2. Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/1/7
Browse
382 results
Search Results
Item Moment based delay modelling for on-chip RC global VLSI interconnect for unit ramp input(2012) Halder, A.; Maheshwari, V.; Goyal, A.; Kar, R.; Mandal, D.; Bhattacharjee, A.K.The Elmore delay has been the metric of choice for the performance driven design applications. But the accuracy of the Elmore delay is insufficient. This paper presents an accurate and efficient model to compute the delay metric of on-chip high speed VLSI interconnects for ramp inputs. The proposed delay metric is based on the distributed RC interconnect model. For optimization like physical synthesis and static timing analysis, efficient interconnect delay computation is critical. In this paper, a delay metric using RC-out has been formulated which computes the delay at the output node. The proposed model is based on the first three moments of the impulse response. Two pole RC model is developed based on the first, second and third moments' effect onto the delay calculation for interconnect lines. This two pole approach permits the pre-characterization of the interconnect delay. The empirical D3M metric is shown to be a typical case. The proposed metric also provides an expression for impulse response. The SPICE simulation results justify the accuracy and efficacy of the proposed model. � 2012 IEEE.Item Modified self - Adaptive Plateau Histogram Equalization with mean threshold for brightness preserving and contrast enhancement(2013) Raju, A.; Dwarakish, G.S.; Reddy, D.V.Histogram Equalization (HE) is a simple, effective and widely used contrast enhancement technique as it can automatically define the intensity transformation function based on statistical characteristics of the image, but it tends to change the mean brightness of the image to the middle level of the gray level range. HE also produces saturation effects by extremely pushing the intensities towards the right or the left side of the histogram. To surmount these drawbacks, Clipping or Plateau Histogram Equalization techniques for brightness preserving and contrast enhancement have been proposed, but, these are not suitable for automatic systems because of manual selection of threshold level. Self-Adaptive Plateau Histogram Equalization (SAPHE) selects the threshold level automatically, but the process is relatively complicated and sometimes fails in execution. To overcome these drawbacks, a Modified Self - Adaptive Plateau Histogram Equalization with Mean threshold (Modified SAPHE-M) is proposed in this paper and compared the experimental results with Histogram Equalization (HE), Self-Adaptive Plateau Histogram Equalization (SAPHE) and Modified Self-Adaptive Plateau Histogram Equalization (Modified SAPHE) by using image quality measures such as Absolute Mean Brightness Error (AMBE) and Peak-Signal to Noise Ratio (PSNR). � 2013 IEEE.Item Modeling and performance analysis of microturbine generation system in grid connected/islanding mode(2012) Nayak, S.K.; Gaonkar, D.N.The microturbine based distributed generation (DG) system are predicted to play an important role in the distribution network in the near future. The microturbine generation (MTG) system has great impact on the DG system on real time system management and planning. It is popularly accepted that, MTG system are attracting the more attentions towards customers needs in a power generation market. Thus, to investigate the performance of MTG system and their efficient modeling are needed. This paper presents a dynamic modeling and performance analysis of MTG system in grid connected and islanding mode of operation. The model presented in this paper allows the power flow between grid and MTG system. The model of MTG system is built using mathematical expression in Matlab/Simulink environment. The simulation result shows the performance of MTG system for grid connected and islanding operation. � 2012 IEEE.Item Modeling and performance analysis of microturbine based Distributed Generation system, "a review"(2011) Gaonkar, D.N.; Nayak, S.Distributed Generation (DG) is predicted to play an important role in the electric power system in the near future. It is widely accepted that microturbine-generation systems are currently attracting lot of attention to meet users' need in the distributed generation market. In order to gain the benefits of interconnected operation of microturbine generation system (MTG) system with the utility network, their effective modeling and performance analysis are required. This paper presents the recent research efforts in accurate modeling of MTG System and the investigation on various issues related to their interconnected operation and control with the distribution network. � 2011 IEEE.Item Modeling and analysing a novel restricted angle scenario model in MANET(2010) Vetrivelan, N.; Reddy, A.V.In this work, we have modeled a novel Restricted Angle Scenario model for Mobile Adhoc networks. The direction movement of the nodes are significantly specified with given angles. We have compared and analysed our novel Restricted angle scenario model and the impact of mobility on MANET protocols. The parameter metrics Packet Delivery Fraction, Routing load, and Latency have been taken into account. Our simulation result shows that the functioning of our Restricted Angle Scenario model has greatly influenced the performance of Routing Protocols in MANET environment. The result reveals the fact that the Reactive routing protocol DSR outperforms than the Proactive routing protocol DSDV. Our Novel Restricted Angle Scenario Model has performed well when we compare it with existing Waypoint mobility model while setting many source-destination connections. �2010 IEEE.Item Model based hybrid approach to prevent SQL injection attacks in PHP(2011) Sadalkar, K.; Mohandas, R.; Pais, A.R.SQL Injection vulnerability is ranked 1st in the OWASP top 10 vulnerability list and has resulted in massive attacks on a number of websites in the past few years. Inspite of preventive measures like educating developers about safe coding practices, statistics shows that these vulnerabilities are still dominating the top. Various static and dynamic approaches have been proposed to mitigate this vulnerability. In this paper, we present a hybrid approach to prevent SQL injection attacks in PHP, a popular server side scripting language. This technique is more effective to prevent SQL injection attack in a dynamic web content environment without use of complex string analyzer logic. Initially, we construct a Query model for each hotspot by running the application in safe mode. In the production environment, dynamically generated queries are validated with it. The results and analysis shows the proposed approach is simple and effective to prevent common SQL injection vulnerabilities. � 2011 Springer-Verlag.Item Restraining add-on's behavior in private browsing(2012) Bapat, A.D.; Pais, A.In this paper we address the privacy issues of add-on mechanism supported by browser in private mode. The add-ons enjoy unrestrained access to user sensitive information at all times. This freedom can be misused to create add-ons with malicious intent of violating privacy of the browser. We have designed and implemented an add-on which performs this task in private mode of the browser. This is a clear violation of the goals of private browsing. Mozilla lacks privacy ensuring mechanism against add-ons at browser level. So we have modified the source code of Mozilla Firefox to prevent such behavior of an add-on. It involves runtime monitoring of add-on?s behavior in private mode and notify/block suspicious ones. We have been able to prevent such add-on?s activity using our mechanism. Copyright 2012 ACM.Item Remote scan using secure automated client server model(2011) Gogikaru, V.; Singh, M.P.In recent years, attackers gain entry into computer systems frequently with the help of Rootkit's. Detection of these Rootkits is not a simple task in early days. To detect Rootkits we need to run many scanning tools manually. This is not feasible many times and it is time consuming process for each client. We propose a secure automated client/server model to scan remote clients present in local area network. This model allows us to run the scanning tools automatically and periodically, to know the Rootkits present in the client system. For our experiment purpose we automated RootkitRevealer tool. � Springer-Verlag 2011.Item Regression model of oxidation behavior of 6061 Al/SiC composite with and without protective coatings(2011) Priyamvada, B.; Rajasekaran, S.; Udayashankar, N.K.; Nayak, J.This paper analyses the variation of weight gain, ?m, of 6061 Al/SiC composite due to oxidation with time, t, using regression model. Using curve fitting technique, the mathematical equations for the oxidation behavior of the composite are formulated. The generated data according to the mathematical equations are analyzed and compared with the experimental data. More specifically, regression analysis helps in understanding how the typical value of the mass gain (dependent variable) changes when the time of oxidation (independent variable) is varied, while the other independent variable (Temperature) held fixed. Since the oxidation resistance of the 6061Al/SiC composite decreases due to the presence of alloying elements precipitates in the matrix, the effect of aging treatment and protective coatings like Aluminium and AlCrN on the oxidation behavior of the composite is studied. It is observed that the coatings increase the oxidation resistance of the composite. The regression analysis carried out shows a threefold linear variation of weight gain (Dependent variable) with respect to time and temperature of oxidation (Independent variables). � 2011 IEEE.Item Reconfigurable Triple Modular Redundant and N-Modular Redundant systems with variable Reliability in multi-processor environment(2012) Aithal, S.; Krishna, Kumar, S.Voting Logic (VL) is an important component of Triple Modular Redundant (TMR) and N-Modular Redundant (NMR) systems. A number of voting logic designs are presented in this paper. The Design Profile, Diagnosability and Reliability calculation of a word voter for TMR system is presented. � 2012 IEEE.