首页 > 最新文献

2007 5th Student Conference on Research and Development最新文献

英文 中文
Analysis of Network Communication Attacks 网络通信攻击分析
Pub Date : 2007-12-12 DOI: 10.1109/SCORED.2007.4451370
S. Kamal, B. Issac
Over the last decade, computer networks have been subject to widespread security attacks. Some are spoofing attacks, Denial of service (DoS) attacks and its various forms (like ping attacks, smurfing etc), password sniffing, packet capturing along with traffic analysis and other wireless key cracking attacks. Many of these attacks steal someone's identity and use it for exploiting the victim or others by masquerading or forgery, made the network or computer system inoperable by interrupting normal services, created a back door for re-visits etc. In this paper we analyze some of these attacks and evaluate its effectiveness, concluding with some security recommendations.
在过去的十年里,计算机网络受到了广泛的安全攻击。有些是欺骗攻击,拒绝服务(DoS)攻击及其各种形式(如ping攻击,smurfing等),密码嗅探,数据包捕获以及流量分析和其他无线密钥破解攻击。许多此类攻击窃取某人的身份,并通过伪装或伪造来利用受害者或其他人,通过中断正常服务使网络或计算机系统无法操作,创建后门以重新访问等。在本文中,我们分析了其中一些攻击并评估了其有效性,最后提出了一些安全建议。
{"title":"Analysis of Network Communication Attacks","authors":"S. Kamal, B. Issac","doi":"10.1109/SCORED.2007.4451370","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451370","url":null,"abstract":"Over the last decade, computer networks have been subject to widespread security attacks. Some are spoofing attacks, Denial of service (DoS) attacks and its various forms (like ping attacks, smurfing etc), password sniffing, packet capturing along with traffic analysis and other wireless key cracking attacks. Many of these attacks steal someone's identity and use it for exploiting the victim or others by masquerading or forgery, made the network or computer system inoperable by interrupting normal services, created a back door for re-visits etc. In this paper we analyze some of these attacks and evaluate its effectiveness, concluding with some security recommendations.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115530391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Analysis of Partial Discharge Measurement Data Using a Support Vector Machine 基于支持向量机的局部放电测量数据分析
Pub Date : 2007-12-11 DOI: 10.1109/SCORED.2007.4451430
N. F. A. Aziz, L. Hao, Paul Lewin
This paper investigates the recognition of partial discharge sources by using a statistical learning theory, support vector machine (SVM). SVM provides a new approach to pattern classification and has been proven to be successful in fields such as image identification and face recognition. To apply SVM learning in partial discharge classification, data input is very important. The input should be able to fully represent different patterns in an effective way. The determination of features that describe the characteristics of partial discharge signals and the extraction of reliable information from the raw data are the key to acquiring valuable patterns of partial discharge signals. In this paper, data obtained from experiment is carried out in both time and frequency domain. By using appropriate combination of kernel functions and parameters, it is concluded that the frequency domain approach gives a better classification rate.
本文利用统计学习理论支持向量机(SVM)对局部放电源的识别进行了研究。支持向量机提供了一种新的模式分类方法,在图像识别和人脸识别等领域已被证明是成功的。为了将支持向量机学习应用于局部放电分类,数据输入是非常重要的。输入应该能够以一种有效的方式完整地表示不同的模式。确定描述局部放电信号特征的特征和从原始数据中提取可靠信息是获取局部放电信号有价值模式的关键。本文对实验得到的数据进行了时域和频域分析。通过适当地结合核函数和参数,得出频域方法具有较好的分类率。
{"title":"Analysis of Partial Discharge Measurement Data Using a Support Vector Machine","authors":"N. F. A. Aziz, L. Hao, Paul Lewin","doi":"10.1109/SCORED.2007.4451430","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451430","url":null,"abstract":"This paper investigates the recognition of partial discharge sources by using a statistical learning theory, support vector machine (SVM). SVM provides a new approach to pattern classification and has been proven to be successful in fields such as image identification and face recognition. To apply SVM learning in partial discharge classification, data input is very important. The input should be able to fully represent different patterns in an effective way. The determination of features that describe the characteristics of partial discharge signals and the extraction of reliable information from the raw data are the key to acquiring valuable patterns of partial discharge signals. In this paper, data obtained from experiment is carried out in both time and frequency domain. By using appropriate combination of kernel functions and parameters, it is concluded that the frequency domain approach gives a better classification rate.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130827433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Secure Transport Protocols for DDoS Attack Resistant Communication 抗DDoS攻击通信的安全传输协议
Pub Date : 2007-12-11 DOI: 10.1109/SCORED.2007.4451371
A.Z. Ghavidel, B. Issac
A technical solution has been proposed in this paper to secure transport protocol communication in the case of DDoS (distributed denial of service) attacks. The recent papers about DDoS attacks, especially the amplification attack looks for abnormal transaction that signals and eventually reports them. These methods may generate false positives or negatives and in turn can be quite dismal in its performance, in the wake of a real DDoS attack. This paper suggests a symmetric key exchange and hiding of a secret code in the UDP (user datagram protocol) packets. Any packet that has the secret code missing would be rejected. At first, the secure UDP protocol will be discussed and later, a similar method for the TCP (transmission control protocol) will be discussed. Finally the performance analysis is done to compare the overhead incurred.
本文提出了一种在分布式拒绝服务攻击情况下保护传输协议通信安全的技术方案。最近关于DDoS攻击的论文,特别是放大攻击寻找异常交易信号并最终报告它们。这些方法可能会产生假阳性或假阴性,反过来,在真正的DDoS攻击之后,其性能可能相当令人沮丧。本文提出了在UDP(用户数据报协议)数据包中进行对称密钥交换和隐藏密码的方法。任何丢失了密码的数据包都将被拒绝。首先,将讨论安全的UDP协议,稍后,将讨论TCP(传输控制协议)的类似方法。最后进行性能分析以比较所产生的开销。
{"title":"Secure Transport Protocols for DDoS Attack Resistant Communication","authors":"A.Z. Ghavidel, B. Issac","doi":"10.1109/SCORED.2007.4451371","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451371","url":null,"abstract":"A technical solution has been proposed in this paper to secure transport protocol communication in the case of DDoS (distributed denial of service) attacks. The recent papers about DDoS attacks, especially the amplification attack looks for abnormal transaction that signals and eventually reports them. These methods may generate false positives or negatives and in turn can be quite dismal in its performance, in the wake of a real DDoS attack. This paper suggests a symmetric key exchange and hiding of a secret code in the UDP (user datagram protocol) packets. Any packet that has the secret code missing would be rejected. At first, the secure UDP protocol will be discussed and later, a similar method for the TCP (transmission control protocol) will be discussed. Finally the performance analysis is done to compare the overhead incurred.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125439784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ascertaining of Copper Contamination from Various Sources in the Wafer Fab by Using VPD-TXRF Methodology 用VPD-TXRF方法确定晶圆厂不同来源的铜污染
Pub Date : 2007-12-01 DOI: 10.1109/SCORED.2007.4451384
H. Abu Bakar, Z. Awang, W.A.A. Wan Razali
Preventing and monitoring of Cu cross contamination become critical for the semiconductor industries since most of them are converting to mass-producing chips with copper (Cu), rather than aluminium (Al) as an interconnect element. Cu is a superior conductor of electricity, making it possible to shrink the electronic devices while further increasing performance. Presently, most of the Cu contamination emphasis on a wafer surface only using various methodologies. This in turn requires the need to improve the performance of analytical tool and to develop a new analytical measurement methodology for evaluating the levels of Cu contamination that might come from many sources in a wafer fab. In order to solve this problem, a new assessment methodology of using vapor phase decomposition and total X-ray fluorescence (VPD-TXRF) was introduced with the aim of establishing a trace elemental analysis. Currently, VPD-TXRF is mainly used as an analyzing tool to monitor Cu contamination on a wafer surface. However in this research, the same methodology is proof to be useful for measuring traces of Cu element induced from the other sources of contamination which is not necessarily from a wafer itself but also from the other sources in the whole fab. Gauge repeatability and reproducibility (GR&R) including component of variations study was applied in this research and the finding shows a positive results. A standard procedure and comparable sample also has been used which is ICPMS analyzing in purpose to set up a correlation with VPD-TXRF measurement data. Then this study aid to develop a valid procedure for Cu traces analysis, which served as a reference procedure to measure, monitor and control a Cu contamination. The final results validate this methodology as a distinguish method to measure a Cu contamination that come from many sources. Beside that, this methodology offers a cost saving since it uses a reclaim wafer as a sample preparation. Thus, this methodology is a key and can be used as process knowledge in accelerating advanced Cu interconnects development.
预防和监测铜交叉污染对半导体工业来说至关重要,因为大多数半导体工业都在转向大规模生产以铜(Cu)而不是铝(Al)作为互连元件的芯片。铜是一种优良的电导体,可以在进一步提高性能的同时缩小电子设备。目前,对铜污染的研究主要集中在晶圆表面,研究方法多种多样。这反过来又需要提高分析工具的性能,并开发一种新的分析测量方法来评估晶圆厂中可能来自许多来源的铜污染水平。为了解决这一问题,提出了一种新的气相分解-全x射线荧光(VPD-TXRF)评价方法,旨在建立一种痕量元素分析方法。目前,VPD-TXRF主要用作晶圆表面Cu污染监测的分析工具。然而,在这项研究中,同样的方法被证明是有用的,以测量痕量的铜元素的污染,不一定是从晶圆片本身,但也从整个晶圆厂的其他来源。将测量可重复性和再现性(GR&R)包括变异成分研究应用于本研究,并取得了积极的结果。为了建立与VPD-TXRF测量数据的相关性,采用了ICPMS分析的标准程序和可比样品。本研究有助于建立有效的痕量铜分析方法,为铜污染的测量、监测和控制提供参考。最终结果验证了该方法作为一种区分方法来测量来自许多来源的铜污染。除此之外,这种方法还节省了成本,因为它使用回收晶圆作为样品制备。因此,这种方法是一个关键,可以用作加速先进铜互连开发的过程知识。
{"title":"Ascertaining of Copper Contamination from Various Sources in the Wafer Fab by Using VPD-TXRF Methodology","authors":"H. Abu Bakar, Z. Awang, W.A.A. Wan Razali","doi":"10.1109/SCORED.2007.4451384","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451384","url":null,"abstract":"Preventing and monitoring of Cu cross contamination become critical for the semiconductor industries since most of them are converting to mass-producing chips with copper (Cu), rather than aluminium (Al) as an interconnect element. Cu is a superior conductor of electricity, making it possible to shrink the electronic devices while further increasing performance. Presently, most of the Cu contamination emphasis on a wafer surface only using various methodologies. This in turn requires the need to improve the performance of analytical tool and to develop a new analytical measurement methodology for evaluating the levels of Cu contamination that might come from many sources in a wafer fab. In order to solve this problem, a new assessment methodology of using vapor phase decomposition and total X-ray fluorescence (VPD-TXRF) was introduced with the aim of establishing a trace elemental analysis. Currently, VPD-TXRF is mainly used as an analyzing tool to monitor Cu contamination on a wafer surface. However in this research, the same methodology is proof to be useful for measuring traces of Cu element induced from the other sources of contamination which is not necessarily from a wafer itself but also from the other sources in the whole fab. Gauge repeatability and reproducibility (GR&R) including component of variations study was applied in this research and the finding shows a positive results. A standard procedure and comparable sample also has been used which is ICPMS analyzing in purpose to set up a correlation with VPD-TXRF measurement data. Then this study aid to develop a valid procedure for Cu traces analysis, which served as a reference procedure to measure, monitor and control a Cu contamination. The final results validate this methodology as a distinguish method to measure a Cu contamination that come from many sources. Beside that, this methodology offers a cost saving since it uses a reclaim wafer as a sample preparation. Thus, this methodology is a key and can be used as process knowledge in accelerating advanced Cu interconnects development.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129534683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Development of Pervasive Computing Application in Telemedicine System 普适计算在远程医疗系统中的应用研究
Pub Date : 2007-12-01 DOI: 10.1109/SCORED.2007.4451364
D. V. Viswacheda, P.Y.V. Lisa, M. S. Arifianto, E. Husni, L. Barukang
This paper describes the development of pervasive computing application implemented in Smart Tele-medicine System as part of the researches done in University Malaysia Sabah in order to deliver medical assistance to victims in hazardous situations and residents in the rural areas of Sabah. Issues discussed including Smart Tele-medicine System; software architecture and hardware architecture of the system; Bluetooth framework for the system and portlet development. Pervasive computing devices tend to be small and tiny is choosen in this research. In a tele-medicine environment smart devices are connected to the servers by employing Bluetooth wireless connection. Bluetooth is chosen for its convenience and mobility offered to users. It is low cost, low power consumption as well as secured. As device with WEME application installed detects the availability of Bluetooth transmission, it will attempt to build a PPP connection with request for WAS servlet which contains location information, which WAS will respond with a servlet containing the location information to the requesting WEME through which the users in the hospital emvironment can have all the facilities regarding their queries.
本文描述了智能远程医疗系统中普及计算应用的发展,作为马来西亚沙巴大学研究的一部分,目的是向处于危险情况下的受害者和沙巴农村地区的居民提供医疗援助。讨论的问题包括智能远程医疗系统;系统的软件架构和硬件架构;蓝牙框架用于系统和portlet的开发。普适计算设备趋向于小型化,本研究选择了小型化的普适计算设备。在远程医疗环境中,智能设备通过蓝牙无线连接连接到服务器。选择蓝牙是因为它为用户提供了便利性和移动性。低成本、低功耗、安全可靠。当安装了WEME应用程序的设备检测到蓝牙传输的可用性时,它将尝试建立一个PPP连接,请求包含位置信息的WAS servlet, WAS将用包含位置信息的servlet响应请求的WEME,通过该请求,医院环境中的用户可以获得有关其查询的所有设施。
{"title":"On the Development of Pervasive Computing Application in Telemedicine System","authors":"D. V. Viswacheda, P.Y.V. Lisa, M. S. Arifianto, E. Husni, L. Barukang","doi":"10.1109/SCORED.2007.4451364","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451364","url":null,"abstract":"This paper describes the development of pervasive computing application implemented in Smart Tele-medicine System as part of the researches done in University Malaysia Sabah in order to deliver medical assistance to victims in hazardous situations and residents in the rural areas of Sabah. Issues discussed including Smart Tele-medicine System; software architecture and hardware architecture of the system; Bluetooth framework for the system and portlet development. Pervasive computing devices tend to be small and tiny is choosen in this research. In a tele-medicine environment smart devices are connected to the servers by employing Bluetooth wireless connection. Bluetooth is chosen for its convenience and mobility offered to users. It is low cost, low power consumption as well as secured. As device with WEME application installed detects the availability of Bluetooth transmission, it will attempt to build a PPP connection with request for WAS servlet which contains location information, which WAS will respond with a servlet containing the location information to the requesting WEME through which the users in the hospital emvironment can have all the facilities regarding their queries.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116244914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deformable Object Manipulation - Study on Passive Tracing by Robot 变形物体操纵——机器人被动跟踪的研究
Pub Date : 2007-12-01 DOI: 10.1109/SCORED.2007.4451375
K. Salleh, H. Seki, Y. Kamiya, M. Hikizu
Deformable object manipulation is important for robots, especially home service robots. This is because unlike factory robots that handle rigid objects most of the time, these robots also need to be able to handle soft objects like clothes, rubber, paper etc. This paper proposes a unique tracing method for clothes manipulation by robots. The tracing method is used to reveal a second corner of a rectangular towel for spreading purposes, assuming that a first corner has been successfully grasped. Tracing in this paper's context is tracing the towel's edge, with the robot movement based on feedback from sensors. Using tracing method to find a second corner has been proven to be efficient in finding a second corner next to the first corner and not apposite it, resulting in the robot properly spreading the towel. The clothes manipulation system consists of two robot arms equipped with robot grippers, a CCD camera and an image processing board. Passive tracing is a method where the tracing gripper is static while the gripper holding the first corner maneuvers according to the feedback from sensors inside the static gripper so that it pulls the towel appropriately for the static gripper to trace the edge of the towel. Movement pattern is based on the sensors feedback inside the static gripper. Basically, the movement pattern is divided into two: inward the towel when the static gripper is too near to the edge of the towel and away from the towel when the gripper is too deep inside the towel. Force control is also applied to the static gripper during tracing so that it doesn't grip the towel too hard or vice versa. The CCD camera is used from time to time to check whether the static gripper has reached the second corner or not. Tracing experiments were conducted to evaluate the proposed method.
可变形对象操作对于机器人,尤其是家庭服务机器人来说是非常重要的。这是因为与工厂机器人处理刚性物体不同,这些机器人还需要能够处理柔软的物体,如衣服、橡胶、纸张等。本文提出了一种独特的机器人操纵服装的跟踪方法。所述描画方法用于显示用于铺展目的的矩形毛巾的第二角,假设已成功地抓住了第一角。在本文的背景下,跟踪是跟踪毛巾的边缘,机器人的运动基于传感器的反馈。利用跟踪方法寻找第二个角被证明是有效的,在第一个角的旁边找到第二个角,而不是与其相对的,从而使机器人正确地展开毛巾。服装操纵系统由两个配有机器人抓手的机械臂、一个CCD相机和一个图像处理板组成。被动跟踪是指跟踪爪是静态的,而握住第一个角的爪根据静态爪内部传感器的反馈进行动作,使其适当地拉动毛巾,使静态爪对毛巾边缘进行跟踪的方法。运动模式基于静态夹持器内部的传感器反馈。基本上,移动模式分为两种:当静态夹具太靠近毛巾边缘时,向内移动毛巾;当夹具在毛巾内部太深时,远离毛巾。在跟踪过程中,力控制也应用于静态抓取器,这样它就不会太用力地抓取毛巾,反之亦然。不时使用CCD摄像机检查静态夹持器是否到达第二角。通过示踪实验对该方法进行了验证。
{"title":"Deformable Object Manipulation - Study on Passive Tracing by Robot","authors":"K. Salleh, H. Seki, Y. Kamiya, M. Hikizu","doi":"10.1109/SCORED.2007.4451375","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451375","url":null,"abstract":"Deformable object manipulation is important for robots, especially home service robots. This is because unlike factory robots that handle rigid objects most of the time, these robots also need to be able to handle soft objects like clothes, rubber, paper etc. This paper proposes a unique tracing method for clothes manipulation by robots. The tracing method is used to reveal a second corner of a rectangular towel for spreading purposes, assuming that a first corner has been successfully grasped. Tracing in this paper's context is tracing the towel's edge, with the robot movement based on feedback from sensors. Using tracing method to find a second corner has been proven to be efficient in finding a second corner next to the first corner and not apposite it, resulting in the robot properly spreading the towel. The clothes manipulation system consists of two robot arms equipped with robot grippers, a CCD camera and an image processing board. Passive tracing is a method where the tracing gripper is static while the gripper holding the first corner maneuvers according to the feedback from sensors inside the static gripper so that it pulls the towel appropriately for the static gripper to trace the edge of the towel. Movement pattern is based on the sensors feedback inside the static gripper. Basically, the movement pattern is divided into two: inward the towel when the static gripper is too near to the edge of the towel and away from the towel when the gripper is too deep inside the towel. Force control is also applied to the static gripper during tracing so that it doesn't grip the towel too hard or vice versa. The CCD camera is used from time to time to check whether the static gripper has reached the second corner or not. Tracing experiments were conducted to evaluate the proposed method.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121577990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Mechanisms for the IPv4 to IPv6 Transition IPv4到IPv6转换的安全机制
Pub Date : 2007-12-01 DOI: 10.1109/SCORED.2007.4451365
A. Taib, R. Budiarto
Transition from IPv4 to IPv6 has been made possible through various transition mechanisms, categorized as dual-stack, tunneling and translation. However, period of transition may take years to complete which both protocols will coexist due to Internet services deployed are widely in IPv4. So, a successful IPv6 transition is depended on the compatibility with the large installed base of IPv4 hosts and routers, as well as maintaining security of the network from potential threats and vulnerabilities of both Internet protocols. This paper classifies potential security issues in the transition period and identifies prevention mechanisms to the problems identified. As dual-stacked host or network is the most simple IPv6 deployment any enterprise can settle for now, this paper focuses on possible implementation of distributed firewall in a dual-stacked environment which involves packet filtering at the edge router as well as the host-based firewall.
从IPv4到IPv6的转换是通过各种转换机制实现的,这些转换机制被分类为双栈、隧道和转换。然而,由于互联网服务广泛部署在IPv4,这两个协议共存的过渡期可能需要数年时间才能完成。因此,成功的IPv6过渡取决于与大量已安装的IPv4主机和路由器的兼容性,以及维护网络的安全性,使其免受两种互联网协议的潜在威胁和漏洞。本文对过渡期的潜在安全问题进行了分类,并对所发现的问题提出了防范机制。由于双堆叠主机或网络是目前企业可以解决的最简单的IPv6部署,因此本文主要研究在双堆叠环境下分布式防火墙的可能实现,包括在边缘路由器上进行包过滤以及基于主机的防火墙。
{"title":"Security Mechanisms for the IPv4 to IPv6 Transition","authors":"A. Taib, R. Budiarto","doi":"10.1109/SCORED.2007.4451365","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451365","url":null,"abstract":"Transition from IPv4 to IPv6 has been made possible through various transition mechanisms, categorized as dual-stack, tunneling and translation. However, period of transition may take years to complete which both protocols will coexist due to Internet services deployed are widely in IPv4. So, a successful IPv6 transition is depended on the compatibility with the large installed base of IPv4 hosts and routers, as well as maintaining security of the network from potential threats and vulnerabilities of both Internet protocols. This paper classifies potential security issues in the transition period and identifies prevention mechanisms to the problems identified. As dual-stacked host or network is the most simple IPv6 deployment any enterprise can settle for now, this paper focuses on possible implementation of distributed firewall in a dual-stacked environment which involves packet filtering at the edge router as well as the host-based firewall.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127764426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Investigation on the Effects of Wall Parameters on the Indoor Wireless Propagations 墙体参数对室内无线传播影响的研究
Pub Date : 2007-12-01 DOI: 10.1109/SCORED.2007.4451422
M. Salem, M. Ismail, N. Misran
The type of the construction materials of the interior walls of the indoor environments plays a great role in the propagation of the transmitted signals inside the buildings. A comparison of calculated and simulated Fresnel reflection and transmitted coefficients at 2.4 GHz and 900 MHz for a variety of typical exterior building surfaces has been achieved. The effect of the different types of wall on the path loss prediction had been conducted by using a ray tracing program with real time reflection and refraction phenomena.
室内环境内墙的建筑材料类型对发射信号在建筑物内的传播起着很大的作用。比较了几种典型建筑外表面在2.4 GHz和900 MHz频段的菲涅耳反射系数和透射系数的计算值和模拟值。利用具有实时反射和折射现象的射线追踪程序,研究了不同类型壁对路径损失预测的影响。
{"title":"An Investigation on the Effects of Wall Parameters on the Indoor Wireless Propagations","authors":"M. Salem, M. Ismail, N. Misran","doi":"10.1109/SCORED.2007.4451422","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451422","url":null,"abstract":"The type of the construction materials of the interior walls of the indoor environments plays a great role in the propagation of the transmitted signals inside the buildings. A comparison of calculated and simulated Fresnel reflection and transmitted coefficients at 2.4 GHz and 900 MHz for a variety of typical exterior building surfaces has been achieved. The effect of the different types of wall on the path loss prediction had been conducted by using a ray tracing program with real time reflection and refraction phenomena.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114551888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Development of a Two-Wheeled Inverted Pendulum Mobile Robot 两轮倒立摆移动机器人的研制
Pub Date : 2007-12-01 DOI: 10.1109/SCORED.2007.4451379
S. W. Nawawi, M. N. Ahmad, J. Osman
The research on two-wheeled inverted pendulum (T-WIP) mobile robots or commonly known as balancing robots have gained momentum over the last decade in a number of robotic laboratories around the world. This paper describes the hardware design of such a robot. The objective of the design is to develop a T-WIP mobile robot to be used as flexible platform comprises of embedded unstable linear plant intended for research and teaching purposes. Issues such as selection of actuators and sensors, signal processing units, modeling and control scheme was addressed and discussed. The system is then tested using a well-known pole-placement state feedback controller to verify its functionality.
两轮倒立摆(T-WIP)移动机器人或通常被称为平衡机器人的研究在过去十年中在世界各地的机器人实验室中得到了蓬勃发展。本文介绍了该机器人的硬件设计。本设计的目的是开发一种T-WIP移动机器人,作为由嵌入式不稳定线性植物组成的柔性平台,用于研究和教学目的。对致动器和传感器的选择、信号处理单元、建模和控制方案等问题进行了讨论。然后使用众所周知的极点放置状态反馈控制器对系统进行测试,以验证其功能。
{"title":"Development of a Two-Wheeled Inverted Pendulum Mobile Robot","authors":"S. W. Nawawi, M. N. Ahmad, J. Osman","doi":"10.1109/SCORED.2007.4451379","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451379","url":null,"abstract":"The research on two-wheeled inverted pendulum (T-WIP) mobile robots or commonly known as balancing robots have gained momentum over the last decade in a number of robotic laboratories around the world. This paper describes the hardware design of such a robot. The objective of the design is to develop a T-WIP mobile robot to be used as flexible platform comprises of embedded unstable linear plant intended for research and teaching purposes. Issues such as selection of actuators and sensors, signal processing units, modeling and control scheme was addressed and discussed. The system is then tested using a well-known pole-placement state feedback controller to verify its functionality.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121969912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Decision Fusion for Isolated Malay Digit Recognition Using Dynamic Time Warping (DTW) and Hidden Markov Model (HMM) 基于动态时间扭曲和隐马尔可夫模型的马来语孤立数字识别决策融合
Pub Date : 2007-12-01 DOI: 10.1109/SCORED.2007.4451425
Syed Abdul Rahman Al-Haddad, S. Samad, Aini Hussain, K. A. Ishak, Hamid Mirvaziri
This paper is focused on Malay speech recognition with the intention to introduce a decision fusion technique for isolated Malay digit recognition using Dynamic Time Warping (DTW) and Hidden Markov Model (HMM). This study proposes an algorithm for decision fusion of the recognition models. The endpoint detection, framing, normalization, Mel Frequency Cepstral Coefficient (MFCC) and vector quantization techniques are used to process speech samples to accomplish the recognition. Decision fusion technique is then used to combine the results of DTW and HMM. The algorithm is tested on speech samples that is a part of a Malay corpus.
本文以马来语语音识别为研究对象,提出了一种基于动态时间扭曲(DTW)和隐马尔可夫模型(HMM)的马来语数字识别决策融合技术。本文提出了一种识别模型的决策融合算法。采用端点检测、分帧、归一化、Mel频率倒谱系数(MFCC)和矢量量化等技术对语音样本进行处理,完成识别。然后使用决策融合技术将DTW和HMM的结果结合起来。该算法在马来语语料库的一部分语音样本上进行了测试。
{"title":"Decision Fusion for Isolated Malay Digit Recognition Using Dynamic Time Warping (DTW) and Hidden Markov Model (HMM)","authors":"Syed Abdul Rahman Al-Haddad, S. Samad, Aini Hussain, K. A. Ishak, Hamid Mirvaziri","doi":"10.1109/SCORED.2007.4451425","DOIUrl":"https://doi.org/10.1109/SCORED.2007.4451425","url":null,"abstract":"This paper is focused on Malay speech recognition with the intention to introduce a decision fusion technique for isolated Malay digit recognition using Dynamic Time Warping (DTW) and Hidden Markov Model (HMM). This study proposes an algorithm for decision fusion of the recognition models. The endpoint detection, framing, normalization, Mel Frequency Cepstral Coefficient (MFCC) and vector quantization techniques are used to process speech samples to accomplish the recognition. Decision fusion technique is then used to combine the results of DTW and HMM. The algorithm is tested on speech samples that is a part of a Malay corpus.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124745313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2007 5th Student Conference on Research and Development
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1