Pub Date : 2015-09-01DOI: 10.1109/IBSS.2015.7456657
S. Chopade, Rama Mehta
Today, it is necessary to increase the speed of multiplier as the need of high speed processors is increasing. Multiplier is a main block of any processor. Conventional processors need great hardware resources and take more time in multiplication operation. This paper present a high speed multiplier based on ancient popular Vedic Mathematics. Implementation is done on digital circuits. Vedic multiplication is accomplished in the same way as that of normal multiplier using digital hardware. In this paper a comparison of concerned multipliers in 8, 16 and 32 bits multiplications is performed. 8 bit and 16bit Urdhva algorithm shows 50% improvement in delay than that of Nikhilam, whereas 100% better than that of Binary multiplier. 32bit Nikhilam multiplier gives 52% improvement in delay than that of Urdhva multiplier and 16% better than that of binary multiplier.
{"title":"Performance analysis of vedic multiplication technique using FPGA","authors":"S. Chopade, Rama Mehta","doi":"10.1109/IBSS.2015.7456657","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456657","url":null,"abstract":"Today, it is necessary to increase the speed of multiplier as the need of high speed processors is increasing. Multiplier is a main block of any processor. Conventional processors need great hardware resources and take more time in multiplication operation. This paper present a high speed multiplier based on ancient popular Vedic Mathematics. Implementation is done on digital circuits. Vedic multiplication is accomplished in the same way as that of normal multiplier using digital hardware. In this paper a comparison of concerned multipliers in 8, 16 and 32 bits multiplications is performed. 8 bit and 16bit Urdhva algorithm shows 50% improvement in delay than that of Nikhilam, whereas 100% better than that of Binary multiplier. 32bit Nikhilam multiplier gives 52% improvement in delay than that of Urdhva multiplier and 16% better than that of binary multiplier.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121124049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-01DOI: 10.1109/IBSS.2015.7456636
Sunil Kavatkar, Girish Gidaye
Domino logic circuits are most often used in high performance designs such as microprocessors because of high speed and less area over the static logic. But these domino logics suffer from high power dissipation and low noise tolerance. In this paper the earlier proposed techniques to reduce power consumption of Domino logic such as Dual Threshold Voltage (DTV), Dual Threshold Voltage-Voltage Scaling (DTVS) and Stacked Transistor Dual Threshold Voltage (ST-DTV) are analyzed. A novel technique using Dual Threshold Voltage technique with Stacked Transistor only in pull-up path along with Voltage Scaling and Charge Sharing technique is proposed in this paper. The proposed technique gives smaller power dissipation with better Power Delay Product (PDP) compared to earlier power reduction techniques. The gate length biasing technique can be used to further reduce the leakage power. The impact of gate length biasing on the proposed design is shown in the later part of the paper. The proposed design is simulated using 3 input OR gate at 28 nm bulk CMOS technology. The simulations are performed with Mentor Graphics ELDO 13.2 and EZ-wave simulators.
{"title":"A novel low power, high performance design technique for domino logic","authors":"Sunil Kavatkar, Girish Gidaye","doi":"10.1109/IBSS.2015.7456636","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456636","url":null,"abstract":"Domino logic circuits are most often used in high performance designs such as microprocessors because of high speed and less area over the static logic. But these domino logics suffer from high power dissipation and low noise tolerance. In this paper the earlier proposed techniques to reduce power consumption of Domino logic such as Dual Threshold Voltage (DTV), Dual Threshold Voltage-Voltage Scaling (DTVS) and Stacked Transistor Dual Threshold Voltage (ST-DTV) are analyzed. A novel technique using Dual Threshold Voltage technique with Stacked Transistor only in pull-up path along with Voltage Scaling and Charge Sharing technique is proposed in this paper. The proposed technique gives smaller power dissipation with better Power Delay Product (PDP) compared to earlier power reduction techniques. The gate length biasing technique can be used to further reduce the leakage power. The impact of gate length biasing on the proposed design is shown in the later part of the paper. The proposed design is simulated using 3 input OR gate at 28 nm bulk CMOS technology. The simulations are performed with Mentor Graphics ELDO 13.2 and EZ-wave simulators.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124623733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-01DOI: 10.1109/IBSS.2015.7456668
Rathod Mahesh Pandurang, D. Karia
Web applications provide immeasurable large facilities to the users. The usability and popularity of web applications have expanded. This has caused various types of attacks over them. SQL injection and XSS (Cross Site Scripting) attacks are very famous to exploit the web applications. To sneak into the web application database, one can use SQL injection attack that may cause database alteration or imparting vital details while XSS is one more threat in which malicious user tricks the input data given that may steer to the modification in webpage viewing or redirection of user to attacker's working space. The proposed Intrusion Detection System is a container based approach that is based on a mapping model. In this, a request to query mapping is applied to recognise and prevent such class of attacks. The container based approach to identify two different client requests have been used. The impact measurement of this container based approach on the web server is calculated using http_load and autobench tool. The web application performance measurement based on various parameters such as average page time, pages per second, memory and processing time for container based approach has been carried out and compared with the existing approach.
{"title":"Impact analysis of preventing cross site scripting and SQL injection attacks on web application","authors":"Rathod Mahesh Pandurang, D. Karia","doi":"10.1109/IBSS.2015.7456668","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456668","url":null,"abstract":"Web applications provide immeasurable large facilities to the users. The usability and popularity of web applications have expanded. This has caused various types of attacks over them. SQL injection and XSS (Cross Site Scripting) attacks are very famous to exploit the web applications. To sneak into the web application database, one can use SQL injection attack that may cause database alteration or imparting vital details while XSS is one more threat in which malicious user tricks the input data given that may steer to the modification in webpage viewing or redirection of user to attacker's working space. The proposed Intrusion Detection System is a container based approach that is based on a mapping model. In this, a request to query mapping is applied to recognise and prevent such class of attacks. The container based approach to identify two different client requests have been used. The impact measurement of this container based approach on the web server is calculated using http_load and autobench tool. The web application performance measurement based on various parameters such as average page time, pages per second, memory and processing time for container based approach has been carried out and compared with the existing approach.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117090635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-01DOI: 10.1109/IBSS.2015.7456671
D. Rajkumar, R. Vayanaperumal
Nowadays communication and data transmission among various heterogeneous networks is growing speedily and drastically. More number of heterogeneous networks are created and deployed by government as well as by private firms. Due to the distance, mobility, behavior of nodes in the networks and dynamic in nature, it is essential to provide security for all the networks separately or distributed. Various existing approaches discuss about the security issues and challenges for heterogeneous networks. In this paper a Leader Based Intrusion Detection System [LBIDS] is proposed to detect and prevent DOS as well as other attacks such as Sybil and Sinkhole in the networks by deploying the Leader Based Intrusion Detection System into access points in the networks. The proposed approach utilizes three core security challenges such as Authentication, positive incentive provision and preventing DOS. In addition to that it will do packet verification and IP verification for improving the efficiency in terms of detection and prevention against attacks in heterogeneous networks. The simulation of our proposed approach is carried out in NS2 software and the results were given.
{"title":"A leader based intrusion detection system for preventing intruder in heterogeneous wireless sensor network","authors":"D. Rajkumar, R. Vayanaperumal","doi":"10.1109/IBSS.2015.7456671","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456671","url":null,"abstract":"Nowadays communication and data transmission among various heterogeneous networks is growing speedily and drastically. More number of heterogeneous networks are created and deployed by government as well as by private firms. Due to the distance, mobility, behavior of nodes in the networks and dynamic in nature, it is essential to provide security for all the networks separately or distributed. Various existing approaches discuss about the security issues and challenges for heterogeneous networks. In this paper a Leader Based Intrusion Detection System [LBIDS] is proposed to detect and prevent DOS as well as other attacks such as Sybil and Sinkhole in the networks by deploying the Leader Based Intrusion Detection System into access points in the networks. The proposed approach utilizes three core security challenges such as Authentication, positive incentive provision and preventing DOS. In addition to that it will do packet verification and IP verification for improving the efficiency in terms of detection and prevention against attacks in heterogeneous networks. The simulation of our proposed approach is carried out in NS2 software and the results were given.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115692113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-01DOI: 10.1109/IBSS.2015.7456656
S. Sandip, P. H. Zope
Dry and wet fingerprint degrades the performance of fingerprint verification system, There are various issues in dry and wet fingerprint verification, like fingerprint skin quality, missing features and minimizing the matching efforts. Therefore, it is important for a dry and wet fingerprint recognition system to enhance, classify and match the fingerprint. In this work, we reviewed selective approaches for fingerprint enhancement, classification and matching.
{"title":"Selective review of fingerprint enhancement, classification and matching techniques","authors":"S. Sandip, P. H. Zope","doi":"10.1109/IBSS.2015.7456656","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456656","url":null,"abstract":"Dry and wet fingerprint degrades the performance of fingerprint verification system, There are various issues in dry and wet fingerprint verification, like fingerprint skin quality, missing features and minimizing the matching efforts. Therefore, it is important for a dry and wet fingerprint recognition system to enhance, classify and match the fingerprint. In this work, we reviewed selective approaches for fingerprint enhancement, classification and matching.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125007519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-01DOI: 10.1109/IBSS.2015.7456650
K. K. Singh, D. Kumar, Shubham Chauhan, M. Bajpai
Parallel algorithms is having wide application in the field of image processing. This paper encompasses a new approach based on parallel (multi-processor) based programming for image enhancement. Chebyshev polynomial based fractional order differentiator has been used for enhancement purpose. It has been found that the use of parallel approach speeds up the enhancement process with respect to serial approach. The proposed algorithm has been tested on different clusters. To validate the applicability, proposed algorithm has been applied for three test cases. The effect of order of differentiation on speed of enhancement process has also been shown in experiments.
{"title":"Parallel architecture based fast algorithm for image enhancement","authors":"K. K. Singh, D. Kumar, Shubham Chauhan, M. Bajpai","doi":"10.1109/IBSS.2015.7456650","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456650","url":null,"abstract":"Parallel algorithms is having wide application in the field of image processing. This paper encompasses a new approach based on parallel (multi-processor) based programming for image enhancement. Chebyshev polynomial based fractional order differentiator has been used for enhancement purpose. It has been found that the use of parallel approach speeds up the enhancement process with respect to serial approach. The proposed algorithm has been tested on different clusters. To validate the applicability, proposed algorithm has been applied for three test cases. The effect of order of differentiation on speed of enhancement process has also been shown in experiments.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124108041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-01DOI: 10.1109/IBSS.2015.7456655
A. Ranjan, H. B. Sahu, P. Misra
Characteristics of Electromagnetic (EM) waves in underground mines are different from those of typical wireless channels because of the features of the underground mines. For reliable wireless communication in underground mines, an accurate channel model is crucial. In this work, an enhanced hybrid channel model is proposed with loss due to surface roughness for mine tunnel roadways based on the concept of multimode wave propagation. Based on the proposed model, we then analyzed the radio signal behaviour considering the significant parameters operating frequency, mine tunnel size, antenna gain, and transmitter and receiver position.
{"title":"Wave propagation model for wireless communication in underground mines","authors":"A. Ranjan, H. B. Sahu, P. Misra","doi":"10.1109/IBSS.2015.7456655","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456655","url":null,"abstract":"Characteristics of Electromagnetic (EM) waves in underground mines are different from those of typical wireless channels because of the features of the underground mines. For reliable wireless communication in underground mines, an accurate channel model is crucial. In this work, an enhanced hybrid channel model is proposed with loss due to surface roughness for mine tunnel roadways based on the concept of multimode wave propagation. Based on the proposed model, we then analyzed the radio signal behaviour considering the significant parameters operating frequency, mine tunnel size, antenna gain, and transmitter and receiver position.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126159203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-01DOI: 10.1109/IBSS.2015.7456652
Aiman Faquih, Priya U. Kadam, Zia U H. Saquib
The world is approaching towards more promising application of wireless communication and electronics has enabled the development of low-cost sensor networks. Wireless Sensor Networks (WSNs) has vast range of applications but as the sensor network becomes more complex, security of these WSN becomes even more important. WSN faces major security threats due to deployment of sensors in remote area and its geographical distributions. This has led the researchers to explore solution in this emerging area. In this paper, key aspect for the WSN security is discussed. Various cryptography techniques are studied such as symmetric key and public key which further contains Elliptic Curve Cryptography (ECC), Pair based Cryptography (PBC) and Identity Based Cryptography (IBC).
{"title":"Cryptographic techniques for wireless sensor networks: A survey","authors":"Aiman Faquih, Priya U. Kadam, Zia U H. Saquib","doi":"10.1109/IBSS.2015.7456652","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456652","url":null,"abstract":"The world is approaching towards more promising application of wireless communication and electronics has enabled the development of low-cost sensor networks. Wireless Sensor Networks (WSNs) has vast range of applications but as the sensor network becomes more complex, security of these WSN becomes even more important. WSN faces major security threats due to deployment of sensors in remote area and its geographical distributions. This has led the researchers to explore solution in this emerging area. In this paper, key aspect for the WSN security is discussed. Various cryptography techniques are studied such as symmetric key and public key which further contains Elliptic Curve Cryptography (ECC), Pair based Cryptography (PBC) and Identity Based Cryptography (IBC).","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127161923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-01DOI: 10.1109/IBSS.2015.7456626
R. Vaidya, Sumedh N. Pundkar
Cloud computing is a collection of computing resources provided with the help of Internet. Cloud has various benefits such as broad area network access; cost reduction, ease of use, time saving, on-demand delivery of its services and all device support which has Internet connection. However, data migration within clouds is a challenging task. This paper proposes a migration approach that provides a secure and optimized way to handling data in large (MB or GB) amount. Compression reduces the total size of a file upto 30-50 percent, which results into efficient statistics and enhanced performance. Encryption results into data confidentiality and data integrity. Thus, this system deals with optimized data Migration and Data Security.
{"title":"Optimized data migration within OpenStack cloud","authors":"R. Vaidya, Sumedh N. Pundkar","doi":"10.1109/IBSS.2015.7456626","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456626","url":null,"abstract":"Cloud computing is a collection of computing resources provided with the help of Internet. Cloud has various benefits such as broad area network access; cost reduction, ease of use, time saving, on-demand delivery of its services and all device support which has Internet connection. However, data migration within clouds is a challenging task. This paper proposes a migration approach that provides a secure and optimized way to handling data in large (MB or GB) amount. Compression reduces the total size of a file upto 30-50 percent, which results into efficient statistics and enhanced performance. Encryption results into data confidentiality and data integrity. Thus, this system deals with optimized data Migration and Data Security.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133740199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-01DOI: 10.1109/IBSS.2015.7456653
M. Vaidya, Shrinivas P. Deshpande
Eefficient use of energy is the need of an hour. Improving energy efficiency requires understanding of the usage patterns and practices. The outage is a wakeup call to modernize the infrastructure in the country to the collapse of the grids that knocked out power. When started analyzing on industry estimates, came to know that nearly 30 percent of the power generated in India is wasted in transmission and distribution primarily because of leakages and theft. There are certain mechanisms which have been used like legacy power distribution systems, SCADA etc. But Smart Metering technology is the one which is growing and in some years time will be seen implemented all over India. This is a review done to make load analysis of the power distribution to the customers on some such technologies to avoid sustained outages by analyzing momentary outage data and power theft using Hadoop MapReduce.
{"title":"Distributed data management in energy sector using Hadoop","authors":"M. Vaidya, Shrinivas P. Deshpande","doi":"10.1109/IBSS.2015.7456653","DOIUrl":"https://doi.org/10.1109/IBSS.2015.7456653","url":null,"abstract":"Eefficient use of energy is the need of an hour. Improving energy efficiency requires understanding of the usage patterns and practices. The outage is a wakeup call to modernize the infrastructure in the country to the collapse of the grids that knocked out power. When started analyzing on industry estimates, came to know that nearly 30 percent of the power generated in India is wasted in transmission and distribution primarily because of leakages and theft. There are certain mechanisms which have been used like legacy power distribution systems, SCADA etc. But Smart Metering technology is the one which is growing and in some years time will be seen implemented all over India. This is a review done to make load analysis of the power distribution to the customers on some such technologies to avoid sustained outages by analyzing momentary outage data and power theft using Hadoop MapReduce.","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132605852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}