Refine your search
Collections
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kaur, Gagandeep
- Design of Power Aware 64 Bit Carry Select Adder for Low Power Arithmetic Circuits at 32nm Technology
Abstract Views :127 |
PDF Views:0
Authors
Affiliations
1 Electronics and Communication Section, Yadavindra College of Engineering, Talwandi Sabo, IN
1 Electronics and Communication Section, Yadavindra College of Engineering, Talwandi Sabo, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 17, No 1 (2016), Pagination: 289-295Abstract
As the technology is shrinking day by day, energy and leakage power becoming a critical parameter for modern VLSI design. To full fill the demand and challenge of customer industry is demanding circuits with low power and high performance. In this paper, we have designed 64-bit modified carry select adder by using 6T MUX, 3TAND, 3T XOR and 5Thalf adder configurations which has better performance parameter as compared to the existing design in the literature. To evaluate the performance of modified architecture of carry select adder, extensive simulations are performed by using different bit pattern in T-spice. Result shows that 16-bit carry select adder having improvement in delay upto 34% and average power improves upto 91% and power delay product 92%. The design is extended up to 64bit Carry Select Adder. Results show that by modified Carry select adderconsume lesser average power and power delay product.Keywords
BEC, RCA, SQRT-CSA,MUX and Power Aware.- Various Tools and Techniques to Assess Information from Big Data
Abstract Views :127 |
PDF Views:1
Authors
Affiliations
1 Department of Computer Engineering, Punjabi University, Patiala, Punjab, IN
2 Department of Computer Engineering, Punjabi University, Punjab, IN
1 Department of Computer Engineering, Punjabi University, Patiala, Punjab, IN
2 Department of Computer Engineering, Punjabi University, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 22 (2016), Pagination: 475-481Abstract
Big data refers to sets of data with high computational complexity and that is larger than the capacity of traditional software tools to seize, accumulate and investigate. It relates to structured and unstructured data. Big data actually revolves around 3 V's-velocity i.e. speed, volume i.e. quantity and variety i.e. types of data. Big Data is data generated from social media (Facebook, Twitter etc.) , the data generated by networks, for example IOT (Internet of Things).This research paper sheds light on various issues related to tools available, languages used to explore big data and also mining techniques needed to fetch and analyze big data. The Methodology used is the Beautiful Soup which is a python library that can perform parsing of html page and web scraping .Web scraping helps to transform unstructured data to structured form. From the study, it has been observed that in today's era, python is the most powerful language to fetch and analyze big data, because it can handle Zeta Bytes (ZBs) amount of data. Java and other languages cannot handle data more than Giga Bytes (GBs). Hadoop is the most useful and powerful tool for distributed storage and processing of large datasets, by the use of various plug-ins, it becomes easy to analyze big data.Keywords
Big Data, Web Mining, Web Scraping, Beautiful Soup Python Library.- Penetration Testing-Assessing all the Vulnerabilities before an Intruder can Do
Abstract Views :116 |
PDF Views:9
Authors
Affiliations
1 Department of Computer Engineering, Punjabi University, Patiala, Punjab, IN
1 Department of Computer Engineering, Punjabi University, Patiala, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 22 (2016), Pagination: 612-620Abstract
Penetration testing is the testing to verify the security of a Website, server and network by safely trying to exploit vulnerabilities. Security is the most important issue in today's world.This paper outlined various features of penetration testing such as importance of penetration testing, steps of performance and identification of vulnerabilities. This paper reviewed the various online Penetration testing tools and comparison between them. Kali linux has wonderful set of inbuilt tools of kali linux for the penetration testing. Some of these inbuilt tools have been discussed in this paper.Keywords
Penetration Testing, Vulnerabilities, Kali Linux, Metasploit.- Comparative Analysis of Multimodal Biometric System
Abstract Views :156 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, G.I.M.E.T , Amritsar, Punjab, IN
2 Department Computer Science, G.I.M.E.T , Amritsar, Punjab, IN
1 Department of Computer Science, G.I.M.E.T , Amritsar, Punjab, IN
2 Department Computer Science, G.I.M.E.T , Amritsar, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 27, No 1 (2018), Pagination: 129-137Abstract
Networked environment provides legion of resources but also causing uncertainties due to crimes like computer hacking, illegal access of ATM and cell phone, security is the prime requirement. To overcome this barrier, biometric techniques are used as authentication technique to prevent unauthorized access. Biometric system kind of a method to scrutinize exclusive physical or behavioural traits to determine individual's identity. In this study ,providing the review comparison multimodal biometric system which provide additional accuracy as compared to unimodal biometric systems. The system of concern takes the input either from single or multiple sources and verifies it against the historical information stored within the dataset. This technology uses more than one biometric identifier to compare the identity of the individual. Thus, the system uses three technologies i.e. face, mimic along voice and if any one of this technology is not able to identify, the system scan still use the other two to get accurate results. The main objective of this paper is to use fusion of these biometric techniques for performance enhancement, security , minimize the system error rates to achieve better results.Keywords
Biometric, Multimodal Biometric, Security, Sensors.References
- This, P. (n.d.). Chapter 5 Genetic Algorithm ( Ga ) for Facial Biometric Security System ( Bss ), 79–109.
- Hotta, K., Member, S., & Mishima, T. (2001). Scale Invariant Face Detection and Classification Method Using Shift Invariant Features Extracted from Log-Polar. IEEE Transactions on Information Systems, E84-D(7), 867–878.
- Aggarwal, A.,&Verma, M.K.(2016).Multimodal Biometric Systems – A Survey. International Journal of Advanced Research in Computer Science and Software Engineering, 6(3), 437–441.
- Ahuja, M. S., & Chabbra, S. (n.d.). A Survey of Multimodal Biometrics. International Journal of Computer Science and Its Applications, 157–160.
- Anwar, R. W., Bakhtiari, M., Zainal, A., Abdullah, A. H., Qureshi, K. N., Computing, F., & Bahru, J. (2014). Security Issues and Attacks in Wireless Sensor Network. World Applied Sciences Journal, 30(10), 1224–1227. http://doi.org/10.5829/idosi.wasj.2014.30.10.334
- Gopal, N., & Selvakumar, R. K. (2016). Multimodal Biometric Identification System - An Overview. International Journal of Engineering Trends and Technology (IJETT), 33(7), 351–355.
- Jabbar, M. A., Deekshatulu, B. L., & Chandra, P. (2013). Classification of Heart Disease Using K- Nearest Neighbor and Genetic Algorithm. Procedia Technology, 10, 85–94. http://doi.org/10.1016/j.protcy.2013.12.340
- Karaboga, D., Aslan, S., & O, U. N. O. O. O. U. N. U. U. N. (n.d.). A New Emigrant Creation Strategy for Parallel Artifissscial Bee Colony Algorithm ØÒ ××, 689–694.
- Mane, P. V. M. (n.d.). Review of Multimodal Biometrics : Applications , challenges and Research Areas, 3(5), 90–95.
- National Science and Technology Council Subcommittee on Biometrics. (2006). Face Recognition.
- Noorjahan Khatoon, M. K. G. (2013). Multimodal Biometrics: A Review. IRACST - International Journal of Computer Science and Information Technology & Security(IJCSITS), ISSN: 2249-9555 Vol. 3, No.3, June 2013, 3(3), 230–236.
- Panchal, T. (2013). Multimodal Biometric System. International Journal of Advanced Research in Computer Science and Software Engineering, 3(5), 1360–1363.
- Shaikh, J. (2016). Review of Hand Feature of Unimodal and Multimodal Biometric System. International Journal of Computer Applications, 133(5), 19–24[
- Meenakshi sharma and Dr. Himanshu Aggarwal,“EHR Adoption in India: Potential and the Challenges”, Indian Journal of Science and Technology,2016.
- Tashtarian, F., Yaghmaee Moghaddam, M. H., Sohraby, K., & Effati, S. (2015). On Maximizing the Lifetime of Wireless Sensor Networks in Event-Driven Applications With Mobile Sinks. IEEE Transactions on Vehicular Technology, 64(7), 3177–3189. http://doi.org/10.1109/TVT.2014.2354338
- Yang, X., & Hossein Gandomi, A. (2012). Bat algorithm: a novel approach for global engineering optimization. Engineering Computations, 29(5), 464–483. http://doi.org/10.1108/02644401211235834