Pub Date : 2022-12-08DOI: 10.1109/IBSSC56953.2022.10037480
Sunita Jahirabadkar, Punam Pande, A. R
Space debris is the nonfunctional objects revolving in the outer earth orbit. The high-speed debris projecting to Kessler's syndrome is a threat to active satellites. Rigorous attempts are being made for the efficient detection of the debris for safeguarding existing functional satellites. Among them, image processing methods prove beneficial for the detection of space debris in orbit. The image captured from the satellite is in the form of visible images and thermal images. The survey is conducted on various image processing techniques for space debris detection based on ground-based tracking, satellite-based, simulation-based, and fusion-based detection. The features of debris detected by the various methods are thoroughly reviewed. The study enhances the importance of the fusion of the features of visible and thermal images provided with Deep Neural Networks (DNN). The fusion-based method provides an efficient solution to detect debris in both sunlit and non-sunlit areas from the satellite.
{"title":"A Survey on Image Processing based Techniques for Space Debris Detection","authors":"Sunita Jahirabadkar, Punam Pande, A. R","doi":"10.1109/IBSSC56953.2022.10037480","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037480","url":null,"abstract":"Space debris is the nonfunctional objects revolving in the outer earth orbit. The high-speed debris projecting to Kessler's syndrome is a threat to active satellites. Rigorous attempts are being made for the efficient detection of the debris for safeguarding existing functional satellites. Among them, image processing methods prove beneficial for the detection of space debris in orbit. The image captured from the satellite is in the form of visible images and thermal images. The survey is conducted on various image processing techniques for space debris detection based on ground-based tracking, satellite-based, simulation-based, and fusion-based detection. The features of debris detected by the various methods are thoroughly reviewed. The study enhances the importance of the fusion of the features of visible and thermal images provided with Deep Neural Networks (DNN). The fusion-based method provides an efficient solution to detect debris in both sunlit and non-sunlit areas from the satellite.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116945740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-08DOI: 10.1109/IBSSC56953.2022.10037400
S. D, Bhaskar Kataria, Aditya Sohoni, M. Tahiliani
Large number of new devices connecting to the Internet has overwhelmed the available IPv4 address space. With devices that are IPv6 enabled, there is a need to translate their addresses to IPv4 so that they can communicate with servers that use IPv4. Network Address Translation (NAT) solves this problem by mapping IPv6 addresses to IPv4 and performing the translation at the router between the IPv4-enabled client and IPv6-enabled server. This is called NAT64. NAT is currently used by most of the Internet Service Providers (ISPs) around the world. However, most of the existing implementations involve a lot of kernel overhead. eXpress Data Path (XDP) is a relatively new concept that lets packets be processed faster than the normal network stack. It requires a modification to the kernel and allows packets to move through an integrated fast path in the kernel stack. XDP-NAT is being treated as a feasible alternative to the traditional NAT implementations, owing to its advantages such as low processing overhead and easy implementation. This work focuses on using the packet processing capabilities of XDP to perform address translation. This paper describes the design and a proof-of-concept implementation of NAT64 using XDP.
大量的新设备连接到互联网,使可用的IPv4地址空间不堪重负。对于启用IPv6的设备,需要将其地址转换为IPv4,以便它们可以与使用IPv4的服务器通信。NAT (Network Address Translation)解决了这个问题,它将IPv6地址映射到IPv4,并在启用IPv4的客户端和启用IPv6的服务器之间的路由器上进行转换。这叫做NAT64。NAT目前被世界上大多数的互联网服务提供商(isp)所使用。然而,大多数现有的实现都涉及到大量的内核开销。eXpress Data Path (XDP)是一个相对较新的概念,它可以比普通网络栈更快地处理数据包。它需要对内核进行修改,并允许数据包通过内核堆栈中的集成快速路径移动。由于XDP-NAT具有处理开销低、易于实现等优点,它被视为传统NAT实现的可行替代方案。这项工作的重点是使用XDP的数据包处理能力来执行地址转换。本文描述了使用XDP的NAT64的设计和概念验证实现。
{"title":"Implementation of NAT44 and NAT64 using TC-BPF and eXpress Data Path (XDP)","authors":"S. D, Bhaskar Kataria, Aditya Sohoni, M. Tahiliani","doi":"10.1109/IBSSC56953.2022.10037400","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037400","url":null,"abstract":"Large number of new devices connecting to the Internet has overwhelmed the available IPv4 address space. With devices that are IPv6 enabled, there is a need to translate their addresses to IPv4 so that they can communicate with servers that use IPv4. Network Address Translation (NAT) solves this problem by mapping IPv6 addresses to IPv4 and performing the translation at the router between the IPv4-enabled client and IPv6-enabled server. This is called NAT64. NAT is currently used by most of the Internet Service Providers (ISPs) around the world. However, most of the existing implementations involve a lot of kernel overhead. eXpress Data Path (XDP) is a relatively new concept that lets packets be processed faster than the normal network stack. It requires a modification to the kernel and allows packets to move through an integrated fast path in the kernel stack. XDP-NAT is being treated as a feasible alternative to the traditional NAT implementations, owing to its advantages such as low processing overhead and easy implementation. This work focuses on using the packet processing capabilities of XDP to perform address translation. This paper describes the design and a proof-of-concept implementation of NAT64 using XDP.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127709587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-08DOI: 10.1109/IBSSC56953.2022.10037540
Omdeep Gokhool, S. Nagowah
The practice of requirement engineering has been used for several years in software development. The process of requirements engineering can be broken down into four stages namely elicitation, analysis and negotiation, specification, and validation. Because requirements engineering varies from organization to organization, it may be difficult for project managers to adopt the correct usage of the various stages of a project. Moving towards digital transformation, many organizations are moving towards electronic document management system (EDMS). EDMS has become a substantial tool in many organizations, when it comes to integrated data gathering and sharing. Nevertheless, requirement engineering for implementing EDMS projects should be carefully done to avoid project failure or poor-quality software. This paper thus presents a framework for requirement gathering for EDMS to promote successful implementation using a hybrid approach. The framework has been evaluated in a well-known company in Mauritius and results have been presented in the paper.
{"title":"A Requirement Gathering Framework for Electronic Document Management Systems","authors":"Omdeep Gokhool, S. Nagowah","doi":"10.1109/IBSSC56953.2022.10037540","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037540","url":null,"abstract":"The practice of requirement engineering has been used for several years in software development. The process of requirements engineering can be broken down into four stages namely elicitation, analysis and negotiation, specification, and validation. Because requirements engineering varies from organization to organization, it may be difficult for project managers to adopt the correct usage of the various stages of a project. Moving towards digital transformation, many organizations are moving towards electronic document management system (EDMS). EDMS has become a substantial tool in many organizations, when it comes to integrated data gathering and sharing. Nevertheless, requirement engineering for implementing EDMS projects should be carefully done to avoid project failure or poor-quality software. This paper thus presents a framework for requirement gathering for EDMS to promote successful implementation using a hybrid approach. The framework has been evaluated in a well-known company in Mauritius and results have been presented in the paper.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129211789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-08DOI: 10.1109/IBSSC56953.2022.10037385
Sandip Chakraborty, A. Ghosh, Anindan Mondal, B. Sen
Hardware Trojans (HT) are minuscule circuits embedded by an adversary for malicious purposes. Such circuits posses stealthy nature and can cause disruption upon activation. To detect the presence of such circuits, appropriate test vectors need to be applied. In this regard, the genetic algorithm (GA) seems to be the most promising technique due to its exploration capability. However, like most of the existing techniques, GA also suffers from exploring the huge search space. In this article a GA based methodology is proposed incorporating the information about potential inputs into it. Experimental results analysis signifies that the identification of the relevant inputs for GA provides an optimal solution. The significance of proposed methodology is endorsed by applying the proposed GA technique on different ISCAS '85 benchmark circuits. A noteworthy improvement on run time is observed while simultaneously providing improved test set quality than the state-of-the art technique.
{"title":"Test Pattern generation for detection of Hardware Trojans based on improved Genetic Algorithm","authors":"Sandip Chakraborty, A. Ghosh, Anindan Mondal, B. Sen","doi":"10.1109/IBSSC56953.2022.10037385","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037385","url":null,"abstract":"Hardware Trojans (HT) are minuscule circuits embedded by an adversary for malicious purposes. Such circuits posses stealthy nature and can cause disruption upon activation. To detect the presence of such circuits, appropriate test vectors need to be applied. In this regard, the genetic algorithm (GA) seems to be the most promising technique due to its exploration capability. However, like most of the existing techniques, GA also suffers from exploring the huge search space. In this article a GA based methodology is proposed incorporating the information about potential inputs into it. Experimental results analysis signifies that the identification of the relevant inputs for GA provides an optimal solution. The significance of proposed methodology is endorsed by applying the proposed GA technique on different ISCAS '85 benchmark circuits. A noteworthy improvement on run time is observed while simultaneously providing improved test set quality than the state-of-the art technique.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133220899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}