首页 > 最新文献

2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)最新文献

英文 中文
Non-invasive EEG-metric based stress detection 基于无创脑电图的应力检测
Gaurav, R. Anand, Vinod Kumar
Psychological stress is a vital parameter related to individual's health and cognitive performance which may affect emotions and professional efficiency. Regula stress profile generated can be used as neurofeedback for the clinical as personal assessment. This paper describes a method to detect mental stress level based on physiological parameters. In this method an electroencephalogram (EEG) parameter based binary stress classifier is developed which is validated through probabilistic stress profiler of differential stress inventory questionnaire. A non-invasive 9 channel EEG is used to extract physiological signal and an EEG-metric based cognitive state and workload outputs is generated for 41 healthy volunteers (37 males and 4 females, age; 24±5 years). All subjects were performed three simple tasks of closed eye, focusing vision on a red dot on center of dark screen and focusing on a white screen. Central tendencies (mean, median and mode) are extracted from of EEG-metric (sleep onset, distraction, low engagement, high engagement and cognitive states) as features. Either of the two classes as low stress or high stress are evaluated from probabilistic stress profiler of differential stress inventory and used as training output classes. A supervisory training of multiple layer perceptron based binary support vector machine classifier was used to detect stress class one by one. 40 subject's samples were used for training and interchanging one-by one 41th subject's stress class is determined from the designed classifier. Out of 41 subjects, stress level of 30 subjects is correctly identified.
心理应激是关系到个体健康和认知表现的重要参数,它可能影响情绪和职业效率。产生的规律应激谱可作为神经反馈用于临床和个人评估。本文介绍了一种基于生理参数的心理应激水平检测方法。该方法提出了一种基于脑电图参数的二值应力分类器,并通过差值应力问卷的概率应力剖面仪进行了验证。41名健康志愿者(男性37名,女性4名,年龄;24±5年)。所有被试都完成了三个简单的任务:闭上眼睛,将视觉聚焦在黑暗屏幕中心的红点上,以及聚焦在白色屏幕上。集中倾向(均值、中位数和模式)是从脑电图度量(睡眠开始、注意力分散、低参与、高参与和认知状态)中提取出来的特征。利用差应力量表的概率应力剖面法对低应力和高应力两类进行评估,并将其作为训练输出类。采用基于多层感知器的监督训练二值支持向量机分类器对应力分类进行逐级检测。使用40个被试样本进行训练和一一互换,从设计的分类器中确定第41个被试的压力等级。在41名受试者中,30名受试者的压力水平被正确识别。
{"title":"Non-invasive EEG-metric based stress detection","authors":"Gaurav, R. Anand, Vinod Kumar","doi":"10.1109/ISPCC.2017.8269733","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269733","url":null,"abstract":"Psychological stress is a vital parameter related to individual's health and cognitive performance which may affect emotions and professional efficiency. Regula stress profile generated can be used as neurofeedback for the clinical as personal assessment. This paper describes a method to detect mental stress level based on physiological parameters. In this method an electroencephalogram (EEG) parameter based binary stress classifier is developed which is validated through probabilistic stress profiler of differential stress inventory questionnaire. A non-invasive 9 channel EEG is used to extract physiological signal and an EEG-metric based cognitive state and workload outputs is generated for 41 healthy volunteers (37 males and 4 females, age; 24±5 years). All subjects were performed three simple tasks of closed eye, focusing vision on a red dot on center of dark screen and focusing on a white screen. Central tendencies (mean, median and mode) are extracted from of EEG-metric (sleep onset, distraction, low engagement, high engagement and cognitive states) as features. Either of the two classes as low stress or high stress are evaluated from probabilistic stress profiler of differential stress inventory and used as training output classes. A supervisory training of multiple layer perceptron based binary support vector machine classifier was used to detect stress class one by one. 40 subject's samples were used for training and interchanging one-by one 41th subject's stress class is determined from the designed classifier. Out of 41 subjects, stress level of 30 subjects is correctly identified.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126011866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A distributed method of key issue and revocation of mobile ad hoc networks using curve fitting 一种基于曲线拟合的移动自组网关键问题和撤销的分布式方法
K. Ramkumar, Amanpreet Kaur
The Mobile Adhoc NETworks (MANETs) are vulnerable to routing attacks [4] and hackers scythe the wireless networks easily. The MANETs need a distinctive attention of confidentiality [5] and authentication since these networks have unstable topologies and uncertainty in routing. Generally, the hackers try to snoop the wireless medium and get information about the wireless networks, the nodes which are in a particular propagation range can do this easily. So, it is a best practice to encrypt all routing and payloads in MANETs to avoid all men in the middle attacks. The symmetric encryptions are the standards for encrypting long messages with the limited computational efforts but they need a common key to start the encryption and decryption process. There are two basic questions, How to exchange the key between the source and destination, moreover who will take care of issuing and revoking keys to the new entrants. The key management is an important aspect of security algorithms and the proposed work implements a standard key management system by using the curve fitting-least square method of polynomial interpolation.
移动自组网(manet)容易受到路由攻击[4],黑客很容易破坏无线网络。由于这些网络具有不稳定的拓扑结构和路由的不确定性,因此manet需要特别注意保密性[5]和身份验证。一般来说,黑客试图窥探无线媒体并获取无线网络的信息,处于特定传播范围内的节点很容易做到这一点。因此,对manet中的所有路由和有效负载进行加密以避免所有中间人攻击是最佳实践。对称加密是在计算量有限的情况下加密长消息的标准,但它们需要一个公共密钥来启动加密和解密过程。有两个基本问题,如何在源和目的地之间交换密钥,以及谁将负责向新进入者颁发和撤销密钥。密钥管理是安全算法的一个重要方面,本文采用多项式插值的曲线拟合-最小二乘法实现了一个标准的密钥管理系统。
{"title":"A distributed method of key issue and revocation of mobile ad hoc networks using curve fitting","authors":"K. Ramkumar, Amanpreet Kaur","doi":"10.1109/ISPCC.2017.8269685","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269685","url":null,"abstract":"The Mobile Adhoc NETworks (MANETs) are vulnerable to routing attacks [4] and hackers scythe the wireless networks easily. The MANETs need a distinctive attention of confidentiality [5] and authentication since these networks have unstable topologies and uncertainty in routing. Generally, the hackers try to snoop the wireless medium and get information about the wireless networks, the nodes which are in a particular propagation range can do this easily. So, it is a best practice to encrypt all routing and payloads in MANETs to avoid all men in the middle attacks. The symmetric encryptions are the standards for encrypting long messages with the limited computational efforts but they need a common key to start the encryption and decryption process. There are two basic questions, How to exchange the key between the source and destination, moreover who will take care of issuing and revoking keys to the new entrants. The key management is an important aspect of security algorithms and the proposed work implements a standard key management system by using the curve fitting-least square method of polynomial interpolation.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114222400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Modelling and identification of single area power system for load frequency control 负荷频率控制的单区电力系统建模与辨识
M. Gupta, Akshay Walia, S. Gupta, A. Sikander
In a large scale interconnected power system, the frequency and tie line power fluctuates when the sudden changes in load occurs. Therefore, in order to regulate this fluctuation in a desired manner a suitable control scheme namely load frequency control is required. But the model of this interconnected single area power system is very complex therefore it is difficult to develop a required control strategy. Thus, in this paper, modelling and identification of single area power system has been presented via model order reduction. In order to maintain the stability in reduced system a stability preservation method namely stability equation methods has been employed. The obtained results are compared when higher and reduced systems are subjected to unit step and impulse inputs. Furthermore, the performance of the proposed reduced model has also been evaluated in frequency domain.
在大型互联电力系统中,当负荷发生突变时,频率和并线功率都会发生波动。因此,为了以期望的方式调节这种波动,需要一种合适的控制方案,即负载频率控制。但是这种单区域互联电力系统的模型非常复杂,因此很难制定出所需的控制策略。因此,本文采用模型降阶的方法对单区域电力系统进行建模和辨识。为了保持约简系统的稳定性,采用了一种稳定保持方法,即稳定方程法。当高阶和低阶系统受到单位阶跃和脉冲输入时,所得到的结果进行了比较。此外,本文还对该简化模型的频域性能进行了评价。
{"title":"Modelling and identification of single area power system for load frequency control","authors":"M. Gupta, Akshay Walia, S. Gupta, A. Sikander","doi":"10.1109/ISPCC.2017.8269718","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269718","url":null,"abstract":"In a large scale interconnected power system, the frequency and tie line power fluctuates when the sudden changes in load occurs. Therefore, in order to regulate this fluctuation in a desired manner a suitable control scheme namely load frequency control is required. But the model of this interconnected single area power system is very complex therefore it is difficult to develop a required control strategy. Thus, in this paper, modelling and identification of single area power system has been presented via model order reduction. In order to maintain the stability in reduced system a stability preservation method namely stability equation methods has been employed. The obtained results are compared when higher and reduced systems are subjected to unit step and impulse inputs. Furthermore, the performance of the proposed reduced model has also been evaluated in frequency domain.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124719109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A novel localized approach for efficient delivery of software products 有效交付软件产品的一种新颖的本地化方法
Diksha Hooda, Rinkle Rani
Software Delivery accounts a considerable premium to an organization. It provides a definition to the fundamental expertise and the core competitiveness. An efficient approach towards software delivery paves the way to overpower competitive risks. The major challenges faced during the process of software delivery include bandwidth limitation, poor performance, delivery time, and economics of distribution and handling uncertainties at various levels of delivery. The problem is aggravated with increase in the size of the package delivery that is to be delivered. This paper provides a novel approach for efficient software delivery to the requesters which cuts in the chances of poor performance due to bandwidth issues. The approach provides an algorithm that simplifies the delivery for software products that are heavier in terms of size. It is a local tooling process which has an upper hand over the traditional centralized portal where all the software delivery requests are directed. The localized tooling methodology ensures safety of the product by encryption techniques. As a result of the request made by the end user, the tool packages the encrypted form of the product with an installing agent and prepares it to be transferred over the network. At the receiver's end, the package is downloaded and extracted with the help of the environment setup of the launching agent installed at the user's end.
软件交付对组织来说是一笔可观的费用。它提供了一个定义的基本专业知识和核心竞争力。有效的软件交付方法为克服竞争风险铺平了道路。在软件交付过程中面临的主要挑战包括带宽限制、糟糕的性能、交付时间,以及在不同交付级别上分发和处理不确定性的经济性。这个问题随着将要交付的包裹尺寸的增加而加剧。本文提供了一种新颖的方法,可以有效地向请求者交付软件,从而减少由于带宽问题而导致性能低下的机会。该方法提供了一种算法,可以简化在大小方面较重的软件产品的交付。它是一个本地工具过程,比所有软件交付请求都指向的传统集中式门户具有优势。本地化的工具方法通过加密技术确保产品的安全性。根据最终用户的请求,该工具将产品的加密形式与安装代理一起打包,并准备通过网络传输。在接收者端,在用户端安装的启动代理的环境设置的帮助下下载并提取包。
{"title":"A novel localized approach for efficient delivery of software products","authors":"Diksha Hooda, Rinkle Rani","doi":"10.1109/ISPCC.2017.8269672","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269672","url":null,"abstract":"Software Delivery accounts a considerable premium to an organization. It provides a definition to the fundamental expertise and the core competitiveness. An efficient approach towards software delivery paves the way to overpower competitive risks. The major challenges faced during the process of software delivery include bandwidth limitation, poor performance, delivery time, and economics of distribution and handling uncertainties at various levels of delivery. The problem is aggravated with increase in the size of the package delivery that is to be delivered. This paper provides a novel approach for efficient software delivery to the requesters which cuts in the chances of poor performance due to bandwidth issues. The approach provides an algorithm that simplifies the delivery for software products that are heavier in terms of size. It is a local tooling process which has an upper hand over the traditional centralized portal where all the software delivery requests are directed. The localized tooling methodology ensures safety of the product by encryption techniques. As a result of the request made by the end user, the tool packages the encrypted form of the product with an installing agent and prepares it to be transferred over the network. At the receiver's end, the package is downloaded and extracted with the help of the environment setup of the launching agent installed at the user's end.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"384 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124769159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new flower pollination based task scheduling algorithm in cloud environment 云环境下基于花授粉的任务调度算法
Jaspinder Kaur, B. Sidhu
Cloud Computing is in demand now a days as it provides reliable, scalable and economical IT operations. As the scale of the cloud computing is increasing the need of an efficient scheduling algorithm for an effecting management of resources is also becoming crucial. Scheduling problem in cloud is NP-hard problem. Meta-heuristic approaches have been very useful in providing near optimal solution to the scheduling problem. In this paper a new approach for Task Scheduling using Flower Pollination Algorithm (TSFPA) has been introduced to allocate resources to task. The objective of this proposed algorithm is to minimize the makespan. The performance of the proposed algorithm has been compared with genetic algorithm (GA), first come first serve (FCFS) and round robin (RR) approach of scheduling using Cloudsim toolkit. Simulation results showed that performance of TSFPA is better than GA, RR and FCFS in terms of makespan.
由于云计算提供了可靠、可扩展和经济的it操作,因此现在对它的需求很大。随着云计算规模的不断扩大,对有效管理资源的高效调度算法的需求也变得至关重要。云计算中的调度问题是np困难问题。元启发式方法在为调度问题提供近似最优解方面非常有用。本文提出了一种利用花授粉算法(TSFPA)为任务分配资源的任务调度方法。该算法的目标是最小化最大完工时间。将该算法的性能与遗传算法(GA)、先到先服务(FCFS)和使用Cloudsim工具包的轮询调度(RR)方法进行了比较。仿真结果表明,TSFPA在makespan方面的性能优于GA、RR和FCFS。
{"title":"A new flower pollination based task scheduling algorithm in cloud environment","authors":"Jaspinder Kaur, B. Sidhu","doi":"10.1109/ISPCC.2017.8269722","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269722","url":null,"abstract":"Cloud Computing is in demand now a days as it provides reliable, scalable and economical IT operations. As the scale of the cloud computing is increasing the need of an efficient scheduling algorithm for an effecting management of resources is also becoming crucial. Scheduling problem in cloud is NP-hard problem. Meta-heuristic approaches have been very useful in providing near optimal solution to the scheduling problem. In this paper a new approach for Task Scheduling using Flower Pollination Algorithm (TSFPA) has been introduced to allocate resources to task. The objective of this proposed algorithm is to minimize the makespan. The performance of the proposed algorithm has been compared with genetic algorithm (GA), first come first serve (FCFS) and round robin (RR) approach of scheduling using Cloudsim toolkit. Simulation results showed that performance of TSFPA is better than GA, RR and FCFS in terms of makespan.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116805412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Lightweight cipher algorithms for smart cards security: A survey and open challenges 智能卡安全的轻量级密码算法:调查和公开挑战
Jaskaranbeer Kaur, Ajay Kumar, M. Bansal
Smart cards are secure and multifunctional devices that have become the important part of our daily life applications i.e. from finance, transportation, telecommunication to education, entertainment, health care. Increased use of these devices leads to much advancement in the field of smart cards, yet there are some security threats related to smart cards that needed to be explored. In this paper, smart cards applications and its security threats are discussed. The smart cards authentication and data encryption schemes have been surveyed which lead to comparative survey of various works proposed in this area. This survey results in some research issues; and future directions to resolve these issues are defined.
智能卡是一种安全、多功能的设备,已成为我们日常生活应用的重要组成部分,即从金融、交通、电信到教育、娱乐、医疗保健。这些设备的使用增加导致智能卡领域取得了很大的进步,但仍有一些与智能卡相关的安全威胁需要探索。本文讨论了智能卡的应用及其安全威胁。对智能卡认证和数据加密方案进行了调查,从而对该领域提出的各种工作进行了比较调查。本次调查产生了一些研究问题;并确定了解决这些问题的未来方向。
{"title":"Lightweight cipher algorithms for smart cards security: A survey and open challenges","authors":"Jaskaranbeer Kaur, Ajay Kumar, M. Bansal","doi":"10.1109/ISPCC.2017.8269738","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269738","url":null,"abstract":"Smart cards are secure and multifunctional devices that have become the important part of our daily life applications i.e. from finance, transportation, telecommunication to education, entertainment, health care. Increased use of these devices leads to much advancement in the field of smart cards, yet there are some security threats related to smart cards that needed to be explored. In this paper, smart cards applications and its security threats are discussed. The smart cards authentication and data encryption schemes have been surveyed which lead to comparative survey of various works proposed in this area. This survey results in some research issues; and future directions to resolve these issues are defined.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130544390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Prevention of denial of service attack over vehicle ad hoc networks using quick response table 基于快速响应表的车辆自组织网络拒绝服务攻击预防
P. Waraich, N. Batra
Secure routing over VANET is a major issue due to its high mobility environment. Due to dynamic topology, routes are frequently updated and also suffers from link breaks due to the obstacles i.e. buildings, tunnels and bridges etc. Frequent link breaks can cause packet drop and thus result in degradation of network performance. In case of VANETs, it becomes very difficult to identify the reason of the packet drop as it can also occur due to the presence of a security threat. VANET is a type of wireless adhoc network and suffer from common attacks which exist for mobile adhoc network (MANET) i.e. Denial of Services (DoS), Black hole, Gray hole and Sybil attack etc. Researchers have already developed various security mechanisms for secure routing over MANET but these solutions are not fully compatible with unique attributes of VANET i.e. vehicles can communicate with each other (V2V) as well as communication can be initiated with infrastructure based network (V2I). In order to secure the routing for both types of communication, there is need to develop a solution. In this paper, a method for secure routing is introduced which can identify as well as eliminate the existing security threat.
由于VANET的高移动性环境,安全路由是一个主要问题。由于动态拓扑结构,路线经常更新,并且由于建筑物,隧道和桥梁等障碍物而遭受链路中断。频繁的链路中断会导致丢包,从而导致网络性能下降。在vanet的情况下,很难确定数据包丢失的原因,因为它也可能由于存在安全威胁而发生。VANET是一种无线自组网,受到移动自组网(MANET)常见的攻击,即拒绝服务(DoS)、黑洞、灰洞和Sybil攻击等。研究人员已经开发了各种安全机制,用于MANET上的安全路由,但这些解决方案并不完全兼容VANET的独特属性,即车辆可以相互通信(V2V),也可以通过基于基础设施的网络(V2I)发起通信。为了保护这两种通信类型的路由,需要开发一种解决方案。本文介绍了一种能够识别和消除现有安全威胁的安全路由方法。
{"title":"Prevention of denial of service attack over vehicle ad hoc networks using quick response table","authors":"P. Waraich, N. Batra","doi":"10.1109/ISPCC.2017.8269746","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269746","url":null,"abstract":"Secure routing over VANET is a major issue due to its high mobility environment. Due to dynamic topology, routes are frequently updated and also suffers from link breaks due to the obstacles i.e. buildings, tunnels and bridges etc. Frequent link breaks can cause packet drop and thus result in degradation of network performance. In case of VANETs, it becomes very difficult to identify the reason of the packet drop as it can also occur due to the presence of a security threat. VANET is a type of wireless adhoc network and suffer from common attacks which exist for mobile adhoc network (MANET) i.e. Denial of Services (DoS), Black hole, Gray hole and Sybil attack etc. Researchers have already developed various security mechanisms for secure routing over MANET but these solutions are not fully compatible with unique attributes of VANET i.e. vehicles can communicate with each other (V2V) as well as communication can be initiated with infrastructure based network (V2I). In order to secure the routing for both types of communication, there is need to develop a solution. In this paper, a method for secure routing is introduced which can identify as well as eliminate the existing security threat.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115450119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Hybrid improved technique for data security and authentication for RFID tags RFID标签数据安全与认证的混合改进技术
Anand Sharma, Amardeep Singh
In the modern era, the internet of things are gaining lot of attention because its provides a connecting of all devices with the internet. The users can access the all devices wirelessly from anywhere. The internet is public available network, anyone access the network. So, to provide the user's security and privacy data security and authentication is required. To provide security cryptography algorithms used but the limitation is that the standard algorithms which are approved by NIST such as AES large block, key size, and memory consumable and their performance not up to mark in resource constraint devices. In this paper, a hybrid lightweight improved technique is proposed for data security and authentication for RFID tags. The performance analysis for the proposed technique is done and compare with the existing algorithm. The result shows that the hybrid technique resolve brute force, linear and differential cryptanalysis attacks.
在现代,物联网越来越受到人们的关注,因为它提供了所有设备与互联网的连接。用户可以从任何地方无线访问所有设备。因特网是公共可用的网络,任何人都可以访问这个网络。因此,为了提供用户的安全性和隐私性,需要数据的安全性和身份验证。为了提供安全性,使用了加密算法,但其局限性是NIST认可的AES等标准算法块大、密钥大小大、内存消耗大,在资源受限的设备上性能达不到要求。本文提出了一种用于RFID标签数据安全和认证的混合轻量级改进技术。对该算法进行了性能分析,并与现有算法进行了比较。结果表明,该混合技术解决了暴力破解、线性和差分密码分析攻击。
{"title":"Hybrid improved technique for data security and authentication for RFID tags","authors":"Anand Sharma, Amardeep Singh","doi":"10.1109/ISPCC.2017.8269737","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269737","url":null,"abstract":"In the modern era, the internet of things are gaining lot of attention because its provides a connecting of all devices with the internet. The users can access the all devices wirelessly from anywhere. The internet is public available network, anyone access the network. So, to provide the user's security and privacy data security and authentication is required. To provide security cryptography algorithms used but the limitation is that the standard algorithms which are approved by NIST such as AES large block, key size, and memory consumable and their performance not up to mark in resource constraint devices. In this paper, a hybrid lightweight improved technique is proposed for data security and authentication for RFID tags. The performance analysis for the proposed technique is done and compare with the existing algorithm. The result shows that the hybrid technique resolve brute force, linear and differential cryptanalysis attacks.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116428758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance estimation of junctionless FinFET with graded channel design 梯度通道设计无结FinFET的性能评估
S. Kaundal, Shelja Kaushal, A. Rana
This paper investigates the Junctionless (JL) FinFET with laterally graded channel and differentially graded channel design using TCAD simulation. It is demonstrated that differentially graded-JL FinFET (DG-JL FinFET) provides better subthreshold characteristics as compared to laterally graded-JL FinFET (LG-JL FinFET) and conventional uniformly doped-JL FinFET (UD-JL FinFET). However, the drive current is higher in LD-JL FinFET.
本文利用TCAD仿真研究了具有横向梯度通道和差分梯度通道的无结FinFET设计。结果表明,与横向梯度jl FinFET (LG-JL FinFET)和常规均匀掺杂jl FinFET (UD-JL FinFET)相比,差分梯度jl FinFET (DG-JL FinFET)具有更好的亚阈值特性。然而,在LD-JL FinFET中驱动电流更高。
{"title":"Performance estimation of junctionless FinFET with graded channel design","authors":"S. Kaundal, Shelja Kaushal, A. Rana","doi":"10.1109/ISPCC.2017.8269706","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269706","url":null,"abstract":"This paper investigates the Junctionless (JL) FinFET with laterally graded channel and differentially graded channel design using TCAD simulation. It is demonstrated that differentially graded-JL FinFET (DG-JL FinFET) provides better subthreshold characteristics as compared to laterally graded-JL FinFET (LG-JL FinFET) and conventional uniformly doped-JL FinFET (UD-JL FinFET). However, the drive current is higher in LD-JL FinFET.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"443 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123963903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An efficient antilogarithmic converter by using 11-regions error correction scheme 采用11区纠错方案的高效反对数变换器
Durgesh Nandan, Anurag Mahajan, J. Kanungo
An efficient hardware implementation of logarithmic operations is a good choice in place of binary arithmetic operations. In this paper, we suggest an efficient antilogarithmic converter by using 11-region bit-level manipulation scheme by using the error correction scheme. The proposed hardware minimization technique provides a hardware (area, delay & power) efficient implementation at the same error cost. Existing and proposed antilogarithmic converters design is implemented on Xilinx ISE 12.1. Both converters design are evaluated on the Synopsys design compiler by using SAED 65 nm CMOS library and compared the results concerning of Data Arrival Time (DAT), Area, Power, Area Delay Product (ADP), and Energy. The proposed converter involves 52.33 % less ADP and 41.05 % Energy in comparisons of the existing two-bit regions antilogarithmic converter.
对数运算的高效硬件实现是替代二进制算术运算的好选择。在本文中,我们提出了一种有效的反对数转换器,该转换器采用11区位级操作方案,并采用纠错方案。所提出的硬件最小化技术以相同的错误代价提供了硬件(面积、延迟和功耗)效率的实现。现有和拟议的反对数转换器设计是在赛灵思ISE 12.1上实现的。采用SAED 65nm CMOS库在Synopsys设计编译器上对两种转换器设计进行了评估,并比较了数据到达时间(DAT)、面积、功耗、面积延迟积(ADP)和能量等方面的结果。与现有的2位区反对数转换器相比,该转换器的ADP降低52.33%,能量降低41.05%。
{"title":"An efficient antilogarithmic converter by using 11-regions error correction scheme","authors":"Durgesh Nandan, Anurag Mahajan, J. Kanungo","doi":"10.1109/ISPCC.2017.8269661","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269661","url":null,"abstract":"An efficient hardware implementation of logarithmic operations is a good choice in place of binary arithmetic operations. In this paper, we suggest an efficient antilogarithmic converter by using 11-region bit-level manipulation scheme by using the error correction scheme. The proposed hardware minimization technique provides a hardware (area, delay & power) efficient implementation at the same error cost. Existing and proposed antilogarithmic converters design is implemented on Xilinx ISE 12.1. Both converters design are evaluated on the Synopsys design compiler by using SAED 65 nm CMOS library and compared the results concerning of Data Arrival Time (DAT), Area, Power, Area Delay Product (ADP), and Energy. The proposed converter involves 52.33 % less ADP and 41.05 % Energy in comparisons of the existing two-bit regions antilogarithmic converter.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127226466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1