2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]最新文献

筛选
英文 中文
Tracking of bio medical waste using global positioning system 利用全球定位系统跟踪生物医疗废物
Lakshmi, J. Refonaa, J. Vivek
{"title":"Tracking of bio medical waste using global positioning system","authors":"Lakshmi, J. Refonaa, J. Vivek","doi":"10.1109/ICCPCT.2015.7159516","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159516","url":null,"abstract":"Bio medical wastes are waste generated from hospitals at various wards. There are different kinds of biomedical waste such as Anatomical waste, Animal waste, biology and biotechnology discarded medicine and cytotoxic drugs, Incineration Ash, Waste sharps, Soiled waste, Solid waste, Liquid waste, Chemical waste. This waste must be transported from hospitals to common treatment facility where these wastes are recycled using treatment equipments in order to avoid pollution. In this project we are developing an android application for tracking the biomedical waste from hospital to CTF (common treatment facility). Bio medical waste tracking system is to keep track the bio medical waste generated at hospitals. System mandates the hospital staffs to record the wastage generated at the point of generation(ward level) by scanning the bar coded bags and it is transported to Common Treatment Facility (CTF). Application will detect the availability of internet and synchronize the data with the main server periodically. Hospitals and CTF need not require active internet for using the system. The main purpose of this application is, it will be capable of capturing data offline (absence of Internet) and the movement of waste disposal will be tracked using GPS from the hospital to common treatment facility.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"5 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76989767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Applying secure authentication scheme to protect DNS from rebinding attack using proxy 采用安全认证方案,保护DNS不受代理重绑定攻击
P. Pandiaraja, S. Parasuraman
{"title":"Applying secure authentication scheme to protect DNS from rebinding attack using proxy","authors":"P. Pandiaraja, S. Parasuraman","doi":"10.1109/ICCPCT.2015.7159255","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159255","url":null,"abstract":"Internet is critical to both the economy and society in today's world. Domain Name System (DNS) is a key building block of the internet and the DNS hides all technical infrastructures, software and hardware required for the domain name system to function correctly. It allows users to access websites and exchange emails. It runs a strong mechanism to provide the IP address of the internet host name. An attacker can launch rebinding attack when the DNS server sends a query to any particular server on the network. Different types of techniques have been proposed to prevent this attack that all have some pros and also cones. A new technique is proposed in this paper by using security proxy with a hash function. Rebinding attack can be avoided by using this technique. It provides a secured environment for the DNS to communicate with other DNS. While the source DNS are receiving response from any DNS it will authenticate of all the receiving packets and then sends the data to the client. It gives a secure environment for DNS communication. For this purpose 2 different algorithms are used, namely SHA-2 and AES algorithms. First a random ID will be given to the query and then the query is sent to the DNS server.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"161 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78073283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design of low dropout regulator using artificial bee colony evolutionary algorithm 基于人工蜂群进化算法的低差调节器设计
Jitendra B. Chinchore, R. Thakker
{"title":"Design of low dropout regulator using artificial bee colony evolutionary algorithm","authors":"Jitendra B. Chinchore, R. Thakker","doi":"10.1109/ICCPCT.2015.7159280","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159280","url":null,"abstract":"In this paper, a low voltage low dropout (LDO) regulator is designed and simulated in 0.13 μm CMOS technology, which converts an input voltage of 1.2V into a stable regulated output voltage of 1.1 V using Ng-Spice circuit simulator. The two stage operational amplifier (Op-Amp) is used as an error amplifier (EA). Here, the Artificial Bee Colony (ABC) evolutionary algorithm based optimizer is demonstrated for solving the problem of the device sizing and other parameters of Op-Amp and optimization. This approach for designing two stage Op-Amp circuit does not require any analytical calculations and handles non-linear effects of sub-micron devices very effectively. The designed LDO is tested for a change in load current for 0-100 mA and it is found that the power supply rejection ratio (PSRR) is found to be 78.5 dB at 1 KHz and 28.7 dB at 10 MHz. The settling time of less than 1 μsec observed during testing of line and load regulations.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"124 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76135083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Efficency and power packing density improvement for DC-DC boost converter by soft switching techniques 利用软开关技术提高DC-DC升压变换器的效率和功率封装密度
R. Sivakumar, S. Ramprasath, P. R. Babu
{"title":"Efficency and power packing density improvement for DC-DC boost converter by soft switching techniques","authors":"R. Sivakumar, S. Ramprasath, P. R. Babu","doi":"10.1109/ICCPCT.2015.7159504","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159504","url":null,"abstract":"This paper focuses on power loss analysis of non-isolated hard switching boost converter and quasi resonant ZVS (zero voltage switching) soft switching boost converter for various switching frequency in Power Conditioning System (PCS). Efficiency comparison and power losses of passive components are calculated for various switching frequency. The design and performance of the system is verified through simulation using PSPICE software.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"281 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76796480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design & development of UWB notch antenna with fractal geometry 基于分形几何的超宽带陷波天线的设计与开发
Manaswinee Sahoo, S. Sahu
{"title":"Design & development of UWB notch antenna with fractal geometry","authors":"Manaswinee Sahoo, S. Sahu","doi":"10.1109/ICCPCT.2015.7159387","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159387","url":null,"abstract":"This paper presents the design of coplanar waveguide fed ultra wide band Antenna with fractal geometry having frequency Notch characteristics. The designed antenna shows a dual band notch characteristic. For increasing bandwidth Sierpinski fractal is responsible, which is etched from the circular radiator. Elliptical type of slot responsible for creating notched band centered at 5.2 GHz for wireless local area network rejection has been used in this work. The RFID rejection band centered at 7 GHz is achieved by using a opposite U shaped fractal curve at feed line. Sierpinski fractal slot on the radiator has contributed to the resultant bandwidth of 1.8-11.5 GHz with VSWR<;2 by increasing the characteristics of matching at lower frequencies with an exception of two notched bands. A theoretical formulation to calculate the notch frequency is also validated.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"56 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80943501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A quantitative and comparative performance evaluation of PV models on PSPICE platform PSPICE平台上PV模型的定量和比较性能评价
S. K. Dash, R. Raj, S. Nema, R. Nema
{"title":"A quantitative and comparative performance evaluation of PV models on PSPICE platform","authors":"S. K. Dash, R. Raj, S. Nema, R. Nema","doi":"10.1109/ICCPCT.2015.7159479","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159479","url":null,"abstract":"Despite of the abundant resource potential and availability of conventional resources like oil and gas in many countries is moving toward the sustainable energy like solar power. Even though these country's has a substantial amount of installed capacity largely based on renewable energy like hydropower, but these resources yield fluctuates greatly during the drought season, forcing to rely on expensive emergency thermal units which again considerably affects the environmental balance but by implementing solar power resources substantial difference can be brought in the environmental circumstances. This paper presents simulation and study of PV cells using the generic model on PSPICE platform. Using PSPICE circuit simulator voltage and current variation can be verified under different a set of condition. Diode based models are used to conduct the studies which are classified on the basis of number of diodes. This paper provides a comparative behavioral study of different models under varying condition of temperature, diode parameter, solar insolation, and etc. This study helps in sketching out the performance evaluation under different circuit topology and control strategy.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"33 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87134885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
User authentication scheme based on Fast-Walsh Hadamard transform 基于Fast-Walsh Hadamard变换的用户认证方案
A. Remya, A. Sreekumar
{"title":"User authentication scheme based on Fast-Walsh Hadamard transform","authors":"A. Remya, A. Sreekumar","doi":"10.1109/ICCPCT.2015.7159355","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159355","url":null,"abstract":"User authentication scheme in context of audio can be achieved by labeling the speech signal with key signal dependent physical features. The key features for the development of the label are identified by using the common classification schemes such as ANN, kNN and SVM. The relevant features are given as input to an online QR code generator to obtain the QR code which is employed as the watermark. Using the FWHT transform, speech signal is then labeled and the confirmation along with comparison at the receiving end guarantees speaker authentication.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89014303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A high speed low power adder in dynamic logic base on transmission gate 一种基于传输门的高速低功耗动态逻辑加法器
N. Jain, Puran Gour, Brahmi Shrman
{"title":"A high speed low power adder in dynamic logic base on transmission gate","authors":"N. Jain, Puran Gour, Brahmi Shrman","doi":"10.1109/ICCPCT.2015.7159408","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159408","url":null,"abstract":"Speed of operation depends on the longest critical paths in the multi-bit adders and also the MOSFET transistor gain which in turn depends on transistor size. The power consumption in MOSFET is depends on the switching frequency, sub threshold leakage and switching time. In this paper, author proposed the speed and area efficient transistor base adder using static CMOS pass transistor logic, and shortened the longest critical path to decrease the total critical path delay. The design simulation on microwind layout tool calculates the worst-case delay in nanosecond and total power consumption in microwatt range.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90256046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Maximum performance with minimum cost in data mining applications through the novel online data warehouse architecture by using storage area network with fibre channel fabric 利用光纤通道结构的存储区域网络,提出了一种新的在线数据仓库体系结构,在数据挖掘应用中以最小的成本实现最大的性能
M. Saravanamuthu, G. M. Kadhar Nawaz
{"title":"Maximum performance with minimum cost in data mining applications through the novel online data warehouse architecture by using storage area network with fibre channel fabric","authors":"M. Saravanamuthu, G. M. Kadhar Nawaz","doi":"10.1109/ICCPCT.2015.7159498","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159498","url":null,"abstract":"The primary issues of data warehouse architecture are higher cost, and poor performance. The reasons for these problems focus the architectural design. The solutions are proposed with the new modified data warehouse design through online data warehouse architecture with the recent technological support from cloud computing - storage area networks through the use of high speed fibre channel based storage devices with fibre channel switches. Finally the benefits and advantages of proposed design were discussed with the cost and performance.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"23 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85199882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cloud based security solution for android smartphones 基于云的安卓智能手机安全解决方案
T. Marengereke, K. Sornalakshmi
{"title":"Cloud based security solution for android smartphones","authors":"T. Marengereke, K. Sornalakshmi","doi":"10.1109/ICCPCT.2015.7159512","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159512","url":null,"abstract":"In this paper, we define SIEM and we discuss Android security monitoring as well as recent research in Android security systems. Then, we propose a cloud based security system for collection, visualization, analysis and correlation of application logs, statistics and determining abnormal application and network behavior on the device. If abnormal behavior is detected an appropriate alert is sent back to the device for remedial action. In the case of abnormal network traffic, then firewall rules to be updated on an implementation of an IPTABLES/ NETFILTER firewall to block unwarranted network traffic. Furthermore a web interface is created to enable visualization of logs and all data collected from the device. So it serves as an intrusion mitigation solution coupled with security information audit web portal. This paper highlights the architecture of the proposed system.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"27 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86179771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信