The scaling of CMOS technology has progressed rapidly for three decades. But CMOS is bound to reach its limits due to certain constraints such as minimum dimensions that can be fabricated, degradation in switching performance, power-dissipation etc. Thus, the technologies that may replace CMOS when the limit is reached need to be investigated. Some of the potential solutions can be use of new materials such as graphene or new structures such as Dual gate and back gate. In this paper we investigate the structural and electronic properties of graphene nano-ribbons when devised into dual gate and back-gate structures. Simulation results have been used to support the paper.
{"title":"High performance dual gate GNR fet","authors":"N. G. Bheniye, P. Panchal, A. Gajarushi","doi":"10.1145/1980022.1980391","DOIUrl":"https://doi.org/10.1145/1980022.1980391","url":null,"abstract":"The scaling of CMOS technology has progressed rapidly for three decades. But CMOS is bound to reach its limits due to certain constraints such as minimum dimensions that can be fabricated, degradation in switching performance, power-dissipation etc. Thus, the technologies that may replace CMOS when the limit is reached need to be investigated. Some of the potential solutions can be use of new materials such as graphene or new structures such as Dual gate and back gate. In this paper we investigate the structural and electronic properties of graphene nano-ribbons when devised into dual gate and back-gate structures. Simulation results have been used to support the paper.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122669658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Business interruptions can occur anywhere, anytime. Massive hurricanes, tsunamis, power outages, terrorist bombings and more have made recent headlines. It is impossible to predict what may strike when. In today's 24x7x365 world, it has become mandatory to prepare for such disaster scenarios. With the ever increasing dependence on banks for both electronic and traditional banking services, it has become almost mandatory for the banking industry to plan for 'Business Continuity' (BCP). In this paper, how various innovative virtualization technologies are leveraged to reallocate or restore server, network and storage resources to a critical application based on business priorities will be described. Using the dynamic resource reallocation capabilities offered by virtualization technologies, some mission critical applications such as Exchange email and a transaction intensive database application particularly in banking industry are reconfigured and deployed for rapid recovery through dynamic reallocation of the server, network and storage resources. Rapid improvement in the performance or restoration of the application and therefore minimization of the interruption of the services they provide can be leveraged using the virtualization technologies. This is called Real-time Assurance of Business Continuity (RABC) through virtualization where the "Real-time" can be designed to be non-disruptive to the application of interest or can be minutes to hours depending on business risk tolerance and affordability.
{"title":"Disaster recovery planning with virtualization technologies in banking industry","authors":"S. Maitra, M. Shanker, P. Mudholkar","doi":"10.1145/1980022.1980089","DOIUrl":"https://doi.org/10.1145/1980022.1980089","url":null,"abstract":"Business interruptions can occur anywhere, anytime. Massive hurricanes, tsunamis, power outages, terrorist bombings and more have made recent headlines. It is impossible to predict what may strike when. In today's 24x7x365 world, it has become mandatory to prepare for such disaster scenarios. With the ever increasing dependence on banks for both electronic and traditional banking services, it has become almost mandatory for the banking industry to plan for 'Business Continuity' (BCP).\u0000 In this paper, how various innovative virtualization technologies are leveraged to reallocate or restore server, network and storage resources to a critical application based on business priorities will be described.\u0000 Using the dynamic resource reallocation capabilities offered by virtualization technologies, some mission critical applications such as Exchange email and a transaction intensive database application particularly in banking industry are reconfigured and deployed for rapid recovery through dynamic reallocation of the server, network and storage resources. Rapid improvement in the performance or restoration of the application and therefore minimization of the interruption of the services they provide can be leveraged using the virtualization technologies. This is called Real-time Assurance of Business Continuity (RABC) through virtualization where the \"Real-time\" can be designed to be non-disruptive to the application of interest or can be minutes to hours depending on business risk tolerance and affordability.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126260624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Salam, J. Sathyan, S. James, S. Sreejith, M. P. Suhair
In this paper, we describe a circuit idea and implementation algorithm of a device useful to common people during travelling. This device provides the power to user by inserting a one rupee coin. It consists of a coin detector, microcontroller and out driver relay. When a coin is inserted, power can be drawn from the plug point for a predefined duration. This devise is useful for charging all portable electronic devices and e-vehicles.
{"title":"An accurate circuit idea for pre-paid electricity for portable devices","authors":"K. Salam, J. Sathyan, S. James, S. Sreejith, M. P. Suhair","doi":"10.1145/1980022.1980297","DOIUrl":"https://doi.org/10.1145/1980022.1980297","url":null,"abstract":"In this paper, we describe a circuit idea and implementation algorithm of a device useful to common people during travelling. This device provides the power to user by inserting a one rupee coin. It consists of a coin detector, microcontroller and out driver relay. When a coin is inserted, power can be drawn from the plug point for a predefined duration. This devise is useful for charging all portable electronic devices and e-vehicles.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130020467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Detection and classification of Atrial complexes from the ECG is of considerable importance in critical patient care monitoring of dangerous heart conditions. Accurate detection of Paroxysmal Atrial Fibrillation (PAF) using Atrial Premature Complexes(APC) is particularily important in relation to life threatening arrhythmias. PAF is a type of progressive cardiac arrhythmia that poses severe health risks, sometimes leading to ventricular arrhythmia. The electrocardiogram (ECG) data from the PhysioNet Online Database is used to develop a technique to screen, detect, and predict the onset of PAF. By considering a set of feature derived from RR intervals and P wave morphology it is possible to discriminate between PAF patients and healthy individuals. Result demonstrated that feature based on RR intervals is most successful. The RR based algorithm could be incorporated into medical devices with the potential of contributing to new healthcare technology.
{"title":"R-R interval based paroxysmal atrial fibrillation analysis","authors":"S. Kadge, M. Panse","doi":"10.1145/1980022.1980306","DOIUrl":"https://doi.org/10.1145/1980022.1980306","url":null,"abstract":"Detection and classification of Atrial complexes from the ECG is of considerable importance in critical patient care monitoring of dangerous heart conditions. Accurate detection of Paroxysmal Atrial Fibrillation (PAF) using Atrial Premature Complexes(APC) is particularily important in relation to life threatening arrhythmias. PAF is a type of progressive cardiac arrhythmia that poses severe health risks, sometimes leading to ventricular arrhythmia. The electrocardiogram (ECG) data from the PhysioNet Online Database is used to develop a technique to screen, detect, and predict the onset of PAF. By considering a set of feature derived from RR intervals and P wave morphology it is possible to discriminate between PAF patients and healthy individuals. Result demonstrated that feature based on RR intervals is most successful. The RR based algorithm could be incorporated into medical devices with the potential of contributing to new healthcare technology.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129657292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Agile methods generally promote a disciplined project management process that encourages frequent inspection and adaptation, a leadership philosophy that encourages teamwork, self-organization and accountability, a set of engineering best practices that allow for rapid delivery of high-quality software, and a business approach that aligns development with customer needs and company goals. When it is considered Agile Principles as a leadership value System in the Software Development then the question arise that are one is ready to be unleashed? As criticisms include several issues regarding the same like Agile Principles often used as a means to bleed money from customers through lack of defining a deliverable, Lack of structure and necessary documentation, Only works with senior-level developers Incorporates insufficient software design, Requires meetings at frequent intervals at enormous expense to customers, Requires too much cultural change to adopt, Can lead to more difficult contractual negotiations?, Can be very inefficient---if the requirements for one area of code change through various iterations, the same programming may need to be done several times over. Impossible to develop realistic estimates of work effort needed to provide a quote, because at the beginning of the project no one knows the entire scope/requirements and can increase the risk of scope due to the lack of detailed requirements documentation? Here it is observed and surveyed the various categories of Projects for different kind of group members to adopt and follow the agile principles. It proposes the strength and weaknesses of all 12 Agile Principles based on Indian scenario.
{"title":"Agile principles as a leadership value system in the software development: are we ready to be unleashed?","authors":"S. Patil, Srikantha Rao, Preeti S. Patil","doi":"10.1145/1980022.1980188","DOIUrl":"https://doi.org/10.1145/1980022.1980188","url":null,"abstract":"Agile methods generally promote a disciplined project management process that encourages frequent inspection and adaptation, a leadership philosophy that encourages teamwork, self-organization and accountability, a set of engineering best practices that allow for rapid delivery of high-quality software, and a business approach that aligns development with customer needs and company goals. When it is considered Agile Principles as a leadership value System in the Software Development then the question arise that are one is ready to be unleashed? As criticisms include several issues regarding the same like Agile Principles often used as a means to bleed money from customers through lack of defining a deliverable, Lack of structure and necessary documentation, Only works with senior-level developers Incorporates insufficient software design, Requires meetings at frequent intervals at enormous expense to customers, Requires too much cultural change to adopt, Can lead to more difficult contractual negotiations?, Can be very inefficient---if the requirements for one area of code change through various iterations, the same programming may need to be done several times over. Impossible to develop realistic estimates of work effort needed to provide a quote, because at the beginning of the project no one knows the entire scope/requirements and can increase the risk of scope due to the lack of detailed requirements documentation?\u0000 Here it is observed and surveyed the various categories of Projects for different kind of group members to adopt and follow the agile principles. It proposes the strength and weaknesses of all 12 Agile Principles based on Indian scenario.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129422904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sudhir N. Dhage, B. Meshram, R. Rawat, S. Padawe, M. Paingaokar, A. Misra
In recent years, with the growing popularity of cloud computing, security in cloud has become an important issue. As "Prevention is better than cure", detecting and blocking an attack is better than responding to an attack after a system has been compromised. This paper proposes architecture capable of detecting intrusions in a distributed cloud computing environment, and safeguarding it from possible security breaches. It deploys a separate instance of IDS for each user and uses a single controller to manage the instances. IDS in this architecture can use signature based as well as learning based method.
{"title":"Intrusion detection system in cloud computing environment","authors":"Sudhir N. Dhage, B. Meshram, R. Rawat, S. Padawe, M. Paingaokar, A. Misra","doi":"10.1145/1980022.1980076","DOIUrl":"https://doi.org/10.1145/1980022.1980076","url":null,"abstract":"In recent years, with the growing popularity of cloud computing, security in cloud has become an important issue. As \"Prevention is better than cure\", detecting and blocking an attack is better than responding to an attack after a system has been compromised. This paper proposes architecture capable of detecting intrusions in a distributed cloud computing environment, and safeguarding it from possible security breaches. It deploys a separate instance of IDS for each user and uses a single controller to manage the instances. IDS in this architecture can use signature based as well as learning based method.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128586424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Whenever, user has to deal with lots of files present in the system, managing and storing these files systematically is very important in order to make it easier to access them. Here comes the role of our FS Filter Driver which helps user to classify these files and check the intrusions in these files and store them in separate directories according to their file extensions. It also classifies the files which are downloaded from the Internet. Thus Driver eases the programmer's job of handling a lot of files by classifying them systematically.
{"title":"A generic filter driver for file classification in Linux","authors":"Pravin Dilp, Ajit Ambeka, P. Chawan","doi":"10.1145/1980022.1980344","DOIUrl":"https://doi.org/10.1145/1980022.1980344","url":null,"abstract":"Whenever, user has to deal with lots of files present in the system, managing and storing these files systematically is very important in order to make it easier to access them. Here comes the role of our FS Filter Driver which helps user to classify these files and check the intrusions in these files and store them in separate directories according to their file extensions. It also classifies the files which are downloaded from the Internet. Thus Driver eases the programmer's job of handling a lot of files by classifying them systematically.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130837471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes experimentally how a folded dipole antenna is better in performance than a simple dipole antenna and also describes an alternate way to design folded dipole antenna compatible with loop antenna to generate circular polarized wave. Modified dipole is simulated in the UHF band with different feeding methods such as conventional center feed and tapered feed. The results are found to be nearly same to that of conventional folded dipole.
{"title":"Modified folded dipole antenna","authors":"N. Sharma, S. Shetty, A. Sharma, N. Verma","doi":"10.1145/1980022.1980278","DOIUrl":"https://doi.org/10.1145/1980022.1980278","url":null,"abstract":"This paper describes experimentally how a folded dipole antenna is better in performance than a simple dipole antenna and also describes an alternate way to design folded dipole antenna compatible with loop antenna to generate circular polarized wave. Modified dipole is simulated in the UHF band with different feeding methods such as conventional center feed and tapered feed. The results are found to be nearly same to that of conventional folded dipole.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131361312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anita Borkar, A. Salunke, Ankita Barabde, N. P. Karlekar
Honeypots are closely monitored decoys that are employed in a network to study the trail of hackers and to alert network administrators of a possible intrusion. Using honeypots provides a cost-effective solution to increase the security posture of an organization. Even though it is not a panacea for security breaches, it is useful as a tool for network forensics and intrusion detection. Nowadays, they are also being extensively used by the research community to study issues in network security, such as Internet worms, spam control, DoS attacks, etc. In this paper, we survey the types of honeypot technologies and their deployments as an effective educational tool to study issues in network security. In addition to survey of honeypot classifications, we present a primary tool for each type.
{"title":"Honeypot: a survey of technologies, tools and deployment","authors":"Anita Borkar, A. Salunke, Ankita Barabde, N. P. Karlekar","doi":"10.1145/1980022.1980327","DOIUrl":"https://doi.org/10.1145/1980022.1980327","url":null,"abstract":"Honeypots are closely monitored decoys that are employed in a network to study the trail of hackers and to alert network administrators of a possible intrusion. Using honeypots provides a cost-effective solution to increase the security posture of an organization. Even though it is not a panacea for security breaches, it is useful as a tool for network forensics and intrusion detection. Nowadays, they are also being extensively used by the research community to study issues in network security, such as Internet worms, spam control, DoS attacks, etc. In this paper, we survey the types of honeypot technologies and their deployments as an effective educational tool to study issues in network security. In addition to survey of honeypot classifications, we present a primary tool for each type.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130047090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to meet increasing power demand, taking into account economical and environmental factors, wind energy conversion is gradually gaining interest as a suitable source of renewable energy. In this paper, The modeling of the Wind Energy Conversion System(WECS) with Matrix converter is proposed. The Space Vector Modulation (SPVM) technique is used for matrix converter to control the generator rotor current. The Matrix converter is good for controlling torque (load changes in wind turbine), fault current power flow in the lines in WECS. In this paper the controller is tuned for fault current limitation and optimal power flow. The modeling of the complete system is done in MATLAB-SIMULINK.
{"title":"Modeling and controller design of a wind energy conversion system with matrix converter","authors":"Y. S. Rao, A. Laxmi, K. Krishna","doi":"10.1145/1980022.1980286","DOIUrl":"https://doi.org/10.1145/1980022.1980286","url":null,"abstract":"In order to meet increasing power demand, taking into account economical and environmental factors, wind energy conversion is gradually gaining interest as a suitable source of renewable energy. In this paper, The modeling of the Wind Energy Conversion System(WECS) with Matrix converter is proposed. The Space Vector Modulation (SPVM) technique is used for matrix converter to control the generator rotor current.\u0000 The Matrix converter is good for controlling torque (load changes in wind turbine), fault current power flow in the lines in WECS. In this paper the controller is tuned for fault current limitation and optimal power flow. The modeling of the complete system is done in MATLAB-SIMULINK.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123759060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}