首页 > 最新文献

International Conference & Workshop on Emerging Trends in Technology最新文献

英文 中文
High performance dual gate GNR fet 高性能双栅GNR场效应管
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980391
N. G. Bheniye, P. Panchal, A. Gajarushi
The scaling of CMOS technology has progressed rapidly for three decades. But CMOS is bound to reach its limits due to certain constraints such as minimum dimensions that can be fabricated, degradation in switching performance, power-dissipation etc. Thus, the technologies that may replace CMOS when the limit is reached need to be investigated. Some of the potential solutions can be use of new materials such as graphene or new structures such as Dual gate and back gate. In this paper we investigate the structural and electronic properties of graphene nano-ribbons when devised into dual gate and back-gate structures. Simulation results have been used to support the paper.
三十年来,CMOS技术的规模化发展迅速。但由于某些限制,如最小尺寸,开关性能下降,功耗等,CMOS必然会达到其极限。因此,当达到极限时,可能取代CMOS的技术需要研究。一些潜在的解决方案可以使用新材料,如石墨烯或新结构,如双栅和后门。本文研究了石墨烯纳米带在双栅和背栅结构下的结构和电子性能。仿真结果支持了本文的研究。
{"title":"High performance dual gate GNR fet","authors":"N. G. Bheniye, P. Panchal, A. Gajarushi","doi":"10.1145/1980022.1980391","DOIUrl":"https://doi.org/10.1145/1980022.1980391","url":null,"abstract":"The scaling of CMOS technology has progressed rapidly for three decades. But CMOS is bound to reach its limits due to certain constraints such as minimum dimensions that can be fabricated, degradation in switching performance, power-dissipation etc. Thus, the technologies that may replace CMOS when the limit is reached need to be investigated. Some of the potential solutions can be use of new materials such as graphene or new structures such as Dual gate and back gate. In this paper we investigate the structural and electronic properties of graphene nano-ribbons when devised into dual gate and back-gate structures. Simulation results have been used to support the paper.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122669658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Disaster recovery planning with virtualization technologies in banking industry 银行业中虚拟化技术的灾难恢复规划
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980089
S. Maitra, M. Shanker, P. Mudholkar
Business interruptions can occur anywhere, anytime. Massive hurricanes, tsunamis, power outages, terrorist bombings and more have made recent headlines. It is impossible to predict what may strike when. In today's 24x7x365 world, it has become mandatory to prepare for such disaster scenarios. With the ever increasing dependence on banks for both electronic and traditional banking services, it has become almost mandatory for the banking industry to plan for 'Business Continuity' (BCP). In this paper, how various innovative virtualization technologies are leveraged to reallocate or restore server, network and storage resources to a critical application based on business priorities will be described. Using the dynamic resource reallocation capabilities offered by virtualization technologies, some mission critical applications such as Exchange email and a transaction intensive database application particularly in banking industry are reconfigured and deployed for rapid recovery through dynamic reallocation of the server, network and storage resources. Rapid improvement in the performance or restoration of the application and therefore minimization of the interruption of the services they provide can be leveraged using the virtualization technologies. This is called Real-time Assurance of Business Continuity (RABC) through virtualization where the "Real-time" can be designed to be non-disruptive to the application of interest or can be minutes to hours depending on business risk tolerance and affordability.
业务中断随时随地都可能发生。大规模飓风、海啸、停电、恐怖主义爆炸等事件成为最近的头条新闻。预测什么时候会发生什么是不可能的。在今天的24x7x365世界中,为这样的灾难场景做好准备已经成为强制性的。随着电子和传统银行服务对银行的依赖日益增加,银行业制定“业务连续性”(BCP)计划几乎已成为强制性的。本文将介绍如何利用各种创新的虚拟化技术,根据业务优先级将服务器、网络和存储资源重新分配或恢复到关键应用程序。使用虚拟化技术提供的动态资源重新分配功能,可以重新配置和部署一些关键任务应用程序,如Exchange电子邮件和事务密集型数据库应用程序(特别是银行业中的应用程序),以便通过服务器、网络和存储资源的动态重新分配实现快速恢复。可以利用虚拟化技术快速改进应用程序的性能或恢复,从而最大限度地减少它们提供的服务的中断。这被称为通过虚拟化实现业务连续性的实时保证(RABC),在这种情况下,“实时”可以被设计成对感兴趣的应用程序不中断,也可以是几分钟到几小时,这取决于业务风险承受能力和可承受性。
{"title":"Disaster recovery planning with virtualization technologies in banking industry","authors":"S. Maitra, M. Shanker, P. Mudholkar","doi":"10.1145/1980022.1980089","DOIUrl":"https://doi.org/10.1145/1980022.1980089","url":null,"abstract":"Business interruptions can occur anywhere, anytime. Massive hurricanes, tsunamis, power outages, terrorist bombings and more have made recent headlines. It is impossible to predict what may strike when. In today's 24x7x365 world, it has become mandatory to prepare for such disaster scenarios. With the ever increasing dependence on banks for both electronic and traditional banking services, it has become almost mandatory for the banking industry to plan for 'Business Continuity' (BCP).\u0000 In this paper, how various innovative virtualization technologies are leveraged to reallocate or restore server, network and storage resources to a critical application based on business priorities will be described.\u0000 Using the dynamic resource reallocation capabilities offered by virtualization technologies, some mission critical applications such as Exchange email and a transaction intensive database application particularly in banking industry are reconfigured and deployed for rapid recovery through dynamic reallocation of the server, network and storage resources. Rapid improvement in the performance or restoration of the application and therefore minimization of the interruption of the services they provide can be leveraged using the virtualization technologies. This is called Real-time Assurance of Business Continuity (RABC) through virtualization where the \"Real-time\" can be designed to be non-disruptive to the application of interest or can be minutes to hours depending on business risk tolerance and affordability.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126260624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An accurate circuit idea for pre-paid electricity for portable devices 为便携式设备预付费供电的精确电路设计
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980297
K. Salam, J. Sathyan, S. James, S. Sreejith, M. P. Suhair
In this paper, we describe a circuit idea and implementation algorithm of a device useful to common people during travelling. This device provides the power to user by inserting a one rupee coin. It consists of a coin detector, microcontroller and out driver relay. When a coin is inserted, power can be drawn from the plug point for a predefined duration. This devise is useful for charging all portable electronic devices and e-vehicles.
本文介绍了一种适用于普通百姓出行的装置的电路思想和实现算法。该装置通过插入一枚一卢比的硬币为用户提供电力。它由硬币检测器、微控制器和输出驱动继电器组成。当一枚硬币被插入时,电源可以在预定的持续时间内从插头点取出。该装置适用于所有便携式电子设备和电动汽车的充电。
{"title":"An accurate circuit idea for pre-paid electricity for portable devices","authors":"K. Salam, J. Sathyan, S. James, S. Sreejith, M. P. Suhair","doi":"10.1145/1980022.1980297","DOIUrl":"https://doi.org/10.1145/1980022.1980297","url":null,"abstract":"In this paper, we describe a circuit idea and implementation algorithm of a device useful to common people during travelling. This device provides the power to user by inserting a one rupee coin. It consists of a coin detector, microcontroller and out driver relay. When a coin is inserted, power can be drawn from the plug point for a predefined duration. This devise is useful for charging all portable electronic devices and e-vehicles.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130020467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
R-R interval based paroxysmal atrial fibrillation analysis 基于R-R间期的阵发性心房颤动分析
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980306
S. Kadge, M. Panse
Detection and classification of Atrial complexes from the ECG is of considerable importance in critical patient care monitoring of dangerous heart conditions. Accurate detection of Paroxysmal Atrial Fibrillation (PAF) using Atrial Premature Complexes(APC) is particularily important in relation to life threatening arrhythmias. PAF is a type of progressive cardiac arrhythmia that poses severe health risks, sometimes leading to ventricular arrhythmia. The electrocardiogram (ECG) data from the PhysioNet Online Database is used to develop a technique to screen, detect, and predict the onset of PAF. By considering a set of feature derived from RR intervals and P wave morphology it is possible to discriminate between PAF patients and healthy individuals. Result demonstrated that feature based on RR intervals is most successful. The RR based algorithm could be incorporated into medical devices with the potential of contributing to new healthcare technology.
心房复合体的检测和分类从心电图是相当重要的危重病人监护监测危险的心脏条件。使用心房早衰复合体(APC)准确检测阵发性心房颤动(PAF)对危及生命的心律失常尤为重要。PAF是一种进行性心律失常,具有严重的健康风险,有时可导致室性心律失常。来自PhysioNet在线数据库的心电图(ECG)数据用于开发一种筛选、检测和预测PAF发病的技术。通过考虑由RR间隔和P波形态学衍生的一组特征,可以区分PAF患者和健康个体。结果表明,基于RR区间的特征是最成功的。基于RR的算法可以整合到医疗设备中,有可能为新的医疗保健技术做出贡献。
{"title":"R-R interval based paroxysmal atrial fibrillation analysis","authors":"S. Kadge, M. Panse","doi":"10.1145/1980022.1980306","DOIUrl":"https://doi.org/10.1145/1980022.1980306","url":null,"abstract":"Detection and classification of Atrial complexes from the ECG is of considerable importance in critical patient care monitoring of dangerous heart conditions. Accurate detection of Paroxysmal Atrial Fibrillation (PAF) using Atrial Premature Complexes(APC) is particularily important in relation to life threatening arrhythmias. PAF is a type of progressive cardiac arrhythmia that poses severe health risks, sometimes leading to ventricular arrhythmia. The electrocardiogram (ECG) data from the PhysioNet Online Database is used to develop a technique to screen, detect, and predict the onset of PAF. By considering a set of feature derived from RR intervals and P wave morphology it is possible to discriminate between PAF patients and healthy individuals. Result demonstrated that feature based on RR intervals is most successful. The RR based algorithm could be incorporated into medical devices with the potential of contributing to new healthcare technology.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129657292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Agile principles as a leadership value system in the software development: are we ready to be unleashed? 敏捷原则作为软件开发中的领导价值体系:我们准备好被释放了吗?
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980188
S. Patil, Srikantha Rao, Preeti S. Patil
Agile methods generally promote a disciplined project management process that encourages frequent inspection and adaptation, a leadership philosophy that encourages teamwork, self-organization and accountability, a set of engineering best practices that allow for rapid delivery of high-quality software, and a business approach that aligns development with customer needs and company goals. When it is considered Agile Principles as a leadership value System in the Software Development then the question arise that are one is ready to be unleashed? As criticisms include several issues regarding the same like Agile Principles often used as a means to bleed money from customers through lack of defining a deliverable, Lack of structure and necessary documentation, Only works with senior-level developers Incorporates insufficient software design, Requires meetings at frequent intervals at enormous expense to customers, Requires too much cultural change to adopt, Can lead to more difficult contractual negotiations?, Can be very inefficient---if the requirements for one area of code change through various iterations, the same programming may need to be done several times over. Impossible to develop realistic estimates of work effort needed to provide a quote, because at the beginning of the project no one knows the entire scope/requirements and can increase the risk of scope due to the lack of detailed requirements documentation? Here it is observed and surveyed the various categories of Projects for different kind of group members to adopt and follow the agile principles. It proposes the strength and weaknesses of all 12 Agile Principles based on Indian scenario.
敏捷方法通常促进一个鼓励频繁检查和调整的有纪律的项目管理过程,一种鼓励团队合作、自组织和责任的领导哲学,一组允许快速交付高质量软件的工程最佳实践,以及一种使开发与客户需求和公司目标保持一致的业务方法。当敏捷原则被认为是软件开发中的领导价值系统时,问题就来了,准备好释放了吗?批评包括几个问题,比如敏捷原则经常被用作从客户那里榨钱的手段,因为缺乏对可交付成果的定义,缺乏结构和必要的文档,只适用于高级开发人员,合并了不充分的软件设计,需要频繁的会议,对客户造成巨大的损失,需要太多的文化变革来采用,可能导致更困难的合同谈判?,可能非常低效——如果一个代码区域的需求通过各种迭代而改变,那么相同的编程可能需要多次重复。不可能对提供报价所需的工作量进行现实的估计,因为在项目开始时没有人知道整个范围/需求,并且由于缺乏详细的需求文档而增加了范围的风险?这里观察和调查了不同类别的项目,以便不同类型的团队成员采用和遵循敏捷原则。它根据印度的情况提出了所有12条敏捷原则的优缺点。
{"title":"Agile principles as a leadership value system in the software development: are we ready to be unleashed?","authors":"S. Patil, Srikantha Rao, Preeti S. Patil","doi":"10.1145/1980022.1980188","DOIUrl":"https://doi.org/10.1145/1980022.1980188","url":null,"abstract":"Agile methods generally promote a disciplined project management process that encourages frequent inspection and adaptation, a leadership philosophy that encourages teamwork, self-organization and accountability, a set of engineering best practices that allow for rapid delivery of high-quality software, and a business approach that aligns development with customer needs and company goals. When it is considered Agile Principles as a leadership value System in the Software Development then the question arise that are one is ready to be unleashed? As criticisms include several issues regarding the same like Agile Principles often used as a means to bleed money from customers through lack of defining a deliverable, Lack of structure and necessary documentation, Only works with senior-level developers Incorporates insufficient software design, Requires meetings at frequent intervals at enormous expense to customers, Requires too much cultural change to adopt, Can lead to more difficult contractual negotiations?, Can be very inefficient---if the requirements for one area of code change through various iterations, the same programming may need to be done several times over. Impossible to develop realistic estimates of work effort needed to provide a quote, because at the beginning of the project no one knows the entire scope/requirements and can increase the risk of scope due to the lack of detailed requirements documentation?\u0000 Here it is observed and surveyed the various categories of Projects for different kind of group members to adopt and follow the agile principles. It proposes the strength and weaknesses of all 12 Agile Principles based on Indian scenario.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129422904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Intrusion detection system in cloud computing environment 云计算环境下的入侵检测系统
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980076
Sudhir N. Dhage, B. Meshram, R. Rawat, S. Padawe, M. Paingaokar, A. Misra
In recent years, with the growing popularity of cloud computing, security in cloud has become an important issue. As "Prevention is better than cure", detecting and blocking an attack is better than responding to an attack after a system has been compromised. This paper proposes architecture capable of detecting intrusions in a distributed cloud computing environment, and safeguarding it from possible security breaches. It deploys a separate instance of IDS for each user and uses a single controller to manage the instances. IDS in this architecture can use signature based as well as learning based method.
近年来,随着云计算的日益普及,云中的安全已成为一个重要的问题。正如“防患于未然”,检测和阻止攻击比在系统被破坏后响应攻击更好。本文提出了一种能够检测分布式云计算环境中的入侵并保护其免受可能的安全破坏的体系结构。它为每个用户部署一个单独的IDS实例,并使用单个控制器来管理这些实例。该体系结构中的入侵检测既可以使用基于签名的方法,也可以使用基于学习的方法。
{"title":"Intrusion detection system in cloud computing environment","authors":"Sudhir N. Dhage, B. Meshram, R. Rawat, S. Padawe, M. Paingaokar, A. Misra","doi":"10.1145/1980022.1980076","DOIUrl":"https://doi.org/10.1145/1980022.1980076","url":null,"abstract":"In recent years, with the growing popularity of cloud computing, security in cloud has become an important issue. As \"Prevention is better than cure\", detecting and blocking an attack is better than responding to an attack after a system has been compromised. This paper proposes architecture capable of detecting intrusions in a distributed cloud computing environment, and safeguarding it from possible security breaches. It deploys a separate instance of IDS for each user and uses a single controller to manage the instances. IDS in this architecture can use signature based as well as learning based method.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128586424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
A generic filter driver for file classification in Linux Linux中用于文件分类的通用过滤器驱动程序
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980344
Pravin Dilp, Ajit Ambeka, P. Chawan
Whenever, user has to deal with lots of files present in the system, managing and storing these files systematically is very important in order to make it easier to access them. Here comes the role of our FS Filter Driver which helps user to classify these files and check the intrusions in these files and store them in separate directories according to their file extensions. It also classifies the files which are downloaded from the Internet. Thus Driver eases the programmer's job of handling a lot of files by classifying them systematically.
每当用户需要处理系统中存在的大量文件时,系统地管理和存储这些文件是非常重要的,以便于用户更容易地访问它们。这里是我们的FS过滤器驱动程序的作用,它帮助用户对这些文件进行分类,检查这些文件中的入侵,并根据文件扩展名将它们存储在单独的目录中。它还对从互联网下载的文件进行分类。因此,Driver通过系统地对文件进行分类,简化了程序员处理大量文件的工作。
{"title":"A generic filter driver for file classification in Linux","authors":"Pravin Dilp, Ajit Ambeka, P. Chawan","doi":"10.1145/1980022.1980344","DOIUrl":"https://doi.org/10.1145/1980022.1980344","url":null,"abstract":"Whenever, user has to deal with lots of files present in the system, managing and storing these files systematically is very important in order to make it easier to access them. Here comes the role of our FS Filter Driver which helps user to classify these files and check the intrusions in these files and store them in separate directories according to their file extensions. It also classifies the files which are downloaded from the Internet. Thus Driver eases the programmer's job of handling a lot of files by classifying them systematically.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130837471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modified folded dipole antenna 改进折叠偶极子天线
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980278
N. Sharma, S. Shetty, A. Sharma, N. Verma
This paper describes experimentally how a folded dipole antenna is better in performance than a simple dipole antenna and also describes an alternate way to design folded dipole antenna compatible with loop antenna to generate circular polarized wave. Modified dipole is simulated in the UHF band with different feeding methods such as conventional center feed and tapered feed. The results are found to be nearly same to that of conventional folded dipole.
本文通过实验描述了折叠偶极子天线比简单偶极子天线性能更好的原因,并介绍了一种设计与环形天线兼容的折叠偶极子天线产生圆极化波的替代方法。采用传统中心进给方式和锥形进给方式对UHF波段的修正偶极子进行了仿真。所得结果与常规折叠偶极子的结果基本一致。
{"title":"Modified folded dipole antenna","authors":"N. Sharma, S. Shetty, A. Sharma, N. Verma","doi":"10.1145/1980022.1980278","DOIUrl":"https://doi.org/10.1145/1980022.1980278","url":null,"abstract":"This paper describes experimentally how a folded dipole antenna is better in performance than a simple dipole antenna and also describes an alternate way to design folded dipole antenna compatible with loop antenna to generate circular polarized wave. Modified dipole is simulated in the UHF band with different feeding methods such as conventional center feed and tapered feed. The results are found to be nearly same to that of conventional folded dipole.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131361312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Honeypot: a survey of technologies, tools and deployment Honeypot:对技术、工具和部署的调查
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980327
Anita Borkar, A. Salunke, Ankita Barabde, N. P. Karlekar
Honeypots are closely monitored decoys that are employed in a network to study the trail of hackers and to alert network administrators of a possible intrusion. Using honeypots provides a cost-effective solution to increase the security posture of an organization. Even though it is not a panacea for security breaches, it is useful as a tool for network forensics and intrusion detection. Nowadays, they are also being extensively used by the research community to study issues in network security, such as Internet worms, spam control, DoS attacks, etc. In this paper, we survey the types of honeypot technologies and their deployments as an effective educational tool to study issues in network security. In addition to survey of honeypot classifications, we present a primary tool for each type.
蜜罐是一种受到严密监控的诱饵,用于研究黑客的踪迹,并提醒网络管理员可能的入侵。使用蜜罐提供了一种经济有效的解决方案来提高组织的安全状态。尽管它不是解决安全漏洞的灵丹妙药,但作为网络取证和入侵检测的工具,它还是很有用的。如今,它们也被研究团体广泛用于研究网络安全问题,如互联网蠕虫、垃圾邮件控制、DoS攻击等。在本文中,我们调查了蜜罐技术的类型及其部署,作为研究网络安全问题的有效教育工具。除了调查蜜罐分类,我们提出了每个类型的主要工具。
{"title":"Honeypot: a survey of technologies, tools and deployment","authors":"Anita Borkar, A. Salunke, Ankita Barabde, N. P. Karlekar","doi":"10.1145/1980022.1980327","DOIUrl":"https://doi.org/10.1145/1980022.1980327","url":null,"abstract":"Honeypots are closely monitored decoys that are employed in a network to study the trail of hackers and to alert network administrators of a possible intrusion. Using honeypots provides a cost-effective solution to increase the security posture of an organization. Even though it is not a panacea for security breaches, it is useful as a tool for network forensics and intrusion detection. Nowadays, they are also being extensively used by the research community to study issues in network security, such as Internet worms, spam control, DoS attacks, etc. In this paper, we survey the types of honeypot technologies and their deployments as an effective educational tool to study issues in network security. In addition to survey of honeypot classifications, we present a primary tool for each type.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130047090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modeling and controller design of a wind energy conversion system with matrix converter 基于矩阵变换器的风能转换系统建模与控制器设计
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980286
Y. S. Rao, A. Laxmi, K. Krishna
In order to meet increasing power demand, taking into account economical and environmental factors, wind energy conversion is gradually gaining interest as a suitable source of renewable energy. In this paper, The modeling of the Wind Energy Conversion System(WECS) with Matrix converter is proposed. The Space Vector Modulation (SPVM) technique is used for matrix converter to control the generator rotor current. The Matrix converter is good for controlling torque (load changes in wind turbine), fault current power flow in the lines in WECS. In this paper the controller is tuned for fault current limitation and optimal power flow. The modeling of the complete system is done in MATLAB-SIMULINK.
为了满足日益增长的电力需求,考虑到经济和环境因素,风能转换作为一种合适的可再生能源正逐渐引起人们的兴趣。本文提出了基于矩阵变换器的风能转换系统的建模方法。矩阵变换器采用空间矢量调制(SPVM)技术来控制发电机转子电流。矩阵变换器可以很好地控制风电机组的转矩(负荷变化)、故障电流和功率流。本文对控制器进行了故障电流限制和最优潮流调谐。在MATLAB-SIMULINK中对整个系统进行了建模。
{"title":"Modeling and controller design of a wind energy conversion system with matrix converter","authors":"Y. S. Rao, A. Laxmi, K. Krishna","doi":"10.1145/1980022.1980286","DOIUrl":"https://doi.org/10.1145/1980022.1980286","url":null,"abstract":"In order to meet increasing power demand, taking into account economical and environmental factors, wind energy conversion is gradually gaining interest as a suitable source of renewable energy. In this paper, The modeling of the Wind Energy Conversion System(WECS) with Matrix converter is proposed. The Space Vector Modulation (SPVM) technique is used for matrix converter to control the generator rotor current.\u0000 The Matrix converter is good for controlling torque (load changes in wind turbine), fault current power flow in the lines in WECS. In this paper the controller is tuned for fault current limitation and optimal power flow. The modeling of the complete system is done in MATLAB-SIMULINK.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123759060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Conference & Workshop on Emerging Trends in Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1