Pub Date : 2006-04-07DOI: 10.1109/TPSD.2006.5507409
P. Frenger
IEEE 1451 is a family of related low-level standards covering the use of networked sensors and actuators. These techniques improve interoperability by enabling simple transducers to be upgraded to intelligent status. IEEE 1451 utilizes interface protocols from hardwired and wireless communication practices. IEEE 1275 describes a computer network initialization and testing process. This standard employs a byte-coded virtual machine to operate independent of CPU, software, or network configuration. It contains its own embedded programming language. The author describes how these complimentary standards may be utilized to create novel plug-and-play, hot-swap, self-configuring, pre-calibrated, multi-drop networks, for closed-loop, intrinsically-safe medical, scientific and robotic applications.
{"title":"IEEE 1451 with IEEE 1275: Synergy for sensing and control","authors":"P. Frenger","doi":"10.1109/TPSD.2006.5507409","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507409","url":null,"abstract":"IEEE 1451 is a family of related low-level standards covering the use of networked sensors and actuators. These techniques improve interoperability by enabling simple transducers to be upgraded to intelligent status. IEEE 1451 utilizes interface protocols from hardwired and wireless communication practices. IEEE 1275 describes a computer network initialization and testing process. This standard employs a byte-coded virtual machine to operate independent of CPU, software, or network configuration. It contains its own embedded programming language. The author describes how these complimentary standards may be utilized to create novel plug-and-play, hot-swap, self-configuring, pre-calibrated, multi-drop networks, for closed-loop, intrinsically-safe medical, scientific and robotic applications.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116929781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-07DOI: 10.1109/TPSD.2006.5507407
R. Hewett, Ali Goksu, Soma Datta
Microarray gene expression profiling technology generates huge high-dimensional data. Finding analysis techniques that can cope with such data characteristics is crucial in Bioinformatics. This paper proposes a variation of an ensemble learning approach combined with a clustering technique to extract “simple” and yet “vital” rules from genomic data. The paper describes the approach and evaluates it on cancer gene expression data sets. We report experimental results including comparisons with other results obtained from a similar ensemble learning approach as well as some sophisticated techniques such as support vector machines.
{"title":"From cancer gene expression data to simple vital rules","authors":"R. Hewett, Ali Goksu, Soma Datta","doi":"10.1109/TPSD.2006.5507407","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507407","url":null,"abstract":"Microarray gene expression profiling technology generates huge high-dimensional data. Finding analysis techniques that can cope with such data characteristics is crucial in Bioinformatics. This paper proposes a variation of an ensemble learning approach combined with a clustering technique to extract “simple” and yet “vital” rules from genomic data. The paper describes the approach and evaluates it on cancer gene expression data sets. We report experimental results including comparisons with other results obtained from a similar ensemble learning approach as well as some sophisticated techniques such as support vector machines.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126637473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-07DOI: 10.1109/TPSD.2006.5507436
S. Agaian, B. M. Rodriguez, Gilbert L. Peterson
Steganographic fingerprints are convened with the individuality of the steganographic methods. The basic goals of this article are: 1. To evaluate sequential and randomly embedded steganographic evidence within digital images. 2. To identify the “steganographic fingerprint” of spatial domain based steganographic methods. Steganographic fingerprinting is the next step towards forensic analysis, reachable only if one may localize steganographic content within an image. The presented detection method works equally well for sequential and random embedding. We will show that the new method may improve the message length estimation, detection accuracy and give an indication of the embedding method. In addition we will show the false alarm rate of 0.9 for the proposed method, while the false alarm rate for the commonly used technique RS Steganalysis is 2.4.
{"title":"New steganalysis technique for the digital media forensics examiner","authors":"S. Agaian, B. M. Rodriguez, Gilbert L. Peterson","doi":"10.1109/TPSD.2006.5507436","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507436","url":null,"abstract":"Steganographic fingerprints are convened with the individuality of the steganographic methods. The basic goals of this article are: 1. To evaluate sequential and randomly embedded steganographic evidence within digital images. 2. To identify the “steganographic fingerprint” of spatial domain based steganographic methods. Steganographic fingerprinting is the next step towards forensic analysis, reachable only if one may localize steganographic content within an image. The presented detection method works equally well for sequential and random embedding. We will show that the new method may improve the message length estimation, detection accuracy and give an indication of the embedding method. In addition we will show the false alarm rate of 0.9 for the proposed method, while the false alarm rate for the commonly used technique RS Steganalysis is 2.4.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116384009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-07DOI: 10.1109/TPSD.2006.5507414
Ranjith Raghunath, Joann M. Moreno, A. Grigoryan
In this paper, we propose a new form of the amplitude response for designing low-pass filters, that is defined by a modified arctangent function in the frequency domain. This is a parameterized and very smooth function which can be used for any tolerance scheme with given specifications. The filter depends on two parameters that allow us to straighten the magnitude response from the passband to stopband without increasing the computational complexity of the filter. The main properties of the low-pass filter with the proposed magnitude response, which we call the Arc low-pass filter, are considered and compared with the well known Chebyshev and Butterworth filters.
{"title":"The novel Arc low-pass filter","authors":"Ranjith Raghunath, Joann M. Moreno, A. Grigoryan","doi":"10.1109/TPSD.2006.5507414","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507414","url":null,"abstract":"In this paper, we propose a new form of the amplitude response for designing low-pass filters, that is defined by a modified arctangent function in the frequency domain. This is a parameterized and very smooth function which can be used for any tolerance scheme with given specifications. The filter depends on two parameters that allow us to straighten the magnitude response from the passband to stopband without increasing the computational complexity of the filter. The main properties of the low-pass filter with the proposed magnitude response, which we call the Arc low-pass filter, are considered and compared with the well known Chebyshev and Butterworth filters.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122990202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-07DOI: 10.1109/TPSD.2006.5507466
Michael Worden
Recent updates to federal government and Department of Defense (DoD) security policies have opened the door to the official use of Open Source Software (OSS) as a solution set for the development of secure enterprise systems. New policies published by the National Institute of Standards and Technology (NIST) and the DoD have significantly changed the guidelines associated with deployment of industry-standard OSS security solutions, including: ● Linux - including the NSA sponsored “Security Enhanced Linux” product ● OpenSSL - a full-strength general-purpose cryptography ● Tripwire and Open Source Tripwire® - A change Monitoring and Analysis and auditing product
{"title":"Leveraging Open Source solutions for secure government systems","authors":"Michael Worden","doi":"10.1109/TPSD.2006.5507466","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507466","url":null,"abstract":"Recent updates to federal government and Department of Defense (DoD) security policies have opened the door to the official use of Open Source Software (OSS) as a solution set for the development of secure enterprise systems. New policies published by the National Institute of Standards and Technology (NIST) and the DoD have significantly changed the guidelines associated with deployment of industry-standard OSS security solutions, including: ● Linux - including the NSA sponsored “Security Enhanced Linux” product ● OpenSSL - a full-strength general-purpose cryptography ● Tripwire and Open Source Tripwire® - A change Monitoring and Analysis and auditing product","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114565407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There exist a variety of fractal-based data hiding methods in an image. The main contribution of the previous work was to embed data by modifying the original, pre-existing image or embedding an encrypted datastream in an image. In this paper, we propose a fractal based approach for hiding sensitive information in a cover image (including artificially generated fractal images). The fractal parameters of the image are altered by the steganographic data while the image is generated. This results in an image that is generated with the data already hidden in it and not added after the fact. We show that the input parameters of the algorithm, such as the type of fractal and number of iterations, will serve as a simple encryption key for the hidden information. We also explain how the capacity of the image is affected by the variation of the parameters. Finally, we demonstrate that the proposed algorithms are immune to the commonly used steganographic detection algorithms.
{"title":"Fractal steganography using artificially generated images","authors":"S. Agaian, Johanna M. Susmilch","doi":"10.1117/12.777663","DOIUrl":"https://doi.org/10.1117/12.777663","url":null,"abstract":"There exist a variety of fractal-based data hiding methods in an image. The main contribution of the previous work was to embed data by modifying the original, pre-existing image or embedding an encrypted datastream in an image. In this paper, we propose a fractal based approach for hiding sensitive information in a cover image (including artificially generated fractal images). The fractal parameters of the image are altered by the steganographic data while the image is generated. This results in an image that is generated with the data already hidden in it and not added after the fact. We show that the input parameters of the algorithm, such as the type of fractal and number of iterations, will serve as a simple encryption key for the hidden information. We also explain how the capacity of the image is affected by the variation of the parameters. Finally, we demonstrate that the proposed algorithms are immune to the commonly used steganographic detection algorithms.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128205228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-07DOI: 10.1109/TPSD.2006.5507417
Bill Diong
This paper considers the problem of achieving the minimum THD of the staircase-modulated output voltage of single-phase multilevel inverters, with or without elimination of the lowest harmonics. The minimal THD values together with the corresponding necessary step angles (and also dc source ratios when the source values are not constrained to be equal) have been obtained for various waveform cases. The results show that requiring harmonic elimination yields slightly to somewhat worse distortion, and that using unequal dc source voltages is better than using equal ones, as expected.
{"title":"THD-optimal staircase modulation of single-phase multilevel inverters","authors":"Bill Diong","doi":"10.1109/TPSD.2006.5507417","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507417","url":null,"abstract":"This paper considers the problem of achieving the minimum THD of the staircase-modulated output voltage of single-phase multilevel inverters, with or without elimination of the lowest harmonics. The minimal THD values together with the corresponding necessary step angles (and also dc source ratios when the source values are not constrained to be equal) have been obtained for various waveform cases. The results show that requiring harmonic elimination yields slightly to somewhat worse distortion, and that using unequal dc source voltages is better than using equal ones, as expected.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128590094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-07DOI: 10.1109/TPSD.2006.5507418
Bijoy Chat
The use of variable speed drive (VSD) has been increased significantly to improve the energy efficiency and conservation. It is estimated that pumping system accounts for nearly 20% of the world's energy used by electric motors and 25% to 50% of the total electrical energy usage in certain industrial facilities [1]. As such, there is a significant incentive to improve the efficiency and performance of pumps.
{"title":"Power quality issue with variable speed drive a case study for oil exploration operation in Russia","authors":"Bijoy Chat","doi":"10.1109/TPSD.2006.5507418","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507418","url":null,"abstract":"The use of variable speed drive (VSD) has been increased significantly to improve the energy efficiency and conservation. It is estimated that pumping system accounts for nearly 20% of the world's energy used by electric motors and 25% to 50% of the total electrical energy usage in certain industrial facilities [1]. As such, there is a significant incentive to improve the efficiency and performance of pumps.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116274572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-07DOI: 10.1109/TPSD.2006.5507459
B. Chatt, Rajesh Bhairampally, Amarsh Movva, A. Chopra
This paper discusses a technique where input-output (I/O) is scrambled by mathematical manipulation. The process is effective in diverting the attention of adversary in terms of actual purpose of the application software. The technique is particularly useful when the software application performs certain number of mathematical equations, and produces a numerical result. The paper also demonstrates how the approach is effective in preventing reverse-engineering of the application. The paper illustrates the implementation of the scheme for a software application, and describes various software issues and practicality of implementation.
{"title":"A pseudo random I/O scrambling and transformation approach in prevention of software piracy","authors":"B. Chatt, Rajesh Bhairampally, Amarsh Movva, A. Chopra","doi":"10.1109/TPSD.2006.5507459","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507459","url":null,"abstract":"This paper discusses a technique where input-output (I/O) is scrambled by mathematical manipulation. The process is effective in diverting the attention of adversary in terms of actual purpose of the application software. The technique is particularly useful when the software application performs certain number of mathematical equations, and produces a numerical result. The paper also demonstrates how the approach is effective in preventing reverse-engineering of the application. The paper illustrates the implementation of the scheme for a software application, and describes various software issues and practicality of implementation.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122278403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-07DOI: 10.1109/TPSD.2006.5507430
S. Yuan, Jianning Wang, Yumin Zhang, J. Krasinski
It was found experimentally that the photocurrent intensity in a Metal-Semiconductor-Metal (MSM) structure has a strong dependence on the position of the incident laser beam; however, there is no satisfactory explanation of this phenomenon. We simulated this process with device simulator ATLAS, and the result agrees with experiment pretty well. We also investigated various factors such as material property and external bias voltage that affect the current density, and found that the photocurrent changed significantly with these parameters.
{"title":"Position dependent photocurrent intensity of MSM photodetectors","authors":"S. Yuan, Jianning Wang, Yumin Zhang, J. Krasinski","doi":"10.1109/TPSD.2006.5507430","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507430","url":null,"abstract":"It was found experimentally that the photocurrent intensity in a Metal-Semiconductor-Metal (MSM) structure has a strong dependence on the position of the incident laser beam; however, there is no satisfactory explanation of this phenomenon. We simulated this process with device simulator ATLAS, and the result agrees with experiment pretty well. We also investigated various factors such as material property and external bias voltage that affect the current density, and found that the photocurrent changed significantly with these parameters.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133038878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}