Pillais Institute of Information Technology

Navi Mumbai, India

Pillais Institute of Information Technology

Navi Mumbai, India

Time filter

Source Type

Ranade S.R.,SAMEER | Nair D.U.,Pillais Institute of Information Technology
2011 IEEE Applied Electromagnetics Conference, AEMC 2011 | Year: 2011

Short range radar sensors for automotive radar applications are operating in the frequency range of 22GHz to 29 GHz band in the United States. UWB sensors in the frequency domain of 24 GHz based on GaAs technology are already established in the automotive radar market. Recently automotive radar sensors based on SiGe technology chipset have also been reported in this frequency band. Thus our effort is to design a substrate integrated waveguide (SIW) based H plane Horn antenna on a PTFE substrate, with an end-fire beam, which would be better suited for automotive radar applications. Rectangular dielectric loaded substrate integrated waveguide (SIW) H-plane sectoral horn antennas, operating at various frequencies in the range of 21 GHz to 28 GHz have been fabricated and tested. These antennas have been simulated and fabricated on a substrate of thickness 3.2mm and the dielectric material used is PolyTetraFluoroEthylene (PTFE). The SIW H plane horn antenna with dielectric loading resulted in improved gain and beamwidth. The length of the H Plane sectoral horn antenna was reduced further after optimizing the dielectric loading which resulted in further increase of gain and also narrow beam widths in the E-plane and H-plane. The results from the simulation and those from the measurement which are in good agreement are presented in the paper. The antenna prototypes that have been fabricated are not only compact but also low cost and they can be integrated with the high speed digital technology required for all the other subsystems of the automotive radar on the same PTFE substrate. © 2011 IEEE.


Krishnan D.,Pillais Institute of Information Technology | Chatterjee M.,Pillais Institute of Information Technology
Communications in Computer and Information Science | Year: 2012

Cloud Computing is the recent buzz word in computing which has enormous potential to revolutionize the IT industry. Cloud opened up new computing scenarios coupled with many significant benefits, however they also turned to become new avenues of attacks and exploits. This paper proposes a unique Distributed Intrusion Detection System (DIDS) based on a novel combination of two variant trends in intrusion detection-the behavior based and knowledge based intrusion detection mechanisms. The behavior based approach facilitates improved detection in the dynamic cloud environment and the knowledge based approach supports the detection scheme with its definitive rule base. The functionality of both these approaches has been improved by the addition of an adaptive approach which helps to significantly assist in lowering the false positives. In addition to this, another novel and the striking advantage of the proposed detection scheme is the alert clustering and analyzing facility thereby helping all cooperating nodes in detecting false alarms from any malicious nodes. DOS attacks in one node can be sent as alerts to help other cooperating nodes in updating themselves about new attack patterns leading to early detection and prevention of attacks. This scheme collectively helps to make the underlying cloud infrastructure more immune to attacks and continue to provide services to users. © 2012 Springer-Verlag.


Almin S.B.,Pillais Institute of Information Technology | Chatterjee M.,Pillais Institute of Information Technology
Procedia Computer Science | Year: 2015

Android is the world's most popular and the largest installed base of any mobile platform. It has gained huge popularity among Smartphones and is growing very fast because it gives its users a world class platform for creating apps and games and allows them to be distributed instantly. Secondly, it also offers ample free third party applications to be downloaded and installed from Google Play, the premier marketplace for selling and distributing Android apps. Android openness has made it a favourite for users and developers alike. Many apps are getting downloaded by the user from play store every month. However due to this, the number of harmful apps in the form of malwares getting downloaded are also increasing. These malwares performs the various activities behind the scene, such as stealing various sensitive information of the users and signing up victims to subscription services. As a result of this, users are getting affected and their privacy gets compromised. As developers are also free to develop and publish their own creation in a play store without undergoing any scrutiny of their apps, they tend to take the advantage of user's inability to analyze the risk of such apps. This paper proposes a system which would help the users in analysing and removing such harmful apps and thereby protecting their security and privacy. This is achieved by analysing the various permissions used by an application that it has requested during installation. The overall process of analysing apps is done using clustering and classification techniques. The major objective of the proposed system is to detect and remove the malwares that are present in the user's Android device. © 2015 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license.


Gangal A.C.,Indian Institute of Technology Bombay | Edla R.,Indian Institute of Technology Bombay | Iyer K.,Indian National Environmental Engineering Research Institute | Biniwale R.,Indian National Environmental Engineering Research Institute | And 2 more authors.
International Journal of Hydrogen Energy | Year: 2012

Chemical hydrides due to their light weight and high storage capacity are considered to be promising hydrogen storage materials for both mobile and stationary applications. Ammonia Borane (AB) is a novel material with very high hydrogen content (19.6 wt %) per mass. The decomposition of AB takes place in three steps at desorption temperatures of about 100 °C, 140 °C and above 1000 °C respectively releasing 1 mol of hydrogen in each step. The major obstacle towards the use of AB as a hydrogen store is its irreversibility and slow kinetics. With the additives the decomposition temperature could be reduced and the kinetics can be improved. Effect of addition of Zeolites on decomposition of Ammonia Borane at different temperatures is reported in this paper. It was observed that the kinetics behaviour is greatly affected by addition of Zeolites with considerable reduction in the induction or warm-up period. © 2011, Hydrogen Energy Publications, LLC. Published by Elsevier Ltd. All rights reserved.


Patil J.G.,Pillais Institute of Information Technology | Vijayan T.,Pillais Institute of Information Technology
IEEE Transactions on Plasma Science | Year: 2010

Electric-field-induced oxygen corona in an innovative r-z diode of ozone generator is investigated. The cathode (K) of the diode is made of several sharp-ended nozzles arranged in many radial planes on an axial mast symmetrically located inside an anode cup (A). The resulting high fields over megavolts per meter produced stray field emissions from nozzle pinnacles, which initiated secondary electron emissions that sustained a corona plume encircling the cathode. Electrons in the plume multiplied through avalanche ionizations, which resulted in electron densities over 10 14 10 15 m -3 in a self-consistent scheme. This, in a cold corona, formed in a wide A-K gap with a reduced field of E/n o2 ∼ 100 Td in a pressure of P ∼ bar and at a temperature of T = 300 K, gave a high ozone formation of ∼ 10 19 m -3. Current transported in short gaps, however, rendered Joule heating and inhibition of ozone genesis. © 2010 IEEE.


Gupta A.,Indian Institute of Technology Bombay | Vashistha M.,Pillais Institute of Information Technology | Sharma P.,Indian Institute of Technology Bombay
Thin Solid Films | Year: 2014

A single junction hydrogenated amorphous silicon (a-Si:H) solar cell with incorporating hydrogenated nanocrystalline silicon (nc-Si:H) and a-Si:H (nc-Si:H/a-Si:H) multiple quantum wells (MQW) in the intrinsic region is proposed. Its theoretical realization has been made on the basis of existing quantum well solar cell models to determine the influence of the incorporated MQW over the conversion efficiency of a-Si:H solar cell. The atomic energy states and density of states of nc-Si:H/a-Si:H quantum wells (QW) are simulated at various QW widths. Based on the simulated results the absorption coefficient of nc-Si:H/a-Si:H QW is estimated and these values along with the evaluated atomic energy states of QW are used to optimize the QW width for the designed quantum well solar cell. The optimum well width is found to be 10 nm, where the absorption coefficient increases in three steps starting from 1.0 × 104 cm- 1 to 3.0 × 104 cm- 1 for photon energy of 1.2 eV to 1.4 eV, respectively, and thereafter remained constant for higher energies. The estimated absorption coefficient of 10 nm QW is involved in the calculations of photocurrent density to study the effect of number of incorporated QW on short circuit current density (JSC), open circuit voltage (VOC) and efficiency (η) of a-Si:H solar cell. The JSC, VOC, and η are presented for up to 100 QW incorporated a-Si:H solar cell. The results show that the conversion efficiency of a-Si:H solar cell is directly related to the number of incorporated QW, which is mainly due to the growing short circuit current density with increasing number of QW. The current-voltage plot for 100-QW a-Si:H solar cell with intrinsic region of 5.5 μm showed a peak power of 13.3 mW/cm2. © 2013 Elsevier B.V.


Gupta P.,Pillais Institute of Information Technology | Shinde S.K.,Pillais Institute of Information Technology
Communications in Computer and Information Science | Year: 2011

The paper content is genetic algorithm based intrusion detection system. It is a simulation type system comes under networking area. The first system in the line is an anomaly-based IDS implemented as a simple linear classifier. This system exhibits high both detection and false-positive rate. For that reason, we have added a simple system based on if-then rules that filter the decision of the linear classifier and in that way significantly reduces false-positive rate. In the first step of our solution we deploy feature extraction techniques in order to reduce the amount of data that the system needs to process. Hence, our system is simple enough not to introduce significant computational overhead, but at the same time is accurate, adaptive and fast due to genetic algorithms. The model is verified on KDD99 benchmark dataset. © 2011 Springer-Verlag.


Manna J.,Indian Institute of Technology Bombay | Roy B.,Indian Institute of Technology Bombay | Vashistha M.,Pillais Institute of Information Technology | Sharma P.,Indian Institute of Technology Bombay
International Journal of Hydrogen Energy | Year: 2014

Cobalt boride is known to act as a catalyst to facilitate the hydrolysis reaction of sodium borohydride. The catalytic nature of cobalt boride is immensely dependent upon the synthesis procedure and reaction conditions used, especially on the relative amount of Co(II) and borohydride used for catalyst preparation. In the current work a set of catalysts were prepared by varying the cobalt(II) and borohydride ratio in the reactant solution. The prepared catalysts were well characterized using different characterizing tools like XRD, FTIR, FEG-SEM, FEG-TEM, ICP-AES and XPS. The effect of the catalyst on the hydrolysis of sodium borohydride was thoroughly studied and reported in the current work. The catalytic activity of the catalyst was observed to be highly dependent on the reduced cobalt content. It was observed that the excess amount of borohydride used to synthesize the catalyst, was not increasing the catalytic activity after the complete reduction of cobalt. Copyright © 2013, Hydrogen Energy Publications, LLC. Published by Elsevier Ltd. All rights reserved.


Gavankar D.C.,Pillais Institute of Information Technology | Chatterjee M.,Pillais Institute of Information Technology | Lawand S.J.,Pillais Institute of Information Technology
Proceedings of the 2012 World Congress on Information and Communication Technologies, WICT 2012 | Year: 2012

Advances in video technology and computing gave a way to the growth for applications and devices in real time video monitoring. Video data containing real and accurate information is being used greatly by monitoring system. Monitoring systems are widely used at public institutions, banks, corporate and laboratories where security is very an important aspect. There is a growing need to visually monitor an area from a remote location using a video camera or web cam. The proliferation of web cams and the increasing use of streaming media have improved the ability of users to communicate with each other, to be entertained and to monitor or perform surveillance. Along with this the security of data travelling over network becomes essential. In this paper we propose a selective encryption based video monitoring system (SEVMS), which securely transfer data over untrusted nefwork. The live video data transferred over network is compressed and then selectively encrypted. Since the live video is selectively encrypted any unauthenticated person will not be able to view it. The system also provides facility of video on demand (VOD). © 2012 IEEE.


Krishnan D.,Pillais Institute of Information Technology | Chatterjee M.,Pillais Institute of Information Technology
Proceedings of the 2012 World Congress on Information and Communication Technologies, WICT 2012 | Year: 2012

Cloud computing is the recent innovator which has lured the IT world with its attractive features like multi tenancy, massive scalability, elasticity, pay-as-you-use etc. However, this promising avenue is being loomed by the dark shades of security threats. The cloud users and the providers are equally concerned with the gaps in trust and privacy, identity and access management, auditing and accounting facilities available in the cloud infrastructure. We have proposed a model for comprehensive security management in the cloud environment. This model is envisioned as Security Management As a Service (SMaS) through which both cloud users and vendors can avail the facilities for Identity and Access Management, Trust and Privacy, Auditing and Accounting. The striking feature of our work is that its facilities can be utilized as per demand which is very essential for today's dynamic world. In addition SMaS helps customers to migrate securely to cloud environment with considerably less technical upgrade. © 2012 IEEE.

Loading Pillais Institute of Information Technology collaborators
Loading Pillais Institute of Information Technology collaborators