Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342840
V. Rajaravivarma, G. Bellarmine
Businesses face increasing expectations from a global market requiring new services that fit consumers' immediate needs with a high degree of reliability, scalability and performance. Traditional architectures can sometimes have trouble meeting these expectations, so more fault-tolerant architectures are needed to fulfil these needs. This article introduces the concept of computer clustering for a Web application environment. It describes the advantages of computer clustering, different types of clusters and common configurations for computer clusters which ensure reliability, improved performance and scalability for business applications. Steps are provided for the configuration of a computer cluster for Web applications using BEA Systems' Weblogic Server 8.1 and Sun's Java Systems Web Server 6.1.
企业面临着来自全球市场的日益增长的期望,需要新的服务,以满足消费者的直接需求,具有高度的可靠性、可伸缩性和性能。传统的体系结构有时难以满足这些期望,因此需要更多的容错体系结构来满足这些需求。本文介绍了用于Web应用程序环境的计算机集群的概念。它描述了计算机集群的优点、不同类型的集群和计算机集群的常用配置,这些配置可确保可靠性、改进的性能和业务应用程序的可伸缩性。本文提供了使用BEA Systems的Weblogic Server 8.1和Sun的Java Systems Web Server 6.1为Web应用程序配置计算机集群的步骤。
{"title":"Web application clusters","authors":"V. Rajaravivarma, G. Bellarmine","doi":"10.1109/SECON.2007.342840","DOIUrl":"https://doi.org/10.1109/SECON.2007.342840","url":null,"abstract":"Businesses face increasing expectations from a global market requiring new services that fit consumers' immediate needs with a high degree of reliability, scalability and performance. Traditional architectures can sometimes have trouble meeting these expectations, so more fault-tolerant architectures are needed to fulfil these needs. This article introduces the concept of computer clustering for a Web application environment. It describes the advantages of computer clustering, different types of clusters and common configurations for computer clusters which ensure reliability, improved performance and scalability for business applications. Steps are provided for the configuration of a computer cluster for Web applications using BEA Systems' Weblogic Server 8.1 and Sun's Java Systems Web Server 6.1.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124206134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342875
Huiqing Yang, Donald Forrester, Christal Harris
Intelligent systems for information search have drawn significant attention. The paper introduces an expert system for genealogy search. By applying the expert system technology, an inference model has been developed, which can yield knowledge discovery, mine explicit data stored in a database and produce implicit relationships. Based on the model, a PHLIPS implementation is investigated. An online demonstration version is available.
{"title":"A PHLIPS-based expert system for genealogy search","authors":"Huiqing Yang, Donald Forrester, Christal Harris","doi":"10.1109/SECON.2007.342875","DOIUrl":"https://doi.org/10.1109/SECON.2007.342875","url":null,"abstract":"Intelligent systems for information search have drawn significant attention. The paper introduces an expert system for genealogy search. By applying the expert system technology, an inference model has been developed, which can yield knowledge discovery, mine explicit data stored in a database and produce implicit relationships. Based on the model, a PHLIPS implementation is investigated. An online demonstration version is available.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121896845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342854
M. Zhu, Xin Zhao, R. Outlaw, K. Hou, P. Miraldo, D. Manos, T. Tyler, O. Shenderova
A 2D atomically thin nanostructure, carbon nanosheet, was synthesized via radio frequency plasma enhanced chemical vapor deposition. Carbon nanosheets are free-standing, and have flat surface morphologies, atomically thin edges, and defective graphitic structures. Field electron emission from carbon nanosheets was measured under diode mode. Carbon nanosheets samples have turn-on fields of 5-10 V/mum, and can yield a total emission current of 28 mA from an area of 8 times 8 mm2 and an emission current density of ~2 mA/mm2 from an area of 1 times 1 mm2. Back-gated triode devices using carbon nanosheets as cathode material were also designed, fabricated, and tested under triode mode. A total emission current of 1.3 mA was achieved from one single device.
{"title":"High brightness field emission from carbon nanosheets and back-gated devices","authors":"M. Zhu, Xin Zhao, R. Outlaw, K. Hou, P. Miraldo, D. Manos, T. Tyler, O. Shenderova","doi":"10.1109/SECON.2007.342854","DOIUrl":"https://doi.org/10.1109/SECON.2007.342854","url":null,"abstract":"A 2D atomically thin nanostructure, carbon nanosheet, was synthesized via radio frequency plasma enhanced chemical vapor deposition. Carbon nanosheets are free-standing, and have flat surface morphologies, atomically thin edges, and defective graphitic structures. Field electron emission from carbon nanosheets was measured under diode mode. Carbon nanosheets samples have turn-on fields of 5-10 V/mum, and can yield a total emission current of 28 mA from an area of 8 times 8 mm2 and an emission current density of ~2 mA/mm2 from an area of 1 times 1 mm2. Back-gated triode devices using carbon nanosheets as cathode material were also designed, fabricated, and tested under triode mode. A total emission current of 1.3 mA was achieved from one single device.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122068708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342926
A. Kumar, R. Kumar, S. Agarwal
This paper builds effective wireless patient management system (WPMS) using open software that can be accessed via a personal digital assistance (PDA) or a cell phone. This allows health care professionals to gain access to patient information from anywhere at anytime. In this project, the wireless patient management system was built using Java technology. The client side was implemented using MIDlet and the server side was developed using Java servlets. A study was conducted to observe the effects of distance between client and server on the response time of a wireless versus wired connectivity. It was observed that the distance between the client and server does not have a significant impact on the response time of wired and wireless connectivity.
{"title":"Wireless information system for patient health care management","authors":"A. Kumar, R. Kumar, S. Agarwal","doi":"10.1109/SECON.2007.342926","DOIUrl":"https://doi.org/10.1109/SECON.2007.342926","url":null,"abstract":"This paper builds effective wireless patient management system (WPMS) using open software that can be accessed via a personal digital assistance (PDA) or a cell phone. This allows health care professionals to gain access to patient information from anywhere at anytime. In this project, the wireless patient management system was built using Java technology. The client side was implemented using MIDlet and the server side was developed using Java servlets. A study was conducted to observe the effects of distance between client and server on the response time of a wireless versus wired connectivity. It was observed that the distance between the client and server does not have a significant impact on the response time of wired and wireless connectivity.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123480975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342843
T. Islam, S. Mangayyagari, R. Sankar
Speaker recognition history dates back to some four decades, and yet it has not been reliable enough to be considered as a standalone security system. This paper focuses on the enhancement of speaker recognition through fusion of likelihood scores generated by arithmetic harmonic sphericity (AHS) and hidden Markov model (HMM) techniques. Due to the contrastive nature of AHS and HMM, we have observed a significant performance improvement of 22% and 6% true acceptance rate at 5% false acceptance rate, when this fusion technique was evaluated on two different datasets - YOHO and USF multimodal biometric dataset, respectively. Performance enhancement has been achieved on both the datasets, however performance on YOHO was comparatively higher than that on USF dataset, owing to the fact that USF dataset is a noisy outdoor dataset whereas YOHO is an indoor dataset.
{"title":"Enhanced speaker recognition based on score level fusion of AHS and HMM","authors":"T. Islam, S. Mangayyagari, R. Sankar","doi":"10.1109/SECON.2007.342843","DOIUrl":"https://doi.org/10.1109/SECON.2007.342843","url":null,"abstract":"Speaker recognition history dates back to some four decades, and yet it has not been reliable enough to be considered as a standalone security system. This paper focuses on the enhancement of speaker recognition through fusion of likelihood scores generated by arithmetic harmonic sphericity (AHS) and hidden Markov model (HMM) techniques. Due to the contrastive nature of AHS and HMM, we have observed a significant performance improvement of 22% and 6% true acceptance rate at 5% false acceptance rate, when this fusion technique was evaluated on two different datasets - YOHO and USF multimodal biometric dataset, respectively. Performance enhancement has been achieved on both the datasets, however performance on YOHO was comparatively higher than that on USF dataset, owing to the fact that USF dataset is a noisy outdoor dataset whereas YOHO is an indoor dataset.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123393467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342967
G. Khanduri, B. Panwar
This paper presents an approach to model the current gain in SiGe DHBTs, by using the fitting coefficients to modify the model parameters of Si BJTs in OrCAD PSPICE. The effect of dynamic retarding potential barrier at base-collector heterojunction in SiGe DHBTs is also modeled by using a resistor in parallel with internal base resistance RB.
{"title":"Current gain modeling of SiGe DHBTs in SPICE including retarding potential barrier effect","authors":"G. Khanduri, B. Panwar","doi":"10.1109/SECON.2007.342967","DOIUrl":"https://doi.org/10.1109/SECON.2007.342967","url":null,"abstract":"This paper presents an approach to model the current gain in SiGe DHBTs, by using the fitting coefficients to modify the model parameters of Si BJTs in OrCAD PSPICE. The effect of dynamic retarding potential barrier at base-collector heterojunction in SiGe DHBTs is also modeled by using a resistor in parallel with internal base resistance RB.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125302423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342953
R. Tashakkori, A. L. Reagan
Medical images contain a vast amount of information that, if effectively analyzed, could lead to the early detection and diagnosis of abnormalities. Often medical images of high resolution are stored on computers and therefore require a large amount of disk space. In recent years, there have been extensive interest and research in the development of effective and efficient methods of extracting patterns and features from medical images. Knowledge discovery tools can be used to efficiently analyze large data, but often a data reduction technique is required to obtain a manageable size data. In this research we used wavelet lifting schemes for data reduction and several shape histogram-inspired data sectorization techniques for knowledge discovery and analyses.
{"title":"Fuzzy sectorization in knowledge discovery of digital mammograms","authors":"R. Tashakkori, A. L. Reagan","doi":"10.1109/SECON.2007.342953","DOIUrl":"https://doi.org/10.1109/SECON.2007.342953","url":null,"abstract":"Medical images contain a vast amount of information that, if effectively analyzed, could lead to the early detection and diagnosis of abnormalities. Often medical images of high resolution are stored on computers and therefore require a large amount of disk space. In recent years, there have been extensive interest and research in the development of effective and efficient methods of extracting patterns and features from medical images. Knowledge discovery tools can be used to efficiently analyze large data, but often a data reduction technique is required to obtain a manageable size data. In this research we used wavelet lifting schemes for data reduction and several shape histogram-inspired data sectorization techniques for knowledge discovery and analyses.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116686217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342892
R. Wu
Semantic metadata involved in information aggregation in component based service, it allows two separate entities coordinate and ultimately decide on the same implicit ground-rules captures the essence of interoperability. Semantic metadata is crucial for enterprise interoperability to integrate the metadata between business, service and information layers, this creates visibility of vertical alignment within enterprise architecture and use metadata configuration to construct the mapping between each layer. There are four basic types of semantic metadata, top down structure retrieval, bottom up information aggregation, remote meta script execution and retrieval and repository in holding the integration interoperability. Each type of metadata play important role and contribute their values to enterprise integration.
{"title":"Semantic metadata in enterprise integration","authors":"R. Wu","doi":"10.1109/SECON.2007.342892","DOIUrl":"https://doi.org/10.1109/SECON.2007.342892","url":null,"abstract":"Semantic metadata involved in information aggregation in component based service, it allows two separate entities coordinate and ultimately decide on the same implicit ground-rules captures the essence of interoperability. Semantic metadata is crucial for enterprise interoperability to integrate the metadata between business, service and information layers, this creates visibility of vertical alignment within enterprise architecture and use metadata configuration to construct the mapping between each layer. There are four basic types of semantic metadata, top down structure retrieval, bottom up information aggregation, remote meta script execution and retrieval and repository in holding the integration interoperability. Each type of metadata play important role and contribute their values to enterprise integration.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116722492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342943
Y. Liao
To consider model inaccuracies, existing state estimation approaches augment the state vector by adding the suspicious model parameters. In this paper, the extended least squares estimation approach is applied to design a more general state estimation algorithm for considering power network model errors, without adding the uncertain model parameters to the state vector. Preliminary studies have demonstrated that the method may enhance estimation accuracy when model errors exist.
{"title":"State estimation algorithm considering effects of model inaccuracies","authors":"Y. Liao","doi":"10.1109/SECON.2007.342943","DOIUrl":"https://doi.org/10.1109/SECON.2007.342943","url":null,"abstract":"To consider model inaccuracies, existing state estimation approaches augment the state vector by adding the suspicious model parameters. In this paper, the extended least squares estimation approach is applied to design a more general state estimation algorithm for considering power network model errors, without adding the uncertain model parameters to the state vector. Preliminary studies have demonstrated that the method may enhance estimation accuracy when model errors exist.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121076692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342847
M. Ketel
The mobile agent (MA) paradigm with its properties of autonomy, asynchronicity, and local resource exploitation suits the needs of many distributed applications. The typical applications for MAs include information retrieval, e-commerce, mobile computing, and network management. However, there are many security issues associated with this technology. In this paper, we give an overview of MA and their applications, and discuss the security vulnerabilities at both the agent level and host/agent server level.
{"title":"Applications of mobile agents and related security issues","authors":"M. Ketel","doi":"10.1109/SECON.2007.342847","DOIUrl":"https://doi.org/10.1109/SECON.2007.342847","url":null,"abstract":"The mobile agent (MA) paradigm with its properties of autonomy, asynchronicity, and local resource exploitation suits the needs of many distributed applications. The typical applications for MAs include information retrieval, e-commerce, mobile computing, and network management. However, there are many security issues associated with this technology. In this paper, we give an overview of MA and their applications, and discuss the security vulnerabilities at both the agent level and host/agent server level.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128156715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}