Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Singh, Jatinder
- Simulation and Characterization of Junction Less CMOS Inverter at Various Technology Nodes
Abstract Views :151 |
PDF Views:0
Authors
Affiliations
1 Lovely Professional University, Phagwar -144411, Punjab, IN
2 University Institute of Engineering Technology, Panjab University, Chandigarh – 160014, Punjab, IN
1 Lovely Professional University, Phagwar -144411, Punjab, IN
2 University Institute of Engineering Technology, Panjab University, Chandigarh – 160014, Punjab, IN
Source
Indian Journal of Science and Technology, Vol 9, No 47 (2016), Pagination:Abstract
The simulation and drawing based on new type of technology namely junction less transistor technology CMOS inverter is discussed in this paper at various channel lengths. The transient curve, noise margin, various differences between conventional and junction less technology has been illustrated in this paper. The surface conduction and bulk conduction steps using visual TCAD is also expressed. The designing and fabrication steps along with the pros and cons have been characterized. The short channel parameter on which all other parameters directly or indirectly depends is calculated for both conventional and junction less transistor at different nodes. The noise margin and propagation delay at channel length 10nm, 20nm, 30nm and 40nm is calculated using TCAD simulation software. It has been found that CMOS inverter is giving best results when made using junction less technology.Keywords
CMOS, Junction Less Transistor (JLT), Noise margin, TCAD.- Offline Transactions Functionality in eWallets
Abstract Views :176 |
PDF Views:0
Authors
Affiliations
1 House No. 9, Gali No. 21, Karan Vihar, Karnal – 132001, Haryana, IN
1 House No. 9, Gali No. 21, Karan Vihar, Karnal – 132001, Haryana, IN
Source
Indian Journal of Science and Technology, Vol 10, No 16 (2017), Pagination:Abstract
Background/Objectives: When eWallet server is not responding, user faces many problems including long waiting time to get response from servers, expiration of sessions and lots of frustrations also. This research suggests the idea that how existing mobile phone features like Bluetooth or Messaging (SMS) can do digital money transactions in offline mode (for the time being) at customer end. Methods: e-Paycards can be used (Send or receive) with existing functionality of mobile phone like Bluetooth or Messaging to do financial transactions promptly at the time when eWallet server is not responding. Mobile phones mustbe installed and pre-logged-in eWallet application and the application must be secured. Findings: e-Paycards can be used by customers and merchants; customer can send these e-Paycards to merchant through Bluetooth and/or Messaging functionality of mobile phone.Keywords
Offline Transactions in eWallet, Offline Paytm, Offline Mobiquick, Offline Transactions eWallet.- Hardware Level Security in e-Wallet: Today’s Need
Abstract Views :183 |
PDF Views:0
Authors
Affiliations
1 House No. 9, Gali No. 21, Karan Vihar, Karnal, Haryana - 132001, IN
1 House No. 9, Gali No. 21, Karan Vihar, Karnal, Haryana - 132001, IN
Source
Indian Journal of Science and Technology, Vol 10, No 11 (2017), Pagination:Abstract
After demonetization in INDIA, eWallets are very actively participating for financial transactions in Indian economy. Very huge population in INDIA, today,is using eWallets. In one side, eWallets are providing very convenience in shopping and online transactions and on another side people are fearing for any online frauds because some eWallets are not following fraud proof security practices, they are using Software security practices like password only. Passwords can sometime be easy breakable or can be stolen online. Hardware level security in various e-Wallets, which are active in INDIA, can reduce these types of frauds. Through hardware level security the e-Wallet would be more secure and can be used freely without worry of fraud. To implement hardware level security measure, application developers have to code applications from scratch. Developers need to find a way so that recoding of application can be avoided.Keywords
e-Wallets, e-Wallet Security, Hardware Level Security in e-Wallets, Qualcomm’s in Mobile App- An Intelligent Intrusion Detection and Prevention System for Safeguard Mobile Adhoc Networks against Malicious Nodes
Abstract Views :178 |
PDF Views:0
Authors
Affiliations
1 IKG PTU, Kapurthala – 144603, Punjab, IN
1 IKG PTU, Kapurthala – 144603, Punjab, IN
Source
Indian Journal of Science and Technology, Vol 10, No 14 (2017), Pagination:Abstract
Objectives: Mobile Adhoc Networks (MANETs) due to their dynamic topology are more liable to have security problems. These Adhoc Networks are easily susceptible to various types of attacker nodes. Out of the numerous attacks black hole, flooding and selective packet drop attacks are more hazardous attacks which reduce the performance of network under various parameters. Due to this problem, there is a need to develop a new approach for mitigating these attacker nodes simultaneously to improve the performance of MANETs Methods: An Intelligent Intrusion Detection and Prevention System (IIDPS) is proposed for preventing the ad hoc network from these three types of attacks under the AODV protocol. The proposed mechanism works on the basis of trust management. This research work consists of a central network administrator for detecting malicious nodes in the MANETs. IIDPS includes a trust manager which categorizes the trust of the network into different categories. Different types of malicious nodes are identified by the behavior classifier based on a predefined threshold and risk factor conditions. Findings: The proposed IIDPS is responsible for preventing MANETs from the black hole, flooding, and selective packet drop attacker nodes. At the same time, the proposed prevention system improves the performance of the network in the terms of numerous parameters like throughput, overhead, delay, packet delivery ratio etc. Novelty/ Improvement: There is no technique exist for MANETs under AODV protocol for detecting black hole, flooding and selective packet drop malicious nodes. The proposed IIDPS solves this issue to handle of these multiple attacks at the same time.Keywords
Intelligent Intrusion Detection and Prevention System (IIDPS), Malicious Nodes, Mobile Adhoc Networks, Security, Trust Management- Time Based Prioritization of Test Cases in Regression Testing
Abstract Views :181 |
PDF Views:0
Authors
Affiliations
1 House No. 9, Gali No. 21, Karan Vihar, Karnal, Haryana − 132001, IN
1 House No. 9, Gali No. 21, Karan Vihar, Karnal, Haryana − 132001, IN