首页 > 最新文献

2015 IEEE Bombay Section Symposium (IBSS)最新文献

英文 中文
Performance analysis of vedic multiplication technique using FPGA 基于FPGA的吠陀乘法技术性能分析
Pub Date : 2015-09-01 DOI: 10.1109/IBSS.2015.7456657
S. Chopade, Rama Mehta
Today, it is necessary to increase the speed of multiplier as the need of high speed processors is increasing. Multiplier is a main block of any processor. Conventional processors need great hardware resources and take more time in multiplication operation. This paper present a high speed multiplier based on ancient popular Vedic Mathematics. Implementation is done on digital circuits. Vedic multiplication is accomplished in the same way as that of normal multiplier using digital hardware. In this paper a comparison of concerned multipliers in 8, 16 and 32 bits multiplications is performed. 8 bit and 16bit Urdhva algorithm shows 50% improvement in delay than that of Nikhilam, whereas 100% better than that of Binary multiplier. 32bit Nikhilam multiplier gives 52% improvement in delay than that of Urdhva multiplier and 16% better than that of binary multiplier.
今天,随着对高速处理器的需求不断增加,有必要提高乘法器的速度。乘法器是任何处理器的主块。传统的处理器需要大量的硬件资源,并且需要花费更多的时间进行乘法运算。本文提出了一种基于古代流行的吠陀数学的高速乘法器。实现在数字电路上完成。吠陀乘法的实现方式与使用数字硬件的普通乘法相同。本文对8位、16位和32位相乘的相关乘法器进行了比较。8位和16位Urdhva算法比Nikhilam算法延迟提高50%,比Binary multiplier算法延迟提高100%。32位Nikhilam乘法器比Urdhva乘法器延迟提高52%,比二进制乘法器延迟提高16%。
{"title":"Performance analysis of vedic multiplication technique using FPGA","authors":"S. Chopade, Rama Mehta","doi":"10.1109/IBSS.2015.7456657","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456657","url":null,"abstract":"Today, it is necessary to increase the speed of multiplier as the need of high speed processors is increasing. Multiplier is a main block of any processor. Conventional processors need great hardware resources and take more time in multiplication operation. This paper present a high speed multiplier based on ancient popular Vedic Mathematics. Implementation is done on digital circuits. Vedic multiplication is accomplished in the same way as that of normal multiplier using digital hardware. In this paper a comparison of concerned multipliers in 8, 16 and 32 bits multiplications is performed. 8 bit and 16bit Urdhva algorithm shows 50% improvement in delay than that of Nikhilam, whereas 100% better than that of Binary multiplier. 32bit Nikhilam multiplier gives 52% improvement in delay than that of Urdhva multiplier and 16% better than that of binary multiplier.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121124049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A novel low power, high performance design technique for domino logic 一种新颖的低功耗、高性能的多米诺逻辑设计技术
Pub Date : 2015-09-01 DOI: 10.1109/IBSS.2015.7456636
Sunil Kavatkar, Girish Gidaye
Domino logic circuits are most often used in high performance designs such as microprocessors because of high speed and less area over the static logic. But these domino logics suffer from high power dissipation and low noise tolerance. In this paper the earlier proposed techniques to reduce power consumption of Domino logic such as Dual Threshold Voltage (DTV), Dual Threshold Voltage-Voltage Scaling (DTVS) and Stacked Transistor Dual Threshold Voltage (ST-DTV) are analyzed. A novel technique using Dual Threshold Voltage technique with Stacked Transistor only in pull-up path along with Voltage Scaling and Charge Sharing technique is proposed in this paper. The proposed technique gives smaller power dissipation with better Power Delay Product (PDP) compared to earlier power reduction techniques. The gate length biasing technique can be used to further reduce the leakage power. The impact of gate length biasing on the proposed design is shown in the later part of the paper. The proposed design is simulated using 3 input OR gate at 28 nm bulk CMOS technology. The simulations are performed with Mentor Graphics ELDO 13.2 and EZ-wave simulators.
Domino逻辑电路最常用于高性能设计(如微处理器),因为它速度快,占用静态逻辑的面积少。但这些多米诺骨牌逻辑存在高功耗和低噪声容忍度的问题。本文分析了先前提出的降低Domino逻辑功耗的技术,如双阈值电压(DTV)、双阈值电压-电压缩放(DTV)和堆叠晶体管双阈值电压(ST-DTV)。本文提出了一种利用双阈值电压技术与电压缩放和电荷共享技术在上拉路径上叠加晶体管的新技术。与早期的功耗降低技术相比,该技术具有更小的功耗和更好的功率延迟积(PDP)。栅极长度偏置技术可以进一步降低泄漏功率。栅极长度偏置对所提出的设计的影响将在本文的后半部分显示。采用3输入OR门的28纳米块体CMOS技术对所提出的设计进行了仿真。使用Mentor Graphics ELDO 13.2和EZ-wave模拟器进行仿真。
{"title":"A novel low power, high performance design technique for domino logic","authors":"Sunil Kavatkar, Girish Gidaye","doi":"10.1109/IBSS.2015.7456636","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456636","url":null,"abstract":"Domino logic circuits are most often used in high performance designs such as microprocessors because of high speed and less area over the static logic. But these domino logics suffer from high power dissipation and low noise tolerance. In this paper the earlier proposed techniques to reduce power consumption of Domino logic such as Dual Threshold Voltage (DTV), Dual Threshold Voltage-Voltage Scaling (DTVS) and Stacked Transistor Dual Threshold Voltage (ST-DTV) are analyzed. A novel technique using Dual Threshold Voltage technique with Stacked Transistor only in pull-up path along with Voltage Scaling and Charge Sharing technique is proposed in this paper. The proposed technique gives smaller power dissipation with better Power Delay Product (PDP) compared to earlier power reduction techniques. The gate length biasing technique can be used to further reduce the leakage power. The impact of gate length biasing on the proposed design is shown in the later part of the paper. The proposed design is simulated using 3 input OR gate at 28 nm bulk CMOS technology. The simulations are performed with Mentor Graphics ELDO 13.2 and EZ-wave simulators.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124623733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Impact analysis of preventing cross site scripting and SQL injection attacks on web application 防止跨站脚本和SQL注入攻击对web应用程序的影响分析
Pub Date : 2015-09-01 DOI: 10.1109/IBSS.2015.7456668
Rathod Mahesh Pandurang, D. Karia
Web applications provide immeasurable large facilities to the users. The usability and popularity of web applications have expanded. This has caused various types of attacks over them. SQL injection and XSS (Cross Site Scripting) attacks are very famous to exploit the web applications. To sneak into the web application database, one can use SQL injection attack that may cause database alteration or imparting vital details while XSS is one more threat in which malicious user tricks the input data given that may steer to the modification in webpage viewing or redirection of user to attacker's working space. The proposed Intrusion Detection System is a container based approach that is based on a mapping model. In this, a request to query mapping is applied to recognise and prevent such class of attacks. The container based approach to identify two different client requests have been used. The impact measurement of this container based approach on the web server is calculated using http_load and autobench tool. The web application performance measurement based on various parameters such as average page time, pages per second, memory and processing time for container based approach has been carried out and compared with the existing approach.
Web应用程序为用户提供了不可估量的大型设施。web应用程序的可用性和受欢迎程度已经扩大。这导致了对他们的各种类型的攻击。SQL注入和XSS(跨站脚本)攻击是利用web应用程序的著名攻击。为了潜入web应用程序数据库,可以使用SQL注入攻击,这可能导致数据库更改或传递重要细节,而XSS是另一种威胁,恶意用户欺骗输入数据,可能导致网页查看的修改或用户重定向到攻击者的工作空间。本文提出的入侵检测系统是一种基于映射模型的基于容器的方法。在这种情况下,应用查询映射请求来识别和防止此类攻击。使用了基于容器的方法来识别两个不同的客户机请求。使用http_load和autobench工具计算了这种基于容器的方法对web服务器的影响。对基于容器的方法进行了基于平均页面时间、每秒页面数、内存和处理时间等参数的web应用程序性能度量,并与现有方法进行了比较。
{"title":"Impact analysis of preventing cross site scripting and SQL injection attacks on web application","authors":"Rathod Mahesh Pandurang, D. Karia","doi":"10.1109/IBSS.2015.7456668","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456668","url":null,"abstract":"Web applications provide immeasurable large facilities to the users. The usability and popularity of web applications have expanded. This has caused various types of attacks over them. SQL injection and XSS (Cross Site Scripting) attacks are very famous to exploit the web applications. To sneak into the web application database, one can use SQL injection attack that may cause database alteration or imparting vital details while XSS is one more threat in which malicious user tricks the input data given that may steer to the modification in webpage viewing or redirection of user to attacker's working space. The proposed Intrusion Detection System is a container based approach that is based on a mapping model. In this, a request to query mapping is applied to recognise and prevent such class of attacks. The container based approach to identify two different client requests have been used. The impact measurement of this container based approach on the web server is calculated using http_load and autobench tool. The web application performance measurement based on various parameters such as average page time, pages per second, memory and processing time for container based approach has been carried out and compared with the existing approach.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117090635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A leader based intrusion detection system for preventing intruder in heterogeneous wireless sensor network 针对异构无线传感器网络中入侵防御问题,提出了一种基于引线的入侵检测系统
Pub Date : 2015-09-01 DOI: 10.1109/IBSS.2015.7456671
D. Rajkumar, R. Vayanaperumal
Nowadays communication and data transmission among various heterogeneous networks is growing speedily and drastically. More number of heterogeneous networks are created and deployed by government as well as by private firms. Due to the distance, mobility, behavior of nodes in the networks and dynamic in nature, it is essential to provide security for all the networks separately or distributed. Various existing approaches discuss about the security issues and challenges for heterogeneous networks. In this paper a Leader Based Intrusion Detection System [LBIDS] is proposed to detect and prevent DOS as well as other attacks such as Sybil and Sinkhole in the networks by deploying the Leader Based Intrusion Detection System into access points in the networks. The proposed approach utilizes three core security challenges such as Authentication, positive incentive provision and preventing DOS. In addition to that it will do packet verification and IP verification for improving the efficiency in terms of detection and prevention against attacks in heterogeneous networks. The simulation of our proposed approach is carried out in NS2 software and the results were given.
目前,各种异构网络之间的通信和数据传输正在迅猛增长。越来越多的异构网络由政府和私人公司创建和部署。由于网络中节点的距离、移动性、行为和动态性,为所有网络单独或分布式地提供安全保障至关重要。现有的各种方法讨论了异构网络的安全问题和挑战。本文提出了一种基于Leader的入侵检测系统(LBIDS),通过在网络接入点部署基于Leader的入侵检测系统来检测和预防DOS以及Sybil和Sinkhole等网络攻击。该方法利用了认证、积极激励和防止DOS这三个核心安全挑战。此外,它还将进行数据包验证和IP验证,以提高异构网络中检测和防御攻击的效率。在NS2软件中对该方法进行了仿真,并给出了仿真结果。
{"title":"A leader based intrusion detection system for preventing intruder in heterogeneous wireless sensor network","authors":"D. Rajkumar, R. Vayanaperumal","doi":"10.1109/IBSS.2015.7456671","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456671","url":null,"abstract":"Nowadays communication and data transmission among various heterogeneous networks is growing speedily and drastically. More number of heterogeneous networks are created and deployed by government as well as by private firms. Due to the distance, mobility, behavior of nodes in the networks and dynamic in nature, it is essential to provide security for all the networks separately or distributed. Various existing approaches discuss about the security issues and challenges for heterogeneous networks. In this paper a Leader Based Intrusion Detection System [LBIDS] is proposed to detect and prevent DOS as well as other attacks such as Sybil and Sinkhole in the networks by deploying the Leader Based Intrusion Detection System into access points in the networks. The proposed approach utilizes three core security challenges such as Authentication, positive incentive provision and preventing DOS. In addition to that it will do packet verification and IP verification for improving the efficiency in terms of detection and prevention against attacks in heterogeneous networks. The simulation of our proposed approach is carried out in NS2 software and the results were given.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115692113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Selective review of fingerprint enhancement, classification and matching techniques 选择性回顾指纹增强,分类和匹配技术
Pub Date : 2015-09-01 DOI: 10.1109/IBSS.2015.7456656
S. Sandip, P. H. Zope
Dry and wet fingerprint degrades the performance of fingerprint verification system, There are various issues in dry and wet fingerprint verification, like fingerprint skin quality, missing features and minimizing the matching efforts. Therefore, it is important for a dry and wet fingerprint recognition system to enhance, classify and match the fingerprint. In this work, we reviewed selective approaches for fingerprint enhancement, classification and matching.
干湿指纹会降低指纹验证系统的性能,干湿指纹验证存在指纹皮肤质量、特征缺失和匹配工作量最小化等问题。因此,对指纹进行增强、分类和匹配是干湿指纹识别系统的重要组成部分。本文综述了指纹增强、分类和匹配的几种方法。
{"title":"Selective review of fingerprint enhancement, classification and matching techniques","authors":"S. Sandip, P. H. Zope","doi":"10.1109/IBSS.2015.7456656","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456656","url":null,"abstract":"Dry and wet fingerprint degrades the performance of fingerprint verification system, There are various issues in dry and wet fingerprint verification, like fingerprint skin quality, missing features and minimizing the matching efforts. Therefore, it is important for a dry and wet fingerprint recognition system to enhance, classify and match the fingerprint. In this work, we reviewed selective approaches for fingerprint enhancement, classification and matching.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125007519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Parallel architecture based fast algorithm for image enhancement 基于并行架构的快速图像增强算法
Pub Date : 2015-09-01 DOI: 10.1109/IBSS.2015.7456650
K. K. Singh, D. Kumar, Shubham Chauhan, M. Bajpai
Parallel algorithms is having wide application in the field of image processing. This paper encompasses a new approach based on parallel (multi-processor) based programming for image enhancement. Chebyshev polynomial based fractional order differentiator has been used for enhancement purpose. It has been found that the use of parallel approach speeds up the enhancement process with respect to serial approach. The proposed algorithm has been tested on different clusters. To validate the applicability, proposed algorithm has been applied for three test cases. The effect of order of differentiation on speed of enhancement process has also been shown in experiments.
并行算法在图像处理领域有着广泛的应用。本文提出了一种基于并行(多处理器)编程的图像增强新方法。基于切比雪夫多项式的分数阶微分器被用于增强目的。研究发现,相对于串行方法,使用并行方法可以加快增强过程。该算法已在不同的聚类上进行了测试。为了验证该算法的适用性,本文对三个测试用例进行了应用。实验也证明了微分阶数对增强过程速度的影响。
{"title":"Parallel architecture based fast algorithm for image enhancement","authors":"K. K. Singh, D. Kumar, Shubham Chauhan, M. Bajpai","doi":"10.1109/IBSS.2015.7456650","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456650","url":null,"abstract":"Parallel algorithms is having wide application in the field of image processing. This paper encompasses a new approach based on parallel (multi-processor) based programming for image enhancement. Chebyshev polynomial based fractional order differentiator has been used for enhancement purpose. It has been found that the use of parallel approach speeds up the enhancement process with respect to serial approach. The proposed algorithm has been tested on different clusters. To validate the applicability, proposed algorithm has been applied for three test cases. The effect of order of differentiation on speed of enhancement process has also been shown in experiments.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124108041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wave propagation model for wireless communication in underground mines 井下无线通信的波传播模型
Pub Date : 2015-09-01 DOI: 10.1109/IBSS.2015.7456655
A. Ranjan, H. B. Sahu, P. Misra
Characteristics of Electromagnetic (EM) waves in underground mines are different from those of typical wireless channels because of the features of the underground mines. For reliable wireless communication in underground mines, an accurate channel model is crucial. In this work, an enhanced hybrid channel model is proposed with loss due to surface roughness for mine tunnel roadways based on the concept of multimode wave propagation. Based on the proposed model, we then analyzed the radio signal behaviour considering the significant parameters operating frequency, mine tunnel size, antenna gain, and transmitter and receiver position.
由于地下矿井自身的特点,地下矿井的电磁波特性不同于典型的无线信道。为了实现可靠的井下无线通信,精确的信道模型至关重要。本文基于多模态波传播的概念,提出了一种考虑表面粗糙度损失的矿井巷道混合通道增强模型。在此基础上,考虑工作频率、巷道尺寸、天线增益、发射机和接收机位置等重要参数,分析了无线电信号的特性。
{"title":"Wave propagation model for wireless communication in underground mines","authors":"A. Ranjan, H. B. Sahu, P. Misra","doi":"10.1109/IBSS.2015.7456655","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456655","url":null,"abstract":"Characteristics of Electromagnetic (EM) waves in underground mines are different from those of typical wireless channels because of the features of the underground mines. For reliable wireless communication in underground mines, an accurate channel model is crucial. In this work, an enhanced hybrid channel model is proposed with loss due to surface roughness for mine tunnel roadways based on the concept of multimode wave propagation. Based on the proposed model, we then analyzed the radio signal behaviour considering the significant parameters operating frequency, mine tunnel size, antenna gain, and transmitter and receiver position.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126159203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cryptographic techniques for wireless sensor networks: A survey 无线传感器网络的加密技术:综述
Pub Date : 2015-09-01 DOI: 10.1109/IBSS.2015.7456652
Aiman Faquih, Priya U. Kadam, Zia U H. Saquib
The world is approaching towards more promising application of wireless communication and electronics has enabled the development of low-cost sensor networks. Wireless Sensor Networks (WSNs) has vast range of applications but as the sensor network becomes more complex, security of these WSN becomes even more important. WSN faces major security threats due to deployment of sensors in remote area and its geographical distributions. This has led the researchers to explore solution in this emerging area. In this paper, key aspect for the WSN security is discussed. Various cryptography techniques are studied such as symmetric key and public key which further contains Elliptic Curve Cryptography (ECC), Pair based Cryptography (PBC) and Identity Based Cryptography (IBC).
世界正在接近更有前途的应用无线通信和电子已经使低成本传感器网络的发展。无线传感器网络(WSNs)有着广泛的应用,但随着传感器网络的日益复杂,其安全性变得更加重要。由于传感器在偏远地区的部署和地理分布,无线传感器网络面临着重大的安全威胁。这促使研究人员在这一新兴领域探索解决方案。本文讨论了无线传感器网络安全的关键问题。研究了对称密钥和公钥等各种加密技术,进一步包括椭圆曲线加密(ECC)、基于对的加密(PBC)和基于身份的加密(IBC)。
{"title":"Cryptographic techniques for wireless sensor networks: A survey","authors":"Aiman Faquih, Priya U. Kadam, Zia U H. Saquib","doi":"10.1109/IBSS.2015.7456652","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456652","url":null,"abstract":"The world is approaching towards more promising application of wireless communication and electronics has enabled the development of low-cost sensor networks. Wireless Sensor Networks (WSNs) has vast range of applications but as the sensor network becomes more complex, security of these WSN becomes even more important. WSN faces major security threats due to deployment of sensors in remote area and its geographical distributions. This has led the researchers to explore solution in this emerging area. In this paper, key aspect for the WSN security is discussed. Various cryptography techniques are studied such as symmetric key and public key which further contains Elliptic Curve Cryptography (ECC), Pair based Cryptography (PBC) and Identity Based Cryptography (IBC).","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127161923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Optimized data migration within OpenStack cloud 优化OpenStack云内的数据迁移
Pub Date : 2015-09-01 DOI: 10.1109/IBSS.2015.7456626
R. Vaidya, Sumedh N. Pundkar
Cloud computing is a collection of computing resources provided with the help of Internet. Cloud has various benefits such as broad area network access; cost reduction, ease of use, time saving, on-demand delivery of its services and all device support which has Internet connection. However, data migration within clouds is a challenging task. This paper proposes a migration approach that provides a secure and optimized way to handling data in large (MB or GB) amount. Compression reduces the total size of a file upto 30-50 percent, which results into efficient statistics and enhanced performance. Encryption results into data confidentiality and data integrity. Thus, this system deals with optimized data Migration and Data Security.
云计算是借助互联网提供的计算资源的集合。云有各种各样的好处,比如广域网接入;降低成本,易于使用,节省时间,按需提供服务,并支持所有具有互联网连接的设备。然而,云中的数据迁移是一项具有挑战性的任务。本文提出了一种迁移方法,为处理大数据量(MB或GB)提供了一种安全且优化的方法。压缩可以将文件的总大小减少30- 50%,从而产生高效的统计数据和增强的性能。加密可以保证数据的机密性和完整性。因此,该系统解决了优化的数据迁移和数据安全问题。
{"title":"Optimized data migration within OpenStack cloud","authors":"R. Vaidya, Sumedh N. Pundkar","doi":"10.1109/IBSS.2015.7456626","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456626","url":null,"abstract":"Cloud computing is a collection of computing resources provided with the help of Internet. Cloud has various benefits such as broad area network access; cost reduction, ease of use, time saving, on-demand delivery of its services and all device support which has Internet connection. However, data migration within clouds is a challenging task. This paper proposes a migration approach that provides a secure and optimized way to handling data in large (MB or GB) amount. Compression reduces the total size of a file upto 30-50 percent, which results into efficient statistics and enhanced performance. Encryption results into data confidentiality and data integrity. Thus, this system deals with optimized data Migration and Data Security.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133740199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distributed data management in energy sector using Hadoop 基于Hadoop的能源行业分布式数据管理
Pub Date : 2015-09-01 DOI: 10.1109/IBSS.2015.7456653
M. Vaidya, Shrinivas P. Deshpande
Eefficient use of energy is the need of an hour. Improving energy efficiency requires understanding of the usage patterns and practices. The outage is a wakeup call to modernize the infrastructure in the country to the collapse of the grids that knocked out power. When started analyzing on industry estimates, came to know that nearly 30 percent of the power generated in India is wasted in transmission and distribution primarily because of leakages and theft. There are certain mechanisms which have been used like legacy power distribution systems, SCADA etc. But Smart Metering technology is the one which is growing and in some years time will be seen implemented all over India. This is a review done to make load analysis of the power distribution to the customers on some such technologies to avoid sustained outages by analyzing momentary outage data and power theft using Hadoop MapReduce.
有效利用能量是一小时的需要。提高能源效率需要了解使用模式和实践。这次停电是对该国基础设施现代化的警钟,因为电网崩溃了。当开始分析行业估计时,我知道印度近30%的电力浪费在输电和配电上,主要是因为泄漏和盗窃。有一些机制已经被使用,比如传统的配电系统,SCADA等。但智能电表技术正在发展,几年后将在印度各地实施。这是一项审查,通过使用Hadoop MapReduce分析瞬间停电数据和电力盗窃,对一些此类技术的客户配电进行负载分析,以避免持续停电。
{"title":"Distributed data management in energy sector using Hadoop","authors":"M. Vaidya, Shrinivas P. Deshpande","doi":"10.1109/IBSS.2015.7456653","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456653","url":null,"abstract":"Eefficient use of energy is the need of an hour. Improving energy efficiency requires understanding of the usage patterns and practices. The outage is a wakeup call to modernize the infrastructure in the country to the collapse of the grids that knocked out power. When started analyzing on industry estimates, came to know that nearly 30 percent of the power generated in India is wasted in transmission and distribution primarily because of leakages and theft. There are certain mechanisms which have been used like legacy power distribution systems, SCADA etc. But Smart Metering technology is the one which is growing and in some years time will be seen implemented all over India. This is a review done to make load analysis of the power distribution to the customers on some such technologies to avoid sustained outages by analyzing momentary outage data and power theft using Hadoop MapReduce.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132605852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2015 IEEE Bombay Section Symposium (IBSS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1