首页 > 最新文献

2008 IEEE International Multitopic Conference最新文献

英文 中文
Wireless sensor networks - a security perspective 无线传感器网络——安全视角
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777734
H. Tahir, S. Shah
Increased interest in the field of wireless sensor networks has proved that wireless sensor networks can have a broad variety of applications. Current applications of wireless sensor networks are in the fields of medical care, battlefield monitoring, environment monitoring, surveillance and disaster prevention. Many of these applications require that the sensor network be deployed in an area that is hostile, inaccessible and mission critical. Keeping in view the resource starved nature of sensor networks and its application domains, the requirements for a secure sensor network has become two fold. We have analyzed sensor networks from a security perspective by pointing out vulnerabilities in sensor networks. A summary of threat models and security benchmarks has also been pointed out to explain the aims and objectives of a secure wireless senor network. We have also explained various attacks and their prevention mechanisms.
人们对无线传感器网络领域的兴趣日益浓厚,这证明了无线传感器网络可以有广泛的应用。目前无线传感器网络的应用主要集中在医疗、战场监测、环境监测、监视和防灾等领域。其中许多应用都要求传感器网络部署在敌对、不可访问和关键任务的区域。考虑到传感器网络及其应用领域资源匮乏的本质,对传感器网络安全的要求已经变成了两个方面。我们从安全的角度分析了传感器网络,指出了传感器网络的漏洞。威胁模型和安全基准的总结也被指出来解释一个安全的无线传感器网络的目的和目标。我们还解释了各种攻击及其预防机制。
{"title":"Wireless sensor networks - a security perspective","authors":"H. Tahir, S. Shah","doi":"10.1109/INMIC.2008.4777734","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777734","url":null,"abstract":"Increased interest in the field of wireless sensor networks has proved that wireless sensor networks can have a broad variety of applications. Current applications of wireless sensor networks are in the fields of medical care, battlefield monitoring, environment monitoring, surveillance and disaster prevention. Many of these applications require that the sensor network be deployed in an area that is hostile, inaccessible and mission critical. Keeping in view the resource starved nature of sensor networks and its application domains, the requirements for a secure sensor network has become two fold. We have analyzed sensor networks from a security perspective by pointing out vulnerabilities in sensor networks. A summary of threat models and security benchmarks has also been pointed out to explain the aims and objectives of a secure wireless senor network. We have also explained various attacks and their prevention mechanisms.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126138368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Modeling inter-failure time series using neural networks 用神经网络建模故障间时间序列
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777772
S. Zaidi, S. N. Danial, B. Usmani
Software inter-failure time series analysis has always been a question mark for the reliability engineers. Many models have been proposed since the problem of reliability discovers, but none of them produces adequate results. This study presents a neural network perspective of modeling inter-failure time of software. We compare different parametric models of software reliability with our proposed neural network model and found the proposed more suitable.
软件故障间时间序列分析一直是困扰可靠性工程师的一个难题。自可靠性问题发现以来,人们提出了许多模型,但没有一个模型能得出令人满意的结果。本文提出了一种基于神经网络的软件故障间时间建模方法。将不同的软件可靠性参数模型与本文提出的神经网络模型进行了比较,发现本文提出的模型更为合适。
{"title":"Modeling inter-failure time series using neural networks","authors":"S. Zaidi, S. N. Danial, B. Usmani","doi":"10.1109/INMIC.2008.4777772","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777772","url":null,"abstract":"Software inter-failure time series analysis has always been a question mark for the reliability engineers. Many models have been proposed since the problem of reliability discovers, but none of them produces adequate results. This study presents a neural network perspective of modeling inter-failure time of software. We compare different parametric models of software reliability with our proposed neural network model and found the proposed more suitable.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127399525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Best practices for software security: An overview 软件安全的最佳实践:概述
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777730
A. Yasar, D. Preuveneers, Y. Berbers, G. Bhatti
With the growth of software flaws there is a rise in the demand of security embedding to achieve the goal of secure software development in a more efficient manner. Different practices are in use to keep the software intact. These practices also meant to be scrutinized for better results on the basis of the level of security, efficiency and complexity they are providing. It may also be weighted on the basis of Confidentiality, Integrity and Availability (CIA). Software security is a step by step procedure which can not be achieved just at a specific level but it should be taken into account from the beginning of the Software Development Life Cycle (SDLC). In this paper, we have taken into account some of the best practices for secure software development and categorized them based on the phases in software development lifecycle. The results enable us to draw a clear picture of the best practices in software development which will enable a developer to follow them on a particular SDLC phase.
随着软件缺陷的增多,为了更有效地实现安全软件开发的目标,对安全嵌入的需求也在增加。使用不同的实践来保持软件的完整。还应当根据这些做法所提供的安全性、效率和复杂性的水平对其进行审查,以获得更好的结果。它也可以在机密性、完整性和可用性(CIA)的基础上进行加权。软件安全是一个循序渐进的过程,不能只在特定的级别上实现,但应从软件开发生命周期(SDLC)的开始就考虑到这一点。在本文中,我们考虑了安全软件开发的一些最佳实践,并根据软件开发生命周期中的各个阶段对它们进行了分类。结果使我们能够清晰地描绘出软件开发中的最佳实践,这将使开发人员能够在特定的SDLC阶段遵循它们。
{"title":"Best practices for software security: An overview","authors":"A. Yasar, D. Preuveneers, Y. Berbers, G. Bhatti","doi":"10.1109/INMIC.2008.4777730","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777730","url":null,"abstract":"With the growth of software flaws there is a rise in the demand of security embedding to achieve the goal of secure software development in a more efficient manner. Different practices are in use to keep the software intact. These practices also meant to be scrutinized for better results on the basis of the level of security, efficiency and complexity they are providing. It may also be weighted on the basis of Confidentiality, Integrity and Availability (CIA). Software security is a step by step procedure which can not be achieved just at a specific level but it should be taken into account from the beginning of the Software Development Life Cycle (SDLC). In this paper, we have taken into account some of the best practices for secure software development and categorized them based on the phases in software development lifecycle. The results enable us to draw a clear picture of the best practices in software development which will enable a developer to follow them on a particular SDLC phase.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115774371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Throughput and connectivity using constraint based mobility model for mobile ad hoc networks 基于约束的移动自组织网络的吞吐量和连通性
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777744
H. Ramzan, A. Iqbal
Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One of the most important methods for evaluating the characteristics of ad hoc networking protocols is through the use of simulation. The topology and movement of the nodes in the simulation are key factors in the performance of the network protocol under study. Once the nodes have been initially distributed, the mobility model dictates the movement of the nodes within the network. In the performance evaluation of a protocol for an ad hoc network, the protocol should be tested under realistic conditions which should impersonate the real world conditions. In order to overcome the short comings of the problem, design and analysis of restricted mobility model is the key. In this restricted mobility model we used the fact that mobile nodes moving under OLSR protocol tend to concentrate or settle down in the center and define a smaller mobility region then defined in the simulation parameters.
自组织网络是一种新的移动主机无线网络模式。与传统的移动无线网络不同,自组织网络不依赖于任何固定的基础设施。相反,主机相互依赖以保持网络连接。军事战术和其他安全敏感行动仍然是自组织网络的主要应用,尽管由于其独特的特性,有采用自组织网络用于商业用途的趋势。评估自组织网络协议特性的最重要的方法之一是通过使用仿真。仿真中节点的拓扑结构和运动是影响所研究网络协议性能的关键因素。一旦节点被初始分配,移动性模型就会指示网络中节点的移动。在对自组织网络的协议进行性能评估时,应该在模拟真实世界条件的实际条件下对协议进行测试。为了克服这一问题的不足,限制移动模型的设计和分析是关键。在这个受限迁移模型中,我们利用了在OLSR协议下移动的节点倾向于在中心集中或定居的事实,并定义了一个比仿真参数中定义的更小的迁移区域。
{"title":"Throughput and connectivity using constraint based mobility model for mobile ad hoc networks","authors":"H. Ramzan, A. Iqbal","doi":"10.1109/INMIC.2008.4777744","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777744","url":null,"abstract":"Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One of the most important methods for evaluating the characteristics of ad hoc networking protocols is through the use of simulation. The topology and movement of the nodes in the simulation are key factors in the performance of the network protocol under study. Once the nodes have been initially distributed, the mobility model dictates the movement of the nodes within the network. In the performance evaluation of a protocol for an ad hoc network, the protocol should be tested under realistic conditions which should impersonate the real world conditions. In order to overcome the short comings of the problem, design and analysis of restricted mobility model is the key. In this restricted mobility model we used the fact that mobile nodes moving under OLSR protocol tend to concentrate or settle down in the center and define a smaller mobility region then defined in the simulation parameters.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115780591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Applying data mining in medical data with focus on mortality related to accident in children 数据挖掘在医疗数据中的应用,重点关注儿童事故死亡率
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777728
M.H. Saraee, Z. Ehghaghi, Hoda Meamarzadeh, B. Zibanezhad
Trauma is the main leading cause of death in children; we need a tool to prevent and predict the outcome in these patients. Data mining is the science of extracting the useful information from a large amount of data sets or databases that leads to statistical and logical analysis and looking for patterns that could help the decision makers. In This paper we offer an approach for using data mining in classifying mortality rate related to accidents in children under 15. These data were gathered from the patient files which were recorded in the medical record section of the Alzahra Hospital in Isfahan. The data mining methods in use are decision tree and Bayes' theorem. Applying DM techniques to the data brings about very interesting and valuable results. It is concluded that in this case, comparing the result of evaluating the models on test set, decision tree works better than Bayes' theorem. In this paper, we have used Clementine12.0 for creating the models.
创伤是儿童死亡的主要原因;我们需要一种工具来预防和预测这些患者的结果。数据挖掘是从大量数据集或数据库中提取有用信息的科学,从而进行统计和逻辑分析,并寻找可以帮助决策者的模式。本文提出了一种利用数据挖掘对15岁以下儿童事故死亡率进行分类的方法。这些数据是从记录在伊斯法罕Alzahra医院病历科的病人档案中收集的。使用的数据挖掘方法是决策树和贝叶斯定理。将数据挖掘技术应用到数据中会带来非常有趣和有价值的结果。通过对模型在测试集上的评价结果进行比较,得出决策树优于贝叶斯定理的结论。在本文中,我们使用Clementine12.0来创建模型。
{"title":"Applying data mining in medical data with focus on mortality related to accident in children","authors":"M.H. Saraee, Z. Ehghaghi, Hoda Meamarzadeh, B. Zibanezhad","doi":"10.1109/INMIC.2008.4777728","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777728","url":null,"abstract":"Trauma is the main leading cause of death in children; we need a tool to prevent and predict the outcome in these patients. Data mining is the science of extracting the useful information from a large amount of data sets or databases that leads to statistical and logical analysis and looking for patterns that could help the decision makers. In This paper we offer an approach for using data mining in classifying mortality rate related to accidents in children under 15. These data were gathered from the patient files which were recorded in the medical record section of the Alzahra Hospital in Isfahan. The data mining methods in use are decision tree and Bayes' theorem. Applying DM techniques to the data brings about very interesting and valuable results. It is concluded that in this case, comparing the result of evaluating the models on test set, decision tree works better than Bayes' theorem. In this paper, we have used Clementine12.0 for creating the models.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116052144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Web warehouse: Towards efficient distributed business management Web仓库:迈向高效的分布式业务管理
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777771
S. Malik, M. U. Shaikh
Distributed Database is a very well known and popular concept that most of the organizations use when they need to store data over the network or in different locations. Now when they have large amount of operational data they want to use that data to support decision making as a mean of gaining competitive advantages. But the problem is that these operational systems were not designed to support any sort of decision making. Organizations need to have a way in which they can use their archive and operational data for decision making. Data warehouse was designed to meet the requirements of the organizations which receive data from different operational sources and support decision making. Organizations have there data on the web and as the organization matures data also increases. The problem for business organizations was to manage that data effectively because there is no global structure and organization of data available on the web. To maintain data effectively on the web we need a Web Warehouse. Web warehouse is the management of data on the web, it is a data warehouse on the net. This paper describes the effectiveness of the web warehouse leading towards business intelligence.
分布式数据库是一个非常知名和流行的概念,大多数组织在需要通过网络或在不同位置存储数据时都会使用它。现在,当他们拥有大量的操作数据时,他们希望利用这些数据来支持决策,作为获得竞争优势的一种手段。但问题是,这些操作系统并不是为支持任何决策而设计的。组织需要有一种方法来使用他们的存档和操作数据进行决策。数据仓库的设计是为了满足从不同的操作源接收数据并支持决策制定的组织的需求。组织在网络上有很多数据,随着组织的成熟,数据也在增加。商业组织面临的问题是如何有效地管理这些数据,因为网络上没有数据的全局结构和组织。为了在web上有效地维护数据,我们需要一个web仓库。Web仓库是在Web上管理数据,它是一种基于网络的数据仓库。本文描述了web仓库在实现商业智能方面的有效性。
{"title":"Web warehouse: Towards efficient distributed business management","authors":"S. Malik, M. U. Shaikh","doi":"10.1109/INMIC.2008.4777771","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777771","url":null,"abstract":"Distributed Database is a very well known and popular concept that most of the organizations use when they need to store data over the network or in different locations. Now when they have large amount of operational data they want to use that data to support decision making as a mean of gaining competitive advantages. But the problem is that these operational systems were not designed to support any sort of decision making. Organizations need to have a way in which they can use their archive and operational data for decision making. Data warehouse was designed to meet the requirements of the organizations which receive data from different operational sources and support decision making. Organizations have there data on the web and as the organization matures data also increases. The problem for business organizations was to manage that data effectively because there is no global structure and organization of data available on the web. To maintain data effectively on the web we need a Web Warehouse. Web warehouse is the management of data on the web, it is a data warehouse on the net. This paper describes the effectiveness of the web warehouse leading towards business intelligence.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116513468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Modeling and control of a doubly fed induction generator using PSO algorithm 基于粒子群算法的双馈感应发电机建模与控制
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777701
Abolfazl Jalilvand, M. Jabbari, G. Govar, H. Khoshkhoo
This paper focused on modeling and controlling of a doubly-fed induction generator (DFIG). The presented model is developed based on the basic flux linkage, voltage and torque equations. In order to control the DFIG's active power, a suitable method based on PSO algorithm has been proposed. The simulation results show that the presented method is a useful way to improve the output power of DFIG.
本文主要研究双馈感应发电机(DFIG)的建模与控制。该模型是基于基本磁链、电压和转矩方程建立的。为了控制DFIG的有功功率,提出了一种基于粒子群算法的有功功率控制方法。仿真结果表明,该方法是提高DFIG输出功率的有效途径。
{"title":"Modeling and control of a doubly fed induction generator using PSO algorithm","authors":"Abolfazl Jalilvand, M. Jabbari, G. Govar, H. Khoshkhoo","doi":"10.1109/INMIC.2008.4777701","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777701","url":null,"abstract":"This paper focused on modeling and controlling of a doubly-fed induction generator (DFIG). The presented model is developed based on the basic flux linkage, voltage and torque equations. In order to control the DFIG's active power, a suitable method based on PSO algorithm has been proposed. The simulation results show that the presented method is a useful way to improve the output power of DFIG.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124844875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enhanced Block Based color Image Encryption technique with confusion 增强的基于块的彩色图像加密技术
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777736
S. Gilani, M. A. Bangash
Encryption is used to disguise data making it unintelligible to unauthorized observers. Providing such security is especially important when data is being transmitted across open networks such as the Internet. Since, image data have special features such as bulk capacity, high redundancy and high correlation among pixels that imposes special requirements on any encryption technique. In this paper, an extension is proposed to the block-based image encryption algorithm (BBIE) scheme that works in combination with Blowfish encryption algorithm [16]. Whereas BBIE is meant for 256-color bitmap images, the proposed technique also handles RGB color images and, for the cases studied, improves the security of digital images. In this enhanced technique, which we call the enhanced block based image encryption technique (EBBIE) the digital image is decomposed into blocks, then two consecutive operations - rotating each 3D true color image block by 90deg followed by flipping row-wise down - are performed to complicated the relationship between original and processed image. These rendered blocks are then scrambled to form a transformed confused image followed by Blowfish cryptosystem that finally encrypts the image with secret key. Experimental results show that correlation between adjacent pixels is decreased in all color components and entropy is increased for the cases studied.
加密用于伪装数据,使未经授权的观察者无法理解。当数据通过开放网络(如Internet)传输时,提供这样的安全性尤为重要。由于图像数据具有特殊的特性,如大容量、高冗余和像素之间的高相关性,这对任何加密技术都提出了特殊的要求。本文对基于块的图像加密算法(BBIE)方案进行了扩展,该方案与Blowfish加密算法结合使用[16]。虽然BBIE适用于256色位图图像,但所提出的技术也可以处理RGB彩色图像,并且对于所研究的案例,可以提高数字图像的安全性。在这种增强技术中,我们称之为增强的基于块的图像加密技术(EBBIE),该技术将数字图像分解成块,然后将每个三维真彩色图像块旋转90度,然后向下翻转两个连续的操作,使原始图像和被处理图像之间的关系变得复杂。然后,这些渲染块被打乱,形成一个转换后的混乱图像,然后是Blowfish密码系统,最后用密钥加密图像。实验结果表明,所研究的情况下,相邻像素之间的相关性降低,熵增加。
{"title":"Enhanced Block Based color Image Encryption technique with confusion","authors":"S. Gilani, M. A. Bangash","doi":"10.1109/INMIC.2008.4777736","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777736","url":null,"abstract":"Encryption is used to disguise data making it unintelligible to unauthorized observers. Providing such security is especially important when data is being transmitted across open networks such as the Internet. Since, image data have special features such as bulk capacity, high redundancy and high correlation among pixels that imposes special requirements on any encryption technique. In this paper, an extension is proposed to the block-based image encryption algorithm (BBIE) scheme that works in combination with Blowfish encryption algorithm [16]. Whereas BBIE is meant for 256-color bitmap images, the proposed technique also handles RGB color images and, for the cases studied, improves the security of digital images. In this enhanced technique, which we call the enhanced block based image encryption technique (EBBIE) the digital image is decomposed into blocks, then two consecutive operations - rotating each 3D true color image block by 90deg followed by flipping row-wise down - are performed to complicated the relationship between original and processed image. These rendered blocks are then scrambled to form a transformed confused image followed by Blowfish cryptosystem that finally encrypts the image with secret key. Experimental results show that correlation between adjacent pixels is decreased in all color components and entropy is increased for the cases studied.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126181061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Time-efficient dynamic scene management using octrees 使用八叉树进行高效的动态场景管理
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777718
A. Gupta, S. Vaishnavi, S. Malviya
In this paper, we present a method of management of a dynamic scene using octrees. The use of octrees in image rendering in 3D space is suitable as the octree is essentially a tree data structure in three dimensions. Most such methods resort to modification - namely, resizing and rebuilding - of the nodes of the tree used in order to accomplish the desired results. The main concern in such an approach is to minimize, or preferably, avoid resizing of nodes during runtime, as it takes a great toll on system resources. Here we present an algorithm that completely avoids resizing of nodes, hence achieving greater efficiency. This aspect of the algorithm is also borne out by the experimental conclusions we have obtained.
本文提出了一种利用八叉树对动态场景进行管理的方法。在三维空间中使用八叉树进行图像渲染是合适的,因为八叉树本质上是三维空间中的树形数据结构。大多数这样的方法诉诸于修改——即调整大小和重建——所使用的树的节点,以实现预期的结果。这种方法的主要关注点是尽量减少,或者最好避免在运行时调整节点大小,因为这会对系统资源造成很大的损失。在这里,我们提出了一种完全避免调整节点大小的算法,从而获得更高的效率。我们得到的实验结论也证实了算法的这一方面。
{"title":"Time-efficient dynamic scene management using octrees","authors":"A. Gupta, S. Vaishnavi, S. Malviya","doi":"10.1109/INMIC.2008.4777718","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777718","url":null,"abstract":"In this paper, we present a method of management of a dynamic scene using octrees. The use of octrees in image rendering in 3D space is suitable as the octree is essentially a tree data structure in three dimensions. Most such methods resort to modification - namely, resizing and rebuilding - of the nodes of the tree used in order to accomplish the desired results. The main concern in such an approach is to minimize, or preferably, avoid resizing of nodes during runtime, as it takes a great toll on system resources. Here we present an algorithm that completely avoids resizing of nodes, hence achieving greater efficiency. This aspect of the algorithm is also borne out by the experimental conclusions we have obtained.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114650804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and simulation of orthomode transducer in Ku-frequency band on HFSS HFSS上ku频段正交换能器的设计与仿真
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777751
U. Rashid
Transducer is a device usually electrical, electronic or electro-mechanical that converts one type of energy to another for various purposes including measurement or information transfer. The type of transducer we are implementing is orthomode transducer. It is a polarization diplexer, a device that forms part of an antenna feed system and serves to combine or separate orthogonally polarized signals. This diplexer can also separate orthogonal polarizations within the same frequency band. In the current paper it has been deployed as a transmitter and receiver at the same time by receiving one signal at some particular downlink frequency (10.95 GHz to 12.75 GHz) at one rectangular port and transmitting the other signal at uplink frequency (14 GHz to 14.5 GHz) by using the second rectangular port. Our model of ortho-mode transducer built on a circular waveguide and supplied with step transitions in input rectangular waveguide ports is proposed. Scattering matrix parameters, return loss, VSWR, coupling and TX loss are analyzed on the HFSS. By using computer aided design we have taken the design figure for the workshop process. After having manufactured it, we tested OMT on network analyzer and compared the results with the simulate ones.
换能器通常是一种电气、电子或机电设备,它将一种类型的能量转换为另一种类型的能量,用于各种目的,包括测量或信息传递。我们要实现的换能器类型是正交换能器。它是一种极化双工器,一种构成天线馈电系统一部分的装置,用于组合或分离正交极化信号。这种双工器还可以在同一频带内分离正交偏振。在本论文中,它被部署为同时作为发射器和接收器,通过一个矩形端口接收一个特定下行频率(10.95 GHz至12.75 GHz)的信号,并通过第二个矩形端口发送另一个上行频率(14 GHz至14.5 GHz)的信号。提出了一种基于圆波导的正交模换能器模型,并在矩形波导输入端提供阶跃跃迁。分析了HFSS的散射矩阵参数、回波损耗、驻波比、耦合和TX损耗。利用计算机辅助设计,绘制了车间工艺流程的设计图。制作完成后,在网络分析仪上对OMT进行了测试,并与仿真结果进行了比较。
{"title":"Design and simulation of orthomode transducer in Ku-frequency band on HFSS","authors":"U. Rashid","doi":"10.1109/INMIC.2008.4777751","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777751","url":null,"abstract":"Transducer is a device usually electrical, electronic or electro-mechanical that converts one type of energy to another for various purposes including measurement or information transfer. The type of transducer we are implementing is orthomode transducer. It is a polarization diplexer, a device that forms part of an antenna feed system and serves to combine or separate orthogonally polarized signals. This diplexer can also separate orthogonal polarizations within the same frequency band. In the current paper it has been deployed as a transmitter and receiver at the same time by receiving one signal at some particular downlink frequency (10.95 GHz to 12.75 GHz) at one rectangular port and transmitting the other signal at uplink frequency (14 GHz to 14.5 GHz) by using the second rectangular port. Our model of ortho-mode transducer built on a circular waveguide and supplied with step transitions in input rectangular waveguide ports is proposed. Scattering matrix parameters, return loss, VSWR, coupling and TX loss are analyzed on the HFSS. By using computer aided design we have taken the design figure for the workshop process. After having manufactured it, we tested OMT on network analyzer and compared the results with the simulate ones.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121932772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2008 IEEE International Multitopic Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1