scispace - formally typeset
Search or ask a question

Showing papers by "Rajasthan Technical University published in 2014"


Proceedings ArticleDOI
01 Aug 2014
TL;DR: In this paper the classification of SQL injection attacks is discussed and also analysis is done on basis of risk associated with each attack.
Abstract: Web applications interact with the back-end database to retrieve data as and when requested by the user Web applications (Like e-commerce, banking, shopping, trading, blogs etc) are the backbone of today's online business industry For activities like paying of bills & merchandize information must be kept safe with these web applications but unfortunately there is no guarantee of integrity and confidentially of information The global exposure of these applications makes them prone to the attacks because of presence of vulnerabilities These security vulnerabilities continue to infect the web applications through injection attacks SQL injection attacks (SQLIA's) are one of the top most threat in database centric web application and SQL injections vulnerabilities(SQLIV's) are the most serious Vulnerability typesSQLIA allows the attacker to gain control over the database of an application resulting in financial fraud, Leak of confidential data, network hacking, deleting database, theft and many more to count In this paper we have discussed the classification of SQL injection attacks and also analysis is done on basis of risk associated with each attack

27 citations


Proceedings ArticleDOI
27 Oct 2014
TL;DR: Novel access control framework is proposed that can address the security and privacy issues for cloud and is based on dynamic trustworthiness of user and provides an effective and feasible access control solution for cloud.
Abstract: Cloud Computing are used to deliver services from share pool of computing resources. These resources are provided to the user using the internet. It has advantage over traditional computing services along with new challenge. These are data security, privacy, protection, access control, availability, authentication, scalability, lock-in and confidentiality. These are inherent security flaws of cloud technology due to openness, multi-tenancy, outsourcing of resources. Access control is a fundamental security mechanism but traditional access control like as mandatory, discretionary and role based access control are not suitable. These traditional existing access control model are not effective and feasible solutions for cloud. In this research work, novel access control framework is proposed that can address the security and privacy issues for cloud. The framework is based on dynamic trustworthiness of user and provides an effective and feasible access control solution for cloud. A multi layer security standard, policies and access control mechanism are provided with proposed framework. The access control is based on the trustworthiness of the user, which is demonstrated by static and dynamic trust evidence. The dynamic trustworthiness is used to reduce the possibility to perform unauthorized activities and ensures that only authorized user's access cloud resources. The prototype of the proposed framework is developed in NetLogo on Linux platform and demonstrated with test cases. The analysis of simulated results shows that proposed mechanism is highly efficient and robust under existing security threats.

20 citations


Proceedings ArticleDOI
15 Sep 2014
TL;DR: A novel model for prevention of DoS attacks in VANET is proposed and named as RBS protocol, based on the master chock filter concept for filtration of packets during busy traffic and other attacks.
Abstract: Vehicular Ad-hoc Networks (VANET) has suffered from many risks in the past, like security privilege and mode of authentication by many attackers/hackers because they were trying to disturb the network and break communication services for their personal interest. The series of attacks that have broken the secured communication are network jammer, source sink attackand these attacks are called as denial of service (DoS) attacks. A novel model for prevention of DoS attacks in VANET is proposed and named as RBS protocol. The proposed model is based on the master chock filter concept for filtration of packets during busy traffic and other attacks. The protocol was also evaluated by the other two methods, which are blocking the source IP originator by the DoS attacks and checking the prevention of TCP/UDP flooding and IP sniffing attacks. The evaluation of the protocol was based on the mobility node's interaction and utilization of bandwidth. The experimental results were performed on the highway transportation condition. The RBS protocol results showed that the packet delivery ratio, throughput, time delayhas improved as compared to IP-trackback protocol.

9 citations


Proceedings ArticleDOI
01 Dec 2014
TL;DR: This work proposes a novel method based on artificial bee colony algorithm to segment the leukocytes from the images of mice skin sections stained with Hematoxylin and Eosin staining and acquired at 40 x magnification and shows that the proposed method outperforms when compared with the well known segmentation methods.
Abstract: An automatic segmentation of leukocytes can assist pharmaceutical companies to take decisions in the discovery of drug and encourages for development of automated leukocytes recognition system. Segmentation of leukocytes in tissue images is a complex process due to the presence of various noise effects, large variability in the images, and shape of the nuclei. Surprisingly, rare efforts have been done to automate the segmentation of leukocytes in various disease models on Hematoxylin and Eosin stained tissue images. The present work proposes a novel method based on artificial bee colony algorithm to segment the leukocytes from the images of mice skin sections stained with Hematoxylin and Eosin staining and acquired at 40 x magnification. The results show that the proposed method outperforms when compared with the well known segmentation methods.

6 citations


Proceedings ArticleDOI
01 Jul 2014
TL;DR: The generation of reversible FSM is improved and the step by step procedure to generate the sequential reversible circuit from reversible F SM is evolved to help in debugging the reversible circuits, handling the ambiguous state of an FSM and generating the original input in reverse direction by reversing the original output.
Abstract: Reversible logic has emerged as a promising technology for low power and high speed computations. However the realization of sequential circuit in reversible logic is still at premature stage. One of the traditional ways of specifying sequential circuit functionality is using Finite State Machine (FSM). The techniques for obtaining conventional irreversible circuits from FSM are well established. The generation of reversible circuits using FSM is very difficult because of the fact that FSM may not be reachable to a unique stage by reversing the transition. A very few attempts have been reported in the literature for the conversion FSM to reversible FSM. To the best of our knowledge, this is the first attempt for realizing sequential reversible circuit using reversible FSM. It was observed that the attempt made in [1] for generating reversible FSM from traditional (original) FSM were not suitable for generating sequential reversible circuit. This paper has improved the generation of reversible FSM and evolved the step by step procedure to generate the sequential reversible circuit from reversible FSM. We have verified our method by generating sequential reversible circuit of string accepter and odd parity generator. Because of non-availability of generated sequential reversible circuit in literature, our results cannot be compared with any other circuits. We expect that the sequential reversible circuits will help in debugging the reversible circuits, handling the ambiguous state of an FSM and generating the original input in reverse direction by reversing the original output. We hope this paper will enhance the research in the field of reversible sequential circuit.

6 citations


Proceedings ArticleDOI
08 May 2014
TL;DR: Simulation results obtained shows the effectiveness of the proposed algorithm in partial loading conditions, and mathematical model of induction motor in field-oriented frame, including proposed loss model is derived.
Abstract: In this paper, performance analysis of an induction motor drive employing a loss minimization algorithm (LMA) is presented. As the induction motors are not designed to impart high efficiency under partial loading conditions, proposed LMA is used to improve the efficiency under such load conditions. For the efficiency improvement LMA uses the rotor flux as a control variable. Mathematical model of induction motor in field-oriented frame, including proposed loss model is derived. The complete drive system is simulated in MATLAB/Simulink software for different operating conditions. Simulation results obtained shows the effectiveness of the proposed algorithm in partial loading conditions.

5 citations


Journal ArticleDOI
TL;DR: In this paper, the planning and construction phases of offshore wind farms, including related environmental issues, are discussed, and the conventional configuration of the offshore wind farm is based on the alternative current internal links.
Abstract: The global efforts to reduce carbon emissions from power generation have favoured renewable energy resources such as wind and solar in recent years. The generation of power from the renewable energy resources has become attractive because of various incentives provided by government policies supporting green power. Among the various available renewable energy resources, the power generation from wind has seen tremendous growth in the last decade. This article discusses various advantages of the upcoming offshore wind technology and associated considerations related to their construction. The conventional configuration of the offshore wind farm is based on the alternative current internal links. With the recent advances of improved commercialised converters, voltage source converters based high voltage direct current link for offshore wind farms is gaining popularity. The planning and construction phases of offshore wind farms, including related environmental issues, are discussed here.

4 citations


Book ChapterDOI
01 Jan 2014
TL;DR: A recently developed swarm intelligence based algorithm, namely Gbest guided Artificial Bee Colony algorithm (GABC) is applied to solve the load flow problem for five bus network, which shows that the accuracy of unknown parameters such as voltage, angle and power produced by GABC is competitive method to the NR method and basic ABC algorithm based method.
Abstract: Load flow problem has a great significance to analyze the power system network due to its roll in planning and operation of network. Generally, Newton–Raphson (NR) method is used to analyze the load flow problems due to its efficiency and accuracy. But, NR method has some inherent drawbacks like in-efficient for highly loaded network, assumption are required for initial values and abnormal operating conditions. To overcome the existing drawbacks of NR method, a recently developed swarm intelligence based algorithm, namely Gbest guided Artificial Bee Colony algorithm (GABC) is applied to solve the load flow problem for five bus network. The reported results of GABC are compared to the results of NR method and basic ABC algorithm, which show that the accuracy of unknown parameters such as voltage, angle and power produced by GABC is competitive method to the NR method and basic ABC algorithm based method.

4 citations


Proceedings ArticleDOI
01 Sep 2014
TL;DR: These type of microstrip fractal narrowband bandpass filters show the advantage of providing the much narrower bandwidth, more miniaturization, high Q-value and high selectivity than that of single mode resonator and conventional square patch filter.
Abstract: In this paper, some new type of compact and highly selective microstrip dual mode narrowband bandpass filters are proposed and compared for modern wireless applications. The filters are proposed by integrating the concepts of dual mode with slotted square patch resonator, Seirpinsky Carpet Fractal Geometry applied to the conventional microstrip square patch for achieving miniaturization and addition of perturbation for obtaining the bandpass characteristics. These type of microstrip fractal narrowband bandpass filters show the advantage of providing the much narrower bandwidth, more miniaturization, high Q-value and high selectivity than that of single mode resonator and conventional square patch filter. The performance of proposed filters based on Seirpinsky Carpet Fractal Geometry and dual mode slotted square patch resonator up to third iterations have been evaluated using full wave based on CST microwave studio. The simulation results show that at the same operating frequency and same substrate material, the proposed filter after third iteration provides a considerable low insertion loss, more miniaturization i.e less effective area of filter, high Q-value, high selectivity and sharper response of about 1.29% fractional bandwidth as compared to the conventional microstrip square patch filter of 2.04% fractional bandwidth. The Comparative Simulation results also show that as the number of iterations increase, the insertion loss, 3dB fractional bandwidth, compactness of filter and Q-value shall also be improved i.e the comparative study shows that these filter structures offer the better performance in terms of above mentioned parameters as compared to other types of non-fractalized filter structures.

4 citations


Proceedings ArticleDOI
01 Dec 2014
TL;DR: This paper deals with design and analysis of Chebyshev ultra-wideband (UWB) bandpass filter with wide passband using defected ground structure and the design of this filter is simulated on CST Microwave studio showing the desired simulation response.
Abstract: This paper deals with design and analysis of Chebyshev ultra-wideband (UWB) bandpass filter with wide passband using defected ground structure. The BPF is constructed from the step impedance lowpass filter (LPF), optimum distributed highpass filter (HPF) and four rectangular shaped DGS were etched on the ground plane. Furthermore, the LPF and HPF are designed, based on their equivalent L-C circuit on Electromagnetic (EM) Circuit Simulator. The calculation of lumped element values is done and performance analysis curves are plotted for these filters which are compared to their practical response as done on CST. The analysis on Electromagnetic (EM) Circuit Simulator is done for UWB here, but the same can be done for any general frequency band on microwave range. Further, a compact UWB bandpass filter is designed on FR-4 substrate of thickness h = 1 mm with Dielectric constant = 4.05 is and it occupies 22.4 mm × 12 mm die of area. The working frequency of UWB filter is 3.1 to 10.6 GHz. The design of this filter is simulated on CST Microwave studio showing the desired simulation response.

3 citations


Journal ArticleDOI
TL;DR: In this paper, a STATCOM-based voltage and frequency regulation for stand-alone asynchronous generator feeding linear and nonlinear loads is presented, where a DC chopper with dump load is connected across DC bus capacitor to regulate varying consumer load.
Abstract: This paper presents a STATCOM-based voltage and frequency regulation for stand-alone asynchronous generator feeding linear and nonlinear loads. The SEIG have inherent poor voltage and frequency regulation. The voltage and frequency depend upon the load current and power factor of the load with fixed excitation capacitor employing unregulated turbines. The changing consumer load requires variable reactive power compensation for excitation requirement. Consumer load contains harmonics and performance of SEIG is largely affected by these load harmonics. A current controlled voltage source inverter working as STATCOM is used for harmonic elimination, load balancing and variable reactive power compensation. A DC chopper with dump load is connected across DC bus capacitor to regulate varying consumer load. The control algorithm has been first co-simulated with processor in the loop (PIL) and then experimentally validated. The transient behaviour of developed prototype system for application and removal of balanced, unbalanced, nonlinear load is investigated.

Journal ArticleDOI
TL;DR: In this paper, a dual-band patch antenna with microstrip-fed is presented for wireless communication bands, which yields two resonance frequency bands centred at 3.56 GHz and 5.11 GHz.
Abstract: A novel compact dualband patch antenna with microstrip-fed is presented in this paper for wireless communication bands. The proposed antenna has small geometry with dimensions of W×L (20×30 mm2) and printed on commercially available FR-4 substrate. The basic radiating element of antenna is rectangular shape patch, which is printed on the top layer of the substrate. Radiating patch is exited by 50 Ω microstrip line. Ground plane is located on the bottom side of the substrate which is made defective by etching two T- shaped slots. This antenna yields two resonance frequency bands centred at 3.56 GHz and 5.11 GHz. The simulated -10 dB return loss shows that bandwidth for lower frequency band is 13.4% (3.28-3.76 GHz) and for upper frequency band is 10.7% (4.86-5.41 GHz). This prototype is well suitable for WiMAX and WLAN wireless applications. To understand the effect of the parameters on antenna performance a parametric study is also carried out.

Proceedings ArticleDOI
01 Dec 2014
TL;DR: Depending on the task set used DVFSPES can provide upto 50% improvement in response time of aperiodic tasks without compromising on the deadlines of the periodic task, and EEDVFS, Energy Efficient DVFS, that uses an EDF based Deferrable Server on various performance metrics.
Abstract: An important factor that affects the performance of battery operated real-time and embedded systems is Energy. Various techniques have been employed to limit the energy dissipation. Dynamic voltage and frequency scaling (DVFS) is one of the most popular techniques for energy conservation in such systems and is a well researched area. This paper presents an energy conscious real-time scheduling algorithm - DVFSPES, DVFS with Priority Exchange Server for mixed task set comprising of periodic and aperiodic tasks. It uses Earliest Deadline First (EDF) based Priority Exchange Server. The results of DVFSPES are compared with EEDVFS, Energy Efficient DVFS algorithm, that uses an EDF based Deferrable Server on various performance metrics. Depending on the task set used DVFSPES can provide upto 50% improvement in response time of aperiodic tasks without compromising on the deadlines of the periodic task.

Proceedings ArticleDOI
01 Jul 2014
TL;DR: The design of reversible building blocks is superior to existing designs in term of quantum cost, hardware complexity, constant input, garbage output, number of gates and design of online testable D flip-flop have been proposed for the first time.
Abstract: With increasing high speed computation demand the power consumption, heat dissipation and chip size issues are posing challenges for logic design with conventional technologies. Recovery of bit loss and bit errors is other issues that require reversibility and fault tolerance in computation. The reversible computing is emerging as an alternative to conventional technologies to overcome above problems. Bit loss issue can be solved through unique input output mapping which require reversibility and bit error issue require capability of fault tolerance in design. In order to incorporate reversibility a number of combinational reversible logic based circuits have been developed. However, very few sequential reversible circuits have been reported in the literature. To make the circuit fault tolerant, a number of fault model and test approaches have been proposed for reversible logic. In this paper, we have attempted to incorporate fault tolerance in sequential reversible building blocks such as positive level D flip-flop, negative level D flip-flop, T flip-flop, JK flipflop, R-S flip-flop, Master-Slave D flip-flop and double edge triggered (DET) D flip-flop by making them parity preserving. The importance of this proposed work lies in the fact that it provides the design of reversible sequential circuits completely testable for any stuck-at fault and single bit fault. In our opinion our design of reversible building blocks is superior to existing designs in term of quantum cost, hardware complexity, constant input, garbage output, number of gates and design of online testable D flip-flop have been proposed for the first time. We hope our work can be extended for building complex reversible sequential circuits.

Proceedings ArticleDOI
01 Nov 2014
TL;DR: By combining both (MST and COOL protocol) the creates a secure and energy conserving environment in which sensor nodes can communicate through the sink node which is the node whom all nodes send the data through routing.
Abstract: In a large scale sensor network, minimum spanning tree is evaluated to route data to a sink node in a hop by hop manner But in this route any node can be compromised or a compromised node can be included and it can inject false data or it can alter the existing data Therefore, to provide a security we use a COmpromised nOde Locator protocol (COOL) by which we can remove compromised node from the network When a compromised node is detected then this protocol prevents further damages from misbehaved node and forms a reliable and energy saving sensor network Thus in our proposed algorithm, we make a path using minimum spanning tree and maintains security (COOL protocol) in wireless sensor networks Thus, by combining both (MST and COOL protocol) we creates a secure and energy conserving environment in which sensor nodes can communicate through the sink node which is the node whom all nodes send the data through routing Also we can check the node consistency using the hash values

Book ChapterDOI
01 Jan 2014
TL;DR: Experimental results show that proposed scheme can efficiently optimize the number of cluster heads for clustering of nodes in wireless sensor networks.
Abstract: Clustering of sensor nodes is an energy efficient approach to extend lifetime of wireless sensor networks. It organizes the sensor nodes in independent clusters. Clustering of sensor nodes avoids the long distance communication of nodes and hence prolongs the network functioning time. The number of cluster heads is an important aspect for energy efficient clustering of nodes because total intra-cluster communication distance and total distance of cluster heads to base station depends upon number of cluster heads. In this paper, we have used genetic algorithms for optimizing the number of cluster heads while taking trade-off between total intra-cluster distance and total distance of cluster heads to base station. Experimental results show that proposed scheme can efficiently optimize the number of cluster heads for clustering of nodes in wireless sensor networks.

Journal Article
TL;DR: The concept of cable less transmission of power, i.e. transmitting power without using any wires is presented, which aims to give an overview of Wireless power transmission Technologies.
Abstract: The aim of this paper is to give an overview of Wireless power transmission Technologies, such technologies were increasing as the applications of mobile devices, because these devices requires frequent recharging and wired connection limits its immovability, so the significance of mobile is totally lost. In easy manner the transmission of electric power is done with the help of wires. In this paper I am presenting the concept of cable less transmission of power, i.e. transmitting power without using any wires.

Proceedings ArticleDOI
01 Dec 2014
TL;DR: In this article, a hybrid VN embedding (HVNE) is proposed to map multiple VN requests with node and link constraints, which uses K-core decomposition for decomposing the VN into core and edge network.
Abstract: Due to ever growing demand for the Internet resources, the Internet is facing ossification problem. Network virtualization is a promising way of supporting multiple heterogeneous networks onto a single substrate physical network offering solution to the problem. However, embedding Virtual Networks (VN) on a Substrate Network (SN) meeting the resource requirements of VNs and resource constraints of SNs is a challenging task. Here we present, Hybrid VN Embedding (HVNE) maps multiple VN requests with node and link constraints. Our proposal uses K-core decomposition for decomposing the VN into core and edge network. In currently available VNE methods, higher capacity link requests by VN are rejected due to non-availability of a single link of required capacity within the SN resulting in lower acceptance ratio. To improve acceptance ratio path splitting is proposed. In path splitting, higher capacity requests are served by mapping the required capacity to multiple links within the SN resulting in more requests being served and thus improving acceptance ratio and total revenue. Simulation results establishes that the performance of the proposed algorithm is better than earlier methods.

Proceedings ArticleDOI
01 Dec 2014
TL;DR: Two heuristics longest chain maximum processor criticality ratio and maximum criticality first are proposed to schedule multiprocessor tasks requiring arbitrary number of processors and having unit processing time with chain precedence constraint.
Abstract: Runtime characteristics of most of applications exhibit time varying phase behavior Different phases of multi-phase applications may require different number of processors in order to execute these phases These types of problems are referred as multiprocessor scheduling problems which are inherently hard to schedule The Scheduling strategies which consider applications phase behavior play an important role in achieving high performance and throughput in multiprocessor systems In this paper, we have proposed two heuristics longest chain maximum processor criticality ratio and maximum criticality first to schedule multiprocessor tasks requiring arbitrary number of processors and having unit processing time with chain precedence constraint In the proposed heuristics, tasks are scheduled on the basis of maximum criticality and longest chain first with maximum processor criticality ratio We also compare the performance of both heuristics in terms of make-span time with 0/1 knapsack results The experimental results have shown for both proposed heuristics The proposed heuristic reduces the make-span time of the schedule which suggests an improvement in performance of the system

Posted Content
TL;DR: Kim et al. as discussed by the authors derived a generalization of an interesting entry in Ramanujan's Notebooks that relates sums involving the derivatives of a function Phi(t) evaluated at 0 and 1.
Abstract: The aim in this note is to provide a generalization of an interesting entry in Ramanujan's Notebooks that relate sums involving the derivatives of a function Phi(t) evaluated at 0 and 1. The generalization obtained is derived with the help of expressions for the sum of terminating 3F2 hypergeometric functions of argument equal to 2, recently obtained in Kim et al. [Two results for the terminating 3F2(2) with applications, Bull. Korean Math. Soc. 49 (2012) pp. 621{633]. Several special cases are given. In addition we generalize a summation formula to include integral parameter differences.

Book ChapterDOI
01 Jan 2014
TL;DR: A comparison of the tracking characteristics of Lattice based complex adaptive IIR notch filter (L-CANF) using new adaptive algorithm and Direct from based simple gradient descent adaptive algorithm for different step size parameters is presented.
Abstract: In this paper we present a comparison of the tracking characteristics of Lattice based complex adaptive IIR notch filter (L-CANF) using new adaptive algorithm and Direct from based complex adaptive notch IIR notch filter (D-CANF) using simplified gradient descent adaptive algorithm for different step size parameters. Three cases are investigated, i.e., linear chirp, quadratic chirp and randomly-hoping frequency input complex signals buried complex zero mean white Gaussian noise. Computer simulations shows the better tracking performance of L-CANF based on new adaptive algorithm over D-CANF based on simplified gradient descent algorithm.

Book ChapterDOI
01 Jan 2014
TL;DR: TanceQi is a design which determines unfaithful processes and malicious services into the network in a fast and significant manner without having any tracking in route which simplifies the work of admin and also performs monitoring faster and more accurately than the other than other current solutions.
Abstract: Network-based attacks have become common and intervened. For this reason, detecting systems are now shifting their focus from host to network. Skimmers routinely perform “portscans” to search the vulnerable servers to intervene. Network Intrusion Detection Systems (NIDS) try to detect such behavior and flag them as malicious. An important requirement in such systems is instant response: the faster a NIDS detects malice, the lesser would be the resulting damage. At the same time, NIDS should not pseudo implicate the remote hosts as malicious. Balancing the promptness and accuracy in identifying malicious activity is a delicate and typical task. We develop detection system. TanceQi is a design which determines unfaithful processes and malicious services into our network in a fast and significant manner without having any tracking in route. This simplifies the work of admin and also performs monitoring faster and more accurately than the other than other current solutions.