2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]最新文献

筛选
英文 中文
A secure multi-tier authentication scheme in cloud computing environment 云计算环境下安全的多层认证方案
Ashish Singh, Kakali Chatterjee
{"title":"A secure multi-tier authentication scheme in cloud computing environment","authors":"Ashish Singh, Kakali Chatterjee","doi":"10.1109/ICCPCT.2015.7159276","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159276","url":null,"abstract":"Day by day users has been adopting remote storage system due to its secure service. But some time it may possible that people comes to know what security policy has been applied in server side. As the result, new security risks and attacks are coming in cloud. So, it is necessary to provide more secured and updated authentication scheme. For any cloud application, in which personal or private information are exchanged, single-tier authentication is not sufficient for authentication. In above situation, multi-tier authentication scheme is much more secured than single-tier authentication scheme. In computing environment, there are various multitier authentication schemes, but they do not provide security against insider attacks and virtualization attacks. In cloud environment, whole authentication control lies in the server side. So, it is hard to trust the third party server in cloud system. This paper proposes a secured and more advanced multi-tier authentication scheme for accessing cloud services.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"24 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90894775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Analysis of six degrees of separation in Facebook using Ant colony optimization 基于蚁群优化的Facebook六度分离分析
E. E. Lawrence, R. Latha
{"title":"Analysis of six degrees of separation in Facebook using Ant colony optimization","authors":"E. E. Lawrence, R. Latha","doi":"10.1109/ICCPCT.2015.7159171","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159171","url":null,"abstract":"Six degrees of separation is a popular theory that is widely accepted by many people, which states any two people on this world can be connected through an average number of six steps. Though there is no solid scientific evidence that the six degrees of separation theory is true, it remains as an area of interest to social researches. With the advent of digital mapping, the theory can now be tested with social networks, but will the theory of six degrees of separation hold for the virtual world? The link between any two people in a graph with number of hops needs to be identified and that can be done efficiently with the help of Ant colony optimization technique (ACO). As ACO algorithms are proved to be efficient with a broad range of NP hard problems such as the traveling salesman problem (TSP) or the quadratic assignment problem (QAP), and is increasingly gaining interest for solving real life engineering and scientific problems, an attempt has been made in this paper to analyze the six degrees of separation in the popular social network Facebook which has over 1.3 billion active users as of June 2014.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"152 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83432931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Asymmetric coplanar waveguide-fed CRLH-TL based antenna for WLAN/LTE applications 用于WLAN/LTE应用的非对称共面波导馈电CRLH-TL天线
D. Chaturvedi, Arvind Kumar, T. Shanmuganantham
{"title":"Asymmetric coplanar waveguide-fed CRLH-TL based antenna for WLAN/LTE applications","authors":"D. Chaturvedi, Arvind Kumar, T. Shanmuganantham","doi":"10.1109/ICCPCT.2015.7159455","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159455","url":null,"abstract":"In this paper a novel type of resonant antenna based on asymmetric coplanar wave guide structure has been presented. In the defined geometry bandwidth can be increased by introducing resonator ring in composite right/left handed transmission line model. Efficiency as well as gain of the geometry can be improved by incorporating comb drive type of structure which introduces interdigital capacitors and produces one more resonant frequency. Asymmetric ground plane reduced the dimensions up to 38.5×25 mm. Dual band have been obtained covering impedance bandwidth of (2.34-2.55 GHz), 210 MHz in lower band and (3.2-3.8 GHz),600 MHz in higher band corresponds fractional bandwidth of 8.7% and 16.3%. Antenna geometry is highly efficient showing maximum efficiency of 99% and peak gain up to 4.23dBi. Defined antenna is very suitable for WLAN/LTE applications.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"31 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78330591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Circuit level technique for mitigating effects of NBTI for wide fan-in domino logic circuits using supply voltage tuning 采用电源电压调谐的宽频扇入多米诺逻辑电路减轻NBTI影响的电路级技术
S. Narang
{"title":"Circuit level technique for mitigating effects of NBTI for wide fan-in domino logic circuits using supply voltage tuning","authors":"S. Narang","doi":"10.1109/ICCPCT.2015.7159452","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159452","url":null,"abstract":"Transistor ageing has been a major problem as far as nanometre technology is concerned which leads to performance degradation and reliability issues. Ageing in pMOS transistor takes place due to Negative bias temperature instability (NBTI) which is a major threat in reliability as Iscale down the transistor geometries aggressively in our quest for low power and high performance. Overcoming ageing effect requires additional power expense, which in turn aggravates the power and heating problem. I propose an adaptive supply voltage (ASV) scheme as an arguably power efficient approach for variation resilience since it attempts to allocate power resources only where the negative effect of ageing is strong. Upon implementing the proposed approach on a host of domino logic circuits which include Current comparison domino (CCD) Ihave mitigated the rise in delay problem by suitably allocating a supply voltage so that the delay specifications are continuously met even after a lifespan of 10 years of operation at the expense of very low power headroom. Simulations have been performed using the BSIM4v4.7 model & 32 nm predictive technology model in SILVACO EDA tool at a frequency of 2 GHz and nominal supply voltage of 0.9V. The proposed approach has been implemented on 32 bit & 64 bit OR gates and also on 32 bit comparator and the results have been noteworthy.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"1 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85424160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Polarization angle diversity and new digital software radio architecture 偏振角分集与新型数字软件无线电结构
Masahiro Aono, K. Takei
{"title":"Polarization angle diversity and new digital software radio architecture","authors":"Masahiro Aono, K. Takei","doi":"10.1109/ICCPCT.2015.7159299","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159299","url":null,"abstract":"We are developing new radio architecture for applying a wireless communication system to controlling and monitoring systems in industrial infrastructure systems. Using polarization angle diversity, we can achieve reliable communication in a non line-of-sight situation. To realize polarization angle diversity, we use a rotating polarized radio wave. When we use polarization angle diversity, we need to control radio frequencies more easily. New software radio architecture create radio frequency in a digital circuit directly. It has a possibility to control a rotating polarization radio wave. And by experiment, I show a result of basic communication test and confirm its functions.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"44 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84902565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Computer vision based vehicle detection for toll collection system using embedded Linux 基于计算机视觉的收费系统车辆检测
Abhijeet Suryatali, V. B. Dharmadhikari
{"title":"Computer vision based vehicle detection for toll collection system using embedded Linux","authors":"Abhijeet Suryatali, V. B. Dharmadhikari","doi":"10.1109/ICCPCT.2015.7159412","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159412","url":null,"abstract":"Many highway toll collection systems have already been developed and are widely used in India. Some of these include Manual toll collection, RF tags, Barcodes, Number plate recognition. All these systems have disadvantages that lead to some errors in the corresponding system. This paper presents a brief review of toll collection systems present in India, their advantages and disadvantages and also aims to design and develop a new efficient toll collection system which will be a good low cost alternative among all other systems. The system is based on Computer Vision vehicle detection using OpenCV library in Embedded Linux platform. The system is designed using Embedded Linux development kit (Raspberry pi). In this system, a camera captures images of vehicles passing through toll booth thus a vehicle is detected through camera. Depending on the area occupied by the vehicle, classification of vehicles as light and heavy is done. Further this information is passed to the Raspberry pi which is having web server set up on it. When raspberry pi comes to know the vehicle, then it access the web server information and according to the type of the vehicle, appropriate toll is charged. This system can also made to count moving vehicles from pre-recorded videos or stored videos by using the same algorithm and procedure that we follow in this paper.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"2 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87389944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Performance based analysis on MALCOM — A software metric 基于MALCOM - A软件度量的性能分析
S. Ganesh, H. Raj
{"title":"Performance based analysis on MALCOM — A software metric","authors":"S. Ganesh, H. Raj","doi":"10.1109/ICCPCT.2015.7159402","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159402","url":null,"abstract":"The goal of inventing new software metric for SQA is to analyze the brilliance of the software. Certifying the proposed metric as valid should also be considered as equal to the invention since it describes how good the proposed metric is, how it could be practically implemented, and how useful is it for the technical fraternity and so on. This work is divided into a three-step framework, where in the first step the MALCOM metric is analytically evaluated against a formal list of Weyuker's properties and in the second step we compare MALCOM with its base metric LCOM. The metric complexity is also applied to ANOVA test to analyze the complexity variance in the third step. The results have proven that the metric is valid and satisfies all the necessary conditions of the framework.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"19 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86221620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance evaluation of high efficiency thermoelectric SIMO converter 高效热电SIMO变换器的性能评价
S. Jahan, S. Rajan, T. Rakesh, Assistant Professor
{"title":"Performance evaluation of high efficiency thermoelectric SIMO converter","authors":"S. Jahan, S. Rajan, T. Rakesh, Assistant Professor","doi":"10.1109/ICCPCT.2015.7159277","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159277","url":null,"abstract":"In the present scenario, the modern microelectronic devices are demanding supply with multiple voltages from a power-efficient and miniaturized platform. Unfortunately, the power inductors used in magnetic-based switching converters are bulky and difficult to integrate. The aim of this paper is to develop Single-Input Multiple-Output (SIMO) converter for Thermoelectric Generator (TEG) which is used as the source for supplying the load. The SIMO converter is used to boost the low input voltage of TEG to a middle voltage and high voltage with the help of the coupled-inductor. The middle and high voltage output terminals can be used for supplying power to power sources like batteries. The converter uses only one switch to obtain the various output voltages of different levels which is the main objective of this study. This study is carried out by PI controller and MPPT techniques. The MPPT technique used for this study is Incremental Conductance. The proposed SIMO converter has been modelled and simulated using PSIM software for obtaining higher efficiency. The conversion efficiency of about 96.5% can be achieved and has been reported in this paper.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"17 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82838506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimation of the reactive power of corrupted waveforms using the DWT 用小波变换估计损坏波形的无功功率
M. Vijayakumari, D. Sundararajan
{"title":"Estimation of the reactive power of corrupted waveforms using the DWT","authors":"M. Vijayakumari, D. Sundararajan","doi":"10.1109/ICCPCT.2015.7159284","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159284","url":null,"abstract":"In recent times, due to the increased use of the reactive power, it is important to bill the electrical power consumption based on both the active and reactive power components. Reactive power is a very significant factor in electric power systems since it affects the efficiency of these systems. For this reason, the measurement of reactive energy is also important. Several methods are used to measure reactive power. Reactive energy meters provide accurate measurement only if the input is fundamental, because meters are constructed for operating under sinusoidal conditions. Due to the widespread use of nonlinear loads and natural disturbances such as lightning, the power quality of the waveforms is considerably deteriorated. As the corrupted waveforms are composed of nonstationary components also, in order to estimate the true reactive power of the power system fundamental component, a time-frequency analysis is required. Therefore, in this paper, a DWT based algorithm is proposed to effectively estimate the reactive power component of the power system.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"2 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87663303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A bio-inspired artificial bee colony approach for dynamic independent connectivity patterns in VANET 基于生物启发的人工蜂群方法研究VANET中动态独立连接模式
R. Baskaran, M. S. Saleem Basha, J. Amudhavel, K. P. Kumar, D. A. Kumar, V. Vijayakumar
{"title":"A bio-inspired artificial bee colony approach for dynamic independent connectivity patterns in VANET","authors":"R. Baskaran, M. S. Saleem Basha, J. Amudhavel, K. P. Kumar, D. A. Kumar, V. Vijayakumar","doi":"10.1109/ICCPCT.2015.7159384","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159384","url":null,"abstract":"Vehicular Ad-Hoc Network (VANET) [1] which is a sub-type of the mobile ad-hoc networks provides wireless communication between the vehicles and to the Road Side Units (RSU) [2]. In VANET, the communication between the vehicles is used for various purposes like safety, comfort and entertainment. We use the vehicles as the portable nodes to create the mobile network. The VANET uses all the vehicles in the nearby distance as a wireless router or node to form a network. The vehicles can dynamically come in or drop out of the network as they move. The working of the VANET depends on how the routing of data is done in the network. In the recent years, the number of accidents has been increased to a greater count. In order to eradicate this, the implementation of VANET technology is being used in various modes of transportation. Even though VANET has been proposed to be a successful network model, it has some issues to overcome. The most major issues are the connectivity and the signal fading issue. We can overcome some of the issues in VANET by using the Artificial Bee Colony Algorithm (ABC) [3]. The proposed use of the algorithm in VANET may resolve some of the issues effectively.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"56 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90931827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信