Pub Date : 2009-12-11DOI: 10.1109/ICET.2009.5353193
S. Hussain, M. Qadir
Fault monitoring is one of the main activities of fault tolerant distributed systems. It is required to determine the suspected /crashed component and proactively take the recovery steps to keep the system alive. The main objective of the fault monitoring activity is to quickly and correctly identify the faults. There are many techniques for fault monitoring which have general and specific parameters which influence their performance. In this paper we find the parameters that can help us classify the fault monitoring techniques. We created a benchmark ACI (Adaptation, Convergence, Intelligence) and applied it on current techniques.
{"title":"A benchmark for fault monitors in distributed systems","authors":"S. Hussain, M. Qadir","doi":"10.1109/ICET.2009.5353193","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353193","url":null,"abstract":"Fault monitoring is one of the main activities of fault tolerant distributed systems. It is required to determine the suspected /crashed component and proactively take the recovery steps to keep the system alive. The main objective of the fault monitoring activity is to quickly and correctly identify the faults. There are many techniques for fault monitoring which have general and specific parameters which influence their performance. In this paper we find the parameters that can help us classify the fault monitoring techniques. We created a benchmark ACI (Adaptation, Convergence, Intelligence) and applied it on current techniques.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121501025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-11DOI: 10.1109/ICET.2009.5353146
Saad Islam, Fatima Ajmal
GSM bears numerous security vulnerabilities. Although GSM's architecture is designed in such a way to provide various security features like authentication, data/ signaling confidentiality, and secrecy of a user yet the GSM channel is susceptible to replay, interleaving and man-in-the-middle attacks. The GSM speech service is secure up to the point where speech enters the core network. However to achieve end-to-end security it is desired that the GSM subscriber, not the network operator controls the encryption on the speech channel. A new approach of encryption at the user-end is introduced. In this paper we have tested our encryption technique on the GSM communication system using TMS320C6713 DSP Starter Kit (DSK), in real-time. Our technique encrypts the speech before entering the GSM handset which adds security and privacy. The encryption algorithm being private to the communicating GSM subscribers, the GSM channel will become exclusively confidential for them. The DSK board was used as a separate module of the system implementing the encryption algorithm. Real-time experiments were conducted to check the performance of the system in terms of its performance and latency rate.
{"title":"Developing and implementing encryption algorithm for addressing GSM security issues","authors":"Saad Islam, Fatima Ajmal","doi":"10.1109/ICET.2009.5353146","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353146","url":null,"abstract":"GSM bears numerous security vulnerabilities. Although GSM's architecture is designed in such a way to provide various security features like authentication, data/ signaling confidentiality, and secrecy of a user yet the GSM channel is susceptible to replay, interleaving and man-in-the-middle attacks. The GSM speech service is secure up to the point where speech enters the core network. However to achieve end-to-end security it is desired that the GSM subscriber, not the network operator controls the encryption on the speech channel. A new approach of encryption at the user-end is introduced. In this paper we have tested our encryption technique on the GSM communication system using TMS320C6713 DSP Starter Kit (DSK), in real-time. Our technique encrypts the speech before entering the GSM handset which adds security and privacy. The encryption algorithm being private to the communicating GSM subscribers, the GSM channel will become exclusively confidential for them. The DSK board was used as a separate module of the system implementing the encryption algorithm. Real-time experiments were conducted to check the performance of the system in terms of its performance and latency rate.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121720855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-04-11DOI: 10.1109/ICET.2009.5353174
Ibrar ullah Jan, N. Iqbal
The most challenging issue in the field of visual control system is the accurate estimation of depth upon which all other parameters of pose estimation may depend. Here we have introduced a new approach for the depth estimation problem of a visual control system with a moving camera and stationary target. A unique visual pattern is designed to achieve the desired depth of the vision based system. In this paper the unknown depths of the special geometrical feature points are estimated from the pre-calculated depth calibrated equations, whose affects are then combined to acquire the desired goal. This specialized technique doesn't require any conventional camera calibration parameters, e.g., camera intrinsic parameters; rather it works on the specialized and accurate depth calculating calibration equations described in this paper. Simulation and experimental applications are presented which verify the performance of the proposed technique. The vision system, i.e., a wireless camera, pointing downwards, is mounted with a mechanical assembly which can move laterally as well as up and down. The required algorithm is designed in MATLAB which is capable of reading real-time images and processing it for proper lateral position and desired depths calculation at particular instants.
{"title":"A new technique for geometry based visual depth estimation for uncalibrated camera","authors":"Ibrar ullah Jan, N. Iqbal","doi":"10.1109/ICET.2009.5353174","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353174","url":null,"abstract":"The most challenging issue in the field of visual control system is the accurate estimation of depth upon which all other parameters of pose estimation may depend. Here we have introduced a new approach for the depth estimation problem of a visual control system with a moving camera and stationary target. A unique visual pattern is designed to achieve the desired depth of the vision based system. In this paper the unknown depths of the special geometrical feature points are estimated from the pre-calculated depth calibrated equations, whose affects are then combined to acquire the desired goal. This specialized technique doesn't require any conventional camera calibration parameters, e.g., camera intrinsic parameters; rather it works on the specialized and accurate depth calculating calibration equations described in this paper. Simulation and experimental applications are presented which verify the performance of the proposed technique. The vision system, i.e., a wireless camera, pointing downwards, is mounted with a mechanical assembly which can move laterally as well as up and down. The required algorithm is designed in MATLAB which is capable of reading real-time images and processing it for proper lateral position and desired depths calculation at particular instants.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122277462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}