdoor position identification using RFID 使用RFID进行室内和室外位置识别
M. Deka, Jetendra Joshi, Nishchay Sinha, Aman Tyagi, Apoorv Kushal, Avijit Jain
{"title":"Indoor and outdoor position identification using RFID","authors":"M. Deka, Jetendra Joshi, Nishchay Sinha, Aman Tyagi, Apoorv Kushal, Avijit Jain","doi":"10.1109/ICRAIE.2016.7939587","DOIUrl":"https://doi.org/10.1109/ICRAIE.2016.7939587","url":null,"abstract":"Radio Frequency Identification (or RFID) tags has found a wide range of applications in the modern world with a promising future. Tourism directly affects a country's income. In this paper we have proposed a system which uses RFID tags for guidance of tourists. In the proposed system RFID tags are used to guide and to inform the tourists about the given location and surrounding. Tourists usually prefer guided tourism in order to get genuine information about the places of interest. The system presented in our paper provides the audio based tourist guidance information which a tourist prefers providing the relevant information about the spots. We have presented an algorithm which describes the deployment of the system even for densely populated RFID based geographic regions. The system collaborates with multiple readers while reading the RFID tag data. We have considered the cases where tag ID is used for sensing the environmental conditions and parameters and for identification purpose. The system has been tested with Adaptive Binary Splitting Scheme (ABS) for avoiding clash of tags and an adaptive synchronization algorithm, a novel technique for avoiding reader interference in a region. Also performance issues have been addressed related to efficiency in similar systems by exploiting redundancy.","PeriodicalId":400935,"journal":{"name":"2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128139175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Modeling, simulation and comparison of a hybrid power system for economic analysis and environmental impact 经济分析和环境影响的混合动力系统建模、仿真和比较
U. Rathod, Bharat Modi
{"title":"Modeling, simulation and comparison of a hybrid power system for economic analysis and environmental impact","authors":"U. Rathod, Bharat Modi","doi":"10.1109/ICRAIE.2016.7939497","DOIUrl":"https://doi.org/10.1109/ICRAIE.2016.7939497","url":null,"abstract":"Chhabra Thermal Power Plant (CTPP) is one of Rajasthan's coal-fired power plants, India. It has installed capacity of 1000 MW of total four unit of each 250 MW. In this paper, we propose the best Hybrid Energy System (HES) for CTPP to reduced grid extension. Electricity need for an off-grid remote area supplies from a mixture of Biodiesel generator and nonconventional energy resources to satisfy in a reliable manner. Here we are using HOMER (Hybrid Optimization of Multiple Energy Resources) software is used for whole analysis. The main power of the HES comes from the mixture of bio-diesel generator, Flat PV array and wind generators, while the battery is used as backup. As per simulation results, the proposed hybrid system is a feasible solution for distributed generation of electric power for the rural area at remote locations. The HES is feasible, economically viable and environment friendly.","PeriodicalId":400935,"journal":{"name":"2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131955755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
UMTS and LTE interfaces utilization improvement with QoS in mobile communication systems 移动通信系统中基于QoS的UMTS和LTE接口利用率改进
V. Balyan, B. Groenewald
{"title":"UMTS and LTE interfaces utilization improvement with QoS in mobile communication systems","authors":"V. Balyan, B. Groenewald","doi":"10.1109/ICRAIE.2016.7939466","DOIUrl":"https://doi.org/10.1109/ICRAIE.2016.7939466","url":null,"abstract":"To provide support for both data and voice is essential requirement of present mobile networks both LTE and UMTS networks. The proposed scheme in this paper differentiates assignment of requested calls on: speed, direction of motion and type of requested call. It also checks the used capacity threshold of LTE and UMTS before assignment. Different communication interfaces are used in hybrid mobile communication to address these issues, the UMTS uses VSF-OFCDM interface for assignment of orthogonal codes from orthogonal variable spreading factor (OVSF) code tree in two dimensions. The LTE interface assigns resource blocks. The UMTS is prone to high probability of packet loss and less spectral efficiency too. The LTE has problem with moderate reward with unbalanced loads. The proposed scheme reduces these issues considerably by differentiating requested calls related to interference and movement. The proposed scheme addresses these issues considerably as compared to other schemes in literature.","PeriodicalId":400935,"journal":{"name":"2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129395243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信