High Gain, Wide Bandwidth and Optimal Swing op-amp in CMOS Technology
Research Paper | Journal Paper
Vol.2 , Issue.12 , pp.1-5, Dec-2014
Abstract
Nowadays, operational amplifiers (op-amps) are widely used in numerous advanced electronic systems. Most of op-amps need a high gain, wide bandwidth, and an optimal swing. However, meeting these requirements all at the same time has been a challenging problem for analogue circuits designers. For different systems, many various structures have been used, and each has improved one of features of the amplifier in some way. In the present study, attempted was made to reach the best conditions for gain, bandwidth, and swing through appropriate parametric models. Of course, it is considered that the rest of circuit conditions do not undergo undesirable changes and get the best values.
Key-Words / Index Term
CMOS Technology, op-amp, CMFB Circuit
References
[1] B. Razavi, Design of analog CMOS integrated circuits, New York: McGraw-Hill, 2000.
[2] M. Yavari, O. Shoaei and F. Svelto, “Hybrid cascode compensation for two-stage CMOS operational amplifiers,” in IEEE Int. Symp. On Circuits Syst. (ISCAS), pp. 1565-1568, May. 2005.
[3] S. Bu and K. N. Leung, “A 116-dB CMOS op amp with repetitive gain boosting and subthreshold operation,” in IEEE Electron Devices and Solid-State Circuits (EDSSC), pp. 1-2, June. 2013.
[4] T. Thongleam, S. Suwansawang and V. Kasensuwan, “Low-voltage high gain, high CMRR and rail-to-rail bulk-driven op-amp using feedforward technique,” in Int. Symp. On Commun. and Inf. Technol. (ISCIT), pp. 596-599, Sept. 2013.
[5] K. N. Abhilash, S. Bose and A. Gupta, “A high gain, high CMRR two-stage fully differential amplifier using gm/Id technique for bio-medical applications,” in IEEE Asia Pacific Conf. on Postgraduate Research in Microelectronics and Electron. (PrimeAsia), pp. 40-45, Dec. 2013.
[6] P. R. Gray, P. J. Hurst, S. H. Lewis and R. G. Meyer, Analysis and design of analog integrated circuits, 4th ed. New York, NY: Wiley, 2001.
[7] A. B. Grebene, Bipolar and MOS analog integrated circuit design, Wiley-Interscience, 2002.
[8] D. J. Comer, D. T. Comer, R. P. Singh, “A high gain, low power CMOS op amp using composite cascode stages,” in IEEE Int. Midwest Symp. On Circuits Syst. (MWSCAS), pp. 600-603, Aug. 2010.
[9] Y. Wang, H.-G. Yang, Z.-H. Ye, H. Zhang and F. Liu, “An improved high gain and wide bandwith operational amplifier for SHA circuits in a pipelined ADC,” in IEEE Int. Conf. on Solid-state and integr. Circuit Technol. (ICSICT), pp. 269-271, Nov. 2010.
Citation
Mohammad Emadi and Mohammad Bagher Tavakoli, "High Gain, Wide Bandwidth and Optimal Swing op-amp in CMOS Technology," International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.1-5, 2014.
Encryption Schemes for Securing Cloud-based PHR Systems
Research Paper | Journal Paper
Vol.2 , Issue.12 , pp.6-10, Dec-2014
Abstract
Presently, Personal Health Records are widely used by people not only to store their health details, but also to share their health information among doctors, friends, relatives, medical organizations etc. Health records are now stored and shared with the help of cloud services. The sensitive nature of these health records makes it vulnerable to attacks. To ensure privacy of health information, the best method is to encrypt it. In this paper, Attribute Based Encryption and its variants are studied so that they can be used for developing an efficient health record sharing scheme which is more flexible and scalable.
Key-Words / Index Term
Personal Health Record (PHR) ; Cloud Computing ; Attribute Based Encryption (ABE) ; MA-ABE ; Proactive MA-ABE; CA ;Data Privacy ; Fine-grained access control
References
[1] M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, “Secure Attribute Based Systems,” Journal of Computer Security, vol. 18, no. 5, pp. 799–837, 2010.
[2] V. Goyal, O.Pandey, A. Sahai, and B. Waters. “Attribute- Based Encryption for Fine-grained Access Control of Encrypted Data”, Proc. 13th ACM Conf. Computer and Comm. Security (CCS ’06), pp. 89-98, 2006.
[3] D.Boneh and M. Franklin. “Identity-Based Encryption from the Weil Pairing.” Proc. of CRYPTO’01, Santa Barbara, California, USA, 2001.
[4] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy Attribute Based encryption,” in IEEE S& P ’07, 2007, pp. 321- 334.
[5] Ramasamy S, Vahidhunnisha, ” Survey on Multi Authority Attribute Based Encryption for Personal Health Record in Cloud Computing”, International Journal of Latest Trends in Engineering and Technology, November 2013, pp.223- 229.
[6] Herzberg etc, “proactive secrete sharing(PSS),” in 1995
[7] Cheng-chir Lee, Pei-shan C,” A survey on ABE scheme of Access control in cloud environment, vol.15, no.4, July 2013, pp.231-240.
[8] Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao,”Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority,” INDOCRYPT, 2008, pp. 426-436.
[9] Neetha Xavier, “Security of PHR in cloud computing using ABE technique”, International Journal of Communication and Computer Technologies, volume 01-No.72 issue: 07, Nov 2013, pp. 265-269.
[10] S.Jahid, P.Mittal, N.Borisov,”Easier: Encryption- Based Access Control in Social Networks with Efficient Revocation,” Proc. ACMSynp. Information, Computer and Comm.Security, Mar 2011.
Citation
Shruthi Suresh , "Encryption Schemes for Securing Cloud-based PHR Systems," International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.6-10, 2014.
Scattered Scheduling Background with Relationship Grounded Assembling
Research Paper | Journal Paper
Vol.2 , Issue.12 , pp.11-16, Dec-2014
Abstract
Ranking the Test circumstances helps to upsurge the rate of error detection. The difficulty of ensuring the dependaptitude in the growth of the scale of Software and Software examination in scattered situation a sufficient Software examination procedure is not possible. It is often difficult to Test a parallel and scattered organization in the real world deployment. Hence in This paper, after generating Test circumstances using useful requirements, dependence arrangement ranking procedure is used to arrange the Test circumstances grounded on the useful arrangement of dependency. A new procedure namely Cosine resemblance grounded grouping method is used to collection the Test circumstances grounded on the resemblance values to form clusters. Each cluster is scattered in the scattered situation for parallel implementation in order to reduce the computation time and to recover the rate of error detection.
Key-Words / Index Term
Dependence Arrangement Prioritization, Software Testing
References
[1]. Ellenkamp, L.A. ; Metallurgical Laboratory, N. V. Philips'' Gloeilampenfabrieken, Eindhoven, Netherlands, “Recording Arrangement for Determining Temperature Dependence of Paramagnetic Susceptibility”, Published in: Review of Scientific Instruments (Volume:37 , Issue: 7 ) Page(s): 948 – 954
[2]. Fukusako, T. ; Grad. Sch. of Sci. & Technol., Kumamoto Univ., Kumamoto, Japan ; Tanogashira, Y., “Dependence of radiation pattern on dogbonepair arrangement installed on surface wave antenna”, Published in: Antennas and Propagation Society International Symposium (APSURSI), 2014 IEEE Date of Conference: 6-11 July 2014 Page(s): 1710 – 1711
[3]. Xu Nuo ; Sch. of Econ. & Manage., Beijing Jiaotong Univ., Beijing, China ; Liu Jia Qi “Sickbed Arrangements Optimization Based on Patients' Prioritization”, Published in:Management and Service Science (MASS), 2011 International Conference on Date of Conference: 12-14 Aug. 2011Page(s): 1 – 3
[4]. Yiji Zhang ; Univ. of Notre Dame, Notre Dame, IN, USA ; Santelices, R., “Predicting Data Dependences for Slice Inspection Prioritization”, Published in: Software Reliability Engineering Workshops (ISSREW), 2012 IEEE 23rd International Symposium on Date of Conference: 27-30 Nov. 2012 Page(s): 177 – 182.
[5]. Pavlin, Mojca ; Fac. of Electr. Eng., Ljubljana Univ., Slovenia ; Pavselj, N. ; Miklavcic, Damijan, “Dependence of induced transmembrane potential on cell density, arrangement, and cell position inside a cell system”, Published in: Biomedical Engineering, IEEE Transactions on (Volume:49 , Issue: 6 ) Page(s): 605 – 612.
[6]. Lin Chen ; State Key Lab. for Novel Software Technol., Nanjing Univ., Nanjing, China ; Ziyuan Wang ; Lei Xu ; Hongmin Lu more authors, “Test Case Prioritization for Web Service Regression Testing”, Published in: Service Oriented System Engineering (SOSE), 2010 Fifth IEEE International Symposium on Date of Conference: 4-5 June 2010 Page(s): 173 – 178.
[7]. Tsuru, S.; Dept. of Electr. & Electron. Syst. Eng., Kyushu Univ., Fukuoka, Japan ; Nakamura, M. ; Mine, T. ; Suehiro, J., “Partial discharge inception characteristics in artificial air-filled voids at room and liquid nitrogen temperatures” Published in: Electrical Insulation, 1998. Conference Record of the 1998 IEEE International Symposium on (Volume:1 ) Date of Conference: 7-10 Jun 1998 Page(s): 153 - 156 vol.1.
[8]. Schmidt, E. ; Inst. of Electr. Drives & Machines, Vienna Univ. of Technol., Vienna ; Hofer, M. “Inductances and forces of a three phase permanent magnet biased radial active magnetic bearing in dependence on the rotor eccentricity”, Published in: Electric Machines and Drives Conference, 2009. IEMDC '09. IEEE International Date of Conference: 3-6 May 2009 Page(s): 1788 – 1794.
[9]. Will, G. ; Brookhaven National Laboratory, Upton, New York ; Frazer, B.C. ; Shirane, G. ; Cox, D.E. “Cycloidal Spin Configuration of Orthorhombic MnSO4”, Published in: Journal of Applied Physics (Volume:36 , Issue: 3 ) Page(s):1095.
[10]. Frye, G.M. ; Case Institute of Technology Cleveland, Ohio ; Smith, L.H., “A Photographic Spark Chamber for Manned Satellites”, Published in: Nuclear Science, IEEE Transactions on (Volume:13 , Issue: 1 ) Page(s): 508 – 510.
[11]. Popov, A.P. ; Univ. of Technol., Lae, Papua New Guinea ; Milligan, T., “Amplitude aperture-distribution control in displaced-axis two-reflector antennas”, Published in: Antennas and Propagation Magazine, IEEE (Volume:39 , Issue: 6 ) Page(s): 58 – 63.
[12]. Zhitao He ; Sch. of Comput. Sci. & Technol., Beihang Univ., Beijing, China ; Haihua Yan ; Chao Liu ; Huacan He, “A Formal Definition of Software Testing Based on Fuzzy Measure”, Published in: Software Engineering (WCSE), 2013 Fourth World Congress on Date of Conference: 3-4 Dec. 2013 Page(s): 59 – 63.
[13]. Collofello, J. ; Dept. of Comput. Sci. & Eng., Arizona State Univ., Tempe, AZ ; Vehathiri, K., “An environment for training computer science students on software testing” Published in: Frontiers in Education, 2005. FIE '05. Proceedings 35th Annual Conference Date of Conference: 19-22 Oct. 2005 Page(s): T3E – 6.
[14]. Akingbehin, K. ; Dept. of Comput. & Inf. Sci., Univ. of Michigan-Dearborn, Dearborn, MI, “Towards Destructive Software Testing” Published in: Computer and Information Science, 2006 and 2006 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse. ICIS-COMSAR 2006. 5th IEEE/ACIS International Conference on Date of Conference: 10-12 July 2006 Page(s): 374 – 377.
[15]. Qing Zhou ; Sch. of Reliability & Syst. Eng., Beihang Univ., Beijing, China ; Bin Liu ; Zhengwei Yu ; Xiaoqi Xing, “The process of requirement analysis about military software system testing” Published in: Reliability, Maintainability and Safety (ICRMS), 2011 9th International Conference on Date of Conference: 12-15 June 2011 Page(s): 645 – 650.
[16]. Dhavachelvan, P. ; Dept. of Comput. Sci. & Eng., Anna Univ., Madras, India ; Uma, G.V., “Complexity measures for software systems : towards multi-agent based software testing”, Published in: Intelligent Sensing and Information Processing, 2005. Proceedings of 2005 International Conference on Date of Conference: 4-7 Jan. 2005 Page(s): 359 – 364.
[17]. Chin-Yu Huang ; Dept. of Electr. Eng., Nat. Taiwan Univ., Taipei, Taiwan ; Jung-Hua Lo ; Sy-Yen Kuo ; Lyu, M.R., “Software reliability modeling and cost estimation incorporating testing-effort and efficiency”, Published in: Software Reliability Engineering, 1999. Proceedings. 10th International Symposium on Date of Conference: 1999 Page(s): 62 – 72.
Citation
S.Bhuvana and M.V.Srinath, "Scattered Scheduling Background with Relationship Grounded Assembling," International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.11-16, 2014.
An Online Recommender Agent for Boosting the Confidence of an e-learner
Research Paper | Journal Paper
Vol.2 , Issue.12 , pp.17-20, Dec-2014
Abstract
In online learning environment learners often face different types of problem due to physical absence of teacher. One of the major problems is losing the self-confidence in e-learning environment. In this paper an online recommender agent is proposed for boosting the confidence of e-learner. The designed and developed system has the ability to predict the level of confidence as well as knowledge of an e-learner through some evaluation procedure. According to the various levels of confidence and knowledge, system will provide several recommendations with the intention to enhance the confidence of the e-learner. A prototype has been developed based on the proposed system and applied on some students from eleven grade of CBSE board, India. The response obtained indicates that the system is able to raise the confidence of e-learner.
Key-Words / Index Term
Confidence Based Learning; Online Recommender Agent; E-Learning; Online Examination
References
[1] V.L. Tinio, "ICT in Education, " e-primers for the information economy, society and polity, e-Asean Task Force and UNDP-APDIP. http://www.eprimers.org/ ict/page25.asp.
[2] J. W. Willis, D. L. Johnson, and P. N. Dixon, " Computers, Teaching and Learning: An Introduction to Computers in Education, " Dilithium Press, 1983.
[3] S. Kennewell, "Using Affordances and Constraints to Evaluate the use of Information Technology in Teaching and Learning, " in J. of Information Technology for Teacher Education, Volume- 10, Nos. I &2, 2001, pp. 101-116.
[4] P. Brusilovsky, and C. Peyl0, "Adaptive and web-based education systems ", in Int. J. of Artificial Intelligence and AI, 13, 2003, pp.159-172.
[5] J. Toudeur, J. V. Bavaat and M. Valcke, " Curricula and the use of ICT in education: Two worlds apart?," British J. of Educational Technology, 2006, pp. 1-15.
[6] A. Koohang, A. Durante, "Learners' Perceptions toward the Web-based Distance Learning Activities/Assignments Portion of an Undergraduate Hybrid Instructional Model , " Journal of Information and Technology Education, Volume-02, 2003, pp. 105-113.
[7] T. G. Gill and C. F. Holton, "A self-paced introductory programming course, " J. of Information Technology in Education, Volume- 05, 2006, pp. 95-105.
[8] L. Moran and B. Myringer, "Higher Education through open and distance learning, " in Flexible learning and university change, (Ed. K. Harry), London, 1999.
[9] R. Chatterjee, S. Mukherjee and R. Dasgupta, “Design of an LMS for Confidence Based Learning,” Proceedings of INTED2011 Conference, Valencia, Spain, ISBN: 978-84-614-7423-3, March 2011 , pp.7-9.
[10] James Bruno, “Using Testing to Provide Feedback Support to Instruction: A re-examination of the role of assessment in educational organizations,” UCLA, 1992.
[11] James Bruno and Jamal Abedi, “Concurrent Validity of Information Referenced Testing Format Using MCW-APC Scoring Methods,” Journal of Computer Based Instruction, 1993.
[12] G. Booch, J. Rumbaugh and I. Jacobson, "The Unified Modeling Language User Guide, " Pearson Education, 2006.
Citation
S. Bhattacharya, S. Chowdhury and S. Roy, "An Online Recommender Agent for Boosting the Confidence of an e-learner," International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.17-20, 2014.
Achieving Security in Ad hoc Networks Using Identity and Trust with Key Management
Research Paper | Journal Paper
Vol.2 , Issue.12 , pp.21-24, Dec-2014
Abstract
A Network user has to provide susceptible personal information (e.g. name, residence address, credit/debit card number, contact number, driver’s license number and date of birth, etc.) when they are requested by some Web page. This exclusive Personal Identity Information may be used to exclusively identify, contact and/or locate a particular user. This information may be exploited and abused if not properly protected. An Identity Management (IDM) system is therefore proposed to overcome this problem and helps to decide the access to this information in a secure manner. The concept of key management has been implemented to achieve the goal of trusted communication. The group public key management scheme, trust of a node and physical identity helps in secure data transfer over wireless channels through the concept of composite identity and trust based model(CIDT). To validate a node in the network Trust Factor of a node along with its key pair and identity is used. Proposed method works well for self certification scheme of a node in the network.
Key-Words / Index Term
Personal Identity Information(PII), Identity Management(IDM), Service Provider(SP), Trusted Third Party(TTP)
References
[1] Pallavi Khatri, "Using Identity and Trust with Key Management for achieving security in Ad hoc Networks" INDIA, _c 2014 IEEE
[2] Shibin Chen , Lingfang Zeng , Qingsong Wei and Dan Feng, SeDas:- A Self-Destructing Data System Based on Active Storage Framework", China,2013 IEEE
[3] R. Geambasu, T. Kohno, A. Levy, and H. M. Levy, “Vanish: Increasing data privacy with self destructing data,” in Proc. USENIX Security Symp., Montreal, Canada, Aug. 2009, pp. 299–315
[4] A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979.
[5] S. Wolchok, O. S. Hofmann W. Felten, J. A. Halderman, C. J. Rossbach, B. Waters, and E. Witchel, “Defeating vanish with low-cost sybill attacks against large DHEs,” in Proc. Network and Distributed System Security Symp., 2010.
[6] L. Zeng, Z. Shi, S. Xu, and D. Feng, “Safevanish: An improved data self-destruction for protecting data privacy,” in Proc. Second Int. Conf. Cloud Computing Technology and Science (CloudCom), Indianapolis, IN, USA, Dec. 2010, pp. 521–528.
[7] J. R. Douceur, “The sybil attack,” in Proc. IPTPS ’01: Revised Papers From the First Int. Workshop on Peer-to-Peer Systems, 2002.
[8]. C.E. Perklins, “Ad Hoc Networking”, 1st edition. Addison –Wesley Professional, 2001.
[9]. I. F. Akyildiz, X. Wang, and W. Wang, "Wireless mesh networks: a survey," Computer Networks, Volume 47, 2005, pp. 445-487.
[10]. H. Dahshan, and J. Irvine, “A trust based threshold cryptography key management for mobile ad hoc networks,” IEEE 70th Vehicular Technology Conf., Anchorage, AK, USA, pp. 1-5, Sept. 2009,.
[11]. S. Capkun, L. Buttya, and J.-P. Hubaux, “Selforganized public-key management for mobile ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 2, no. 1, pp. 52-64, Jan. – Mar., 2003.
[12]. B.J. Chang and S.L. Kuo, “Markov chain trust model for trust-value analysis and key management in distributed multicast MANETs,” IEEE Transactions on Vehicular Technology, vol. 58, no. 5, pp. 1846-1863, May 2009.
[13]. A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” CRYPTO‘84, 1984, pp. 47–53.
[14]. Y. G. Desmedt, “Threshold cryptography,” European Transactions on Telecommunications, vol. 5, no. 4, pp. 449-458, July/Aug. 1994.
[15]. J. Huang and D. Nicol, “application to PKI and IDM with calculus of trust,” ACM 8th Symposium on Identity and Trust on the Internet,
Gaithersburg, MD, USA, April 2009.
[16]. B. Poettering, 2006, SSSS: Shamir’s Secret Sharing Scheme [Online].
Available: http://point-at-infinity.org/ssss/
[17]. Khatri, P., Tapaswi, S. & Verma, U.P. (2012). Trust
evaluation in wireless ad hoc networks using fuzzy
system. In V. Potdar & D. Mukhopadhyay (eds.), pp.
779-783, CUBE 2012.
Citation
Pranav Nair, Archana Jadhav, Swapnaja Gunjal , Ruchita Gadsing, "Achieving Security in Ad hoc Networks Using Identity and Trust with Key Management," International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.21-24, 2014.
Data Security Through Armstrong Number and Colors
Research Paper | Journal Paper
Vol.2 , Issue.12 , pp.25-28, Dec-2014
Abstract
Data Security is the science and study of methods of protecting data from unauthorized disclosure and modification. As the technology advanced, there is need to secure data, transmitted over the network. To make secure data transmission, different methods are used. One of the techniques is Cryptography. Cryptography is the universal technique for secure data communication with the presence of third parties. In this method, encryption and decryption process is used to hide simple data from unauthorized users by converting it into unreadable form and again retrieve it in original form. This method not only protect data from theft, but also used for user authentication. Encryption and decryption have need of some secret information, called key.
Key-Words / Index Term
Armstrong Numbers, Data Security, Authentication, Cryptography
References
[1] Gayatri Kulkarni , Pranjali Gujar, Madhuri Joshi, Shilpa Jadhav, “Message Security Using Armstrong Numbers and Authentication Using Colors” International Journal of Advanced Research in Computer Science and Software Engineering, January 2014.
[2] S. Pavithra Deepa, S. Kannimuthu, V. Keerthika, “Security Using Colors and Armstrong Numbers”, Proceedings of the National Conference on Innovations in Emerging Technology, February, 2011.
[3] S.Belose, M.Malekar, G.Dharmawat,“Data Security Using Armstrong Numbers”, International Journal of Computer science and Engineering, April 2012
[4] Gordon L. Miller and Mary T. Whalen, “Armstrong Numbers”, University of Wisconsin, Stevens Point, WI 54481,October 1990.
[5] M.Renuga Devi, S.Christobel Diana, “Enhancing Security in Message Passing Between Sender and Receiver Using Colors and Armstrong Numbers”, International Conference on Computing and Control Engineering(ICCCE 2012) April 2012.
[6] Chavan Satish, Lokhande Yogesh, Shinde Pravin, Yewale Sandeep, Sardeshpande S. A, “Secure Email using Colors and Armstrong Numbers over web services”, International Journal Of Research In Computer Engineering And Information Technology VOLUME 1 No. 2, March 2010.
Citation
Ajisha John, Keerthy.K.B, Meenu Manoharan, Diana Davis , "Data Security Through Armstrong Number and Colors," International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.25-28, 2014.
Execution of an Image Scaling Mainframe Via VLSI Procedure
Research Paper | Journal Paper
Vol.2 , Issue.12 , pp.29-33, Dec-2014
Abstract
Image mounting is an actual important technique and has been widely used in many image handling applications. In uses where the mounting procedure must be did at the show somewhat than at the CPU or GPU, committed hardware execution is necessary. Low-difficulty image handling procedures are necessary for VLSI execution of real period applications. The image mounting algorithm of the future scheme covers of an improving spatial filter, a clamp filter, and a Biwrinkled interpolation. Imageries are took in real period by an image instrument and send to the FPGA along with the mounting parameter. Sequential connectivity is if to the FPGA and the scaled imageries are showed on the pc. The select combining, hardware distribution methods of the Biwrinkled interpolator and reconfigurable methods has been used to reduction hardware costs.
Key-Words / Index Term
Improving filter, Actual big gage addition (VLSI),Clamp filter, Image sensor, Biwrinkled interpolation, Reconfigurable deSymbol Component ,FPGA
References
[1] Hui-Fen Huang ; Sch. of Electron. & Inf. Eng., South China Univ. of Technol., Guangzhou, China ; Liang-Yong Deng ; Bin-Jie Hu ; Gang Wei, “Techniques for Improving the High-Frequency Performance of the Planar CM EMI Filter”, Published in: Electromagnetic Compatibility, IEEE Transactions on (Volume:55 , Issue: 5 ) Page(s): 901 – 908.
[2] Fang Luo ; Dept. of Electr. & Comput. Eng., Virginia Tech, Blacksburg, VA, USA ; Dong Dong ; Boroyevich, D. ; Mattavelli, P., “Improving High-Frequency Performance of an Input Common Mode EMI Filter Using an Impedance-Mismatching Filter” Published in: Power Electronics, IEEE Transactions on (Volume:29 , Issue: 10 ) Page(s): 5111 – 5115.
[3] Fang Luo ; Center for Power Electron. Syst., Virginia Tech, Blacksburg, VA, USA ; Boroyevich, D. ; Mattavelli, P., “Improving EMI filter design with in circuit impedance mismatching” Published in: Applied Power Electronics Conference and Exposition (APEC), 2012 Twenty-Seventh Annual IEEE Date of Conference: 5-9 Feb. 2012 Page(s): 1652 – 1658.
[4] Weitao Li ; Res. Center of Autom., Northeastern Univ., Shenyang, China ; Kezhi Mao ; Hong Zhang ; Tianyou Chai, “Selection of Gabor filters for improved texture feature extraction” Published in: Image Processing (ICIP), 2010 17th IEEE International Conference on Date of Conference: 26-29 Sept. 2010 Page(s): 361 - 364
[5] Xu Wei-ping ; Sch. of Mech. & Electr. Eng., Gui Zhou Normal Univ., Guiyang ; Wu Quan ; Xiao Chun, “Alloy Addition Prediction in Smelting Based on BP Neural Network” Published in: Intelligent Systems and Applications, 2009. ISA 2009. International Workshop on Date of Conference: 23-24 May 2009 Page(s): 1 – 4.
[6] Xu Wei-ping ; Sch. of Mech. & Electr. Eng., Gui Zhou Normal Univ., Guiyang ; Wu Quan ; Xiao Chun “Alloy Addition Prediction in Smelting Based on BP Neural Network” Published in: Intelligent Systems and Applications, 2009. ISA 2009. International Workshop on Date of Conference: 23-24 May 2009 Page(s): 1 – 4
[7] Petrov, Z. ; Honeywell Aerosp., Adv. Technol. Eur., Brno, Czech Republic ; Zaykov, P.G. ; Cardoso, J.P. ; Coutinho, J.G.F.” An aspect-oriented approach for designing safety-critical systems” Published in: Aerospace Conference, 2013 IEEE Date of Conference: 2-9 March 2013 Page(s): 1 – 10.
[8] Wright, J.R. ; Jet Propulsion Lab., California Inst. of Technol., Pasadena, CA “Three-dimensional tools for telemetry visualization and analysis” Published in: Aerospace conference, 2009 IEEE Date of Conference: 7-14 March 2009 Page(s): 1 – 7.
[9] Mini, R. ; Amrita Sch. of Eng., Amrita Vishwa Vidyapeetham, Bangalore, India ; Resna, S.R. ; Dinesh, M.N. “LC clamp filter for voltage reflection due to long cable in induction motor drives” Published in: Emerging Research Areas: Magnetics, Machines and Drives (AICERA/iCMMD), 2014 Annual International Conference on Date of Conference: 24-26 July 2014 Page(s): 1 – 6
[10] Pasdar, A.M. ; Dept. of Electr. & Comput. Eng., Univ. of Akron, Akron, OH, USA ; Sozer, Y. ; Husain, I. “Non-intrusive active power clamp filter on PLC channels for smart grid applications” Published in: Energy Conversion Congress and Exposition (ECCE), 2012 IEEE Date of Conference: 15-20 Sept. 2012 Page(s): 227 – 234.
[11] Aoki, J. ; Olympus, Hachioji, Japan ; Takemoto, Y. ; Kobayashi, K. ; Sakaguchi, N. “A rolling-shutter distortion-free 3D stacked image sensor with −160dB parasitic light sensitivity in-pixel storage node” Published in: Solid-State Circuits Conference Digest of Technical Papers (ISSCC), 2013 IEEE International Date of Conference: 17-21 Feb. 2013 Page(s): 482 – 483.
[12] Zhi-Yan Cao ; Sch. of Comput. Sci. & Technol., Harbin Inst. of Technol., China ; Zheng-Zhou Ji ; Ming-Zeng Hu “An image sensor node for wireless sensor networks” Published in: Information Technology: Coding and Computing, 2005. ITCC 2005. International Conference on (Volume:2 ) Date of Conference: 4-6 April 2005 Page(s): 740 - 745 Vol. 2.
[13] Gottardi, M. ; Institution per la Ricerca Scientifica e Technologica, Trent, Italy ; Yang, W. “A CCD/CMOS image motion sensor” Published in: Solid-State Circuits Conference, 1993. Digest of Technical Papers. 40th ISSCC., 1993 IEEE International Date of Conference: 24-26 Feb. 1993 Page(s): 194 – 195.
[14] Brant, A. ; Dept. of ECE, UBC, Vancouver, WA, USA ; Lemieux, G.G.F. “ZUMA: An Open FPGA Overlay Architecture” Published in: Field-Programmable Custom Computing Machines (FCCM), 2012 IEEE 20th Annual International Symposium on Date of Conference: April 29 2012-May 1 2012 Page(s): 93 – 96.
Citation
R.Raj Prabhu, G.Mary Amirtha Sagayee, "Execution of an Image Scaling Mainframe Via VLSI Procedure," International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.29-33, 2014.
Secure Banking System Using Multi – Factor Authentication
Research Paper | Journal Paper
Vol.2 , Issue.12 , pp.34-37, Dec-2014
Abstract
Remote authentication is the most commonly used method to determine the identity of a remote client. Secure and efficient authentication scheme has been a very important issue with the development of networking technologies. In a Generic framework for Authentication, preserving security and privacy in distributed systems provide three factors for authentication of clients. This paper investigates a systematic approach for authenticating clients by five factors, namely RFID card, PIN, biometrics, One Time Password (OTP) and keypad ID. The conversion not only significantly improves the information assurance at low cost but also protects client privacy in distributed systems.
Key-Words / Index Term
Authentication, Distributed Systems, Security, Privacy, PIN, RFID card, Biometrics
References
[1] Xinyi Huang, Yang Xiang, Jianying Zhou and Robert H. Deng, “A Generic framework for three factor authentication: Preserving security and privacy in distributed systems” IEEE Trans. Parallel and distributed system Vol. 22, no. 8, pp. 1390-1397, August 2011.
[2] C.-I. Fan and Y.-H. Lin,“Provably Secure Remote Truly Three- Factor Authentication Scheme with Privacy Protection on Bio- metrics,” IEEE Trans. Information Forensics and Security, vol. 4, no. 4, pp. 933-945, Dec. 2009.
[3] C.H. Lin and Y.Y. Lai, “A Flexible Biometrics Remote User Authentication Scheme,” Computer Standards Interfaces, vol. 27, no. 1, pp. 19-23, Nov. 2004.
[4] M.K. Khan and J. Zhang, “Improving the Security of A Flexible Biometrics Remote User Authentication Scheme‟,” Computer Standards Interfaces, vol. 29, no. 1, pp. 82- 85, Jan.2007.
[5] H. Tian, X. Chen, and Y. Ding, “Analysis of Two Types Deniable Authentication Protocols,” Int‟l J. Network Security, vol. 9, no. 3, pp. 242-246, July 2009.
[6] C.T. Li and M.-S. Hwang, “An Efficient Biometrics-Based Remote User Authentication Scheme Using Smart Cards,”J. Network and Computer Applications, vol.33, no. 1, pp. 1-5, 2010.
[7] M.Scott, “Cryptanalysis of an ID-Based Password Authentication Scheme Using Smart Cards and Fingerprints,” ACM SIGOPS Operating Systems Rev., vol. 38,no. 2, pp. 73- 75, Apr. 2004.
Citation
Revathy Menon, Ajisha John, Sini Jacob, Sneha Divakaran and Diana Davis, "Secure Banking System Using Multi – Factor Authentication," International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.34-37, 2014.
Comparison of Open MP and CUDA
Research Paper | Journal Paper
Vol.2 , Issue.12 , pp.38-41, Dec-2014
Abstract
In this paper we will study the architectures of both Open Mp and CUDA architectures and make some comparisons among both in terms of basic program execution time. We will use a basic serial version of Matrix Multiplication Algorithm and modify it in terms of CUDA and Open MP and study comparatively.
Key-Words / Index Term
OpenMP; CUDA; Matrix Multiplication; GPU; CPU
References
[1] Kirk David B, Hwu Wen Mei. W, “programming massively parallel processors”, NVIDIA Elsevier, ISBN: 978-0-12-381472-2, Vol.10, 2010, pp.59-120.
[2] Sanders Jason, Kandrot Edward, “Cuda By Example”, Addison – Wesley, ISBN-13: 978-0-13-138768-3, 2011, pp.37-57.
[3] Niraj R Chauhan and Mayur S. Burange, “Multicore Heterogeneous Computing with OpenACC”, International Journal of Computer Science and Engineering E-ISSN: 2347-2693, Vol.2, Issue-3, 2014, pp.92-97.
Citation
Fazlul Kader Murshed Nawaz, Arnab Chattopadhyay, Kirthan G J, Girish D Mane, Rohith N Savanth, "Comparison of Open MP and CUDA," International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.38-41, 2014.
A Novel Approach on Adaptive Block Steganography Based Crypting Technique for Secure Message Passing
Research Paper | Journal Paper
Vol.2 , Issue.12 , pp.42-46, Dec-2014
Abstract
The enhancement of using internet system has increased the ease of information communication which throws challenge in data security. Now a days harmless and safe data transmission become more vital and significant. Cryptography and Steganography are two important areas of exploration that comprise a great percentage of applications. Cryptography is the expertise technology that involves encoding a message text into an unreadable text form that is known as cipher text and the steganography is an art and technology of hiding information in a multimedia file without causing statistically significant change to this file for involving a secret message transmission. In our suggested work the plain text is converted to a cipher text using the method of Cryptography, where different person can able to use their preferable key for encoding the text and also some Boolean algebraic operations are used in the succeeding steps and after that this cipher text is buried inside a cover media of gray scale image with dimension of 2n x 2n and a secure pictorial block steganography based encryption algorithm is proposed for transferring text message and also revealed the Cryptanalysis and Steganalysis technique for regaining data at receiver side. The experimental outcome indicates that for using different length of text message the distortion of picture is very much less that is negligible in open eyes. At last it can be mentioned that without knowing the appropriate knowledge of cryptanalysis and steganalysis retrieving of message is quite impossible.
Key-Words / Index Term
Cryptography, Steganography, Plain text, Cipher text, Cryptanalysis, Steganalysis
References
[1] Thomas Ristenpart , and Sriram Keelveedhi , Mihir Bellareand, “Message-Locked Encryption and Secure Deduplication”, Eurocrypt 2013, Volume 7881, 2013, pp 296-312
[2] RigDas , ThemrichonTuithung “A Novel Steganography Method for Image Based on Huffman Encoding”, 2012 IEEE
[3] G.KarthigaiSeivi, Leon Mariadhasan, K. L. Shunmuganathan ,“Steganography Using Edge Adaptive Image”, 2012 International Conference on Computing, Electronics and Electrical Technologies [ICCEET]
[4] Themrichon Tuithung, Yam bern Jina Chanu and Kh. Manglem Singh, “A Short Survey on Image Steganography and Steganalysis Techniques”, 2012 IEEE
[5] Sumeetkar and kirtikaSingla “Hash Based Approach For Secure Image Steganography Using Canny Edge Detection Method”, ISSN-0973-7391, Vol. 3, Number 1, January-June 2012, pp. 155-157.
[6] Anjali Sardana, Siddhartha Malik, “A Keyless Approach to Image Encryption”, IEEE, International Conference on Communication Systems and Network Technologies 2012.
[7] Hassan Aghaeinia , Seyed Hamed Seyedi, and Ali Daneshkhah, “A More Secure Steganography Method in Spatial Domain”, Second International Conference on Intelligent Systems, Modelling and Simulation, 2011.
[8] S. Ghaemmaghami, S. Sarreshtedari , “High Capacity Image Steganography in Wavelet Domain,” International Conference on Consumer Communications and Networking,pp.1-6, 2010.
Citation
Sudipta Sahana and Abhipsa Kundu, "A Novel Approach on Adaptive Block Steganography Based Crypting Technique for Secure Message Passing," International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.42-46, 2014.