Notice
There is currently an issue with the citation download feature. Learn more

2008 IEEE International Conference on Electro/Information Technology

18-20 May 2008

Filter Results

Displaying Results 1 - 25 of 106
  • 2008 IEEE International conference on electro/information technology

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • 2008 IEEE international conference on electro/information technology

    Publication Year: 2008, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (17 KB)
    Freely Available from IEEE
  • [Copyright and reprint permission]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • Table of contents EIT 2008 Conference

    Publication Year: 2008, Page(s):iv - ix
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • Relating Boolean gate truth tables to one-way functions

    Publication Year: 2008, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (130 KB) | HTML iconHTML

    We present a schema to build one way functions from a family of Boolean gates. Moreover, we relate characteristics of these Boolean gate truth tables to properties of the derived one-way functions. We believe this to be the first attempt at establishing cryptographic properties from the Boolean cube spaces of the component gates. This schema is then used to build a family of compression functions,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiments in attacking FPGA-based embedded systems using differential power analysis

    Publication Year: 2008, Page(s):7 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB) | HTML iconHTML

    In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer security community. Research into countermeasures for these cryptographic systems has intensified as well. Experiments have been conducted showing the potential effectiveness of power analysis attacks and preventative techniques on both ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing System-on-Chips with Moore, Amdahl, Pareto, and Ohm

    Publication Year: 2008, Page(s):13 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (163 KB) | HTML iconHTML

    Understanding the rules for a development effort is essential for success. In this paper, we provide an overview of four important rules for a system-on-chip (SoC) development. We portray these rules as members of our development team: Moore, Amdahl, Pareto, and Ohm. Their guidance provides a foundation for our system and architecture optimization. We review a methodology to migrate large software... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectural support for securing application data in embedded systems

    Publication Year: 2008, Page(s):19 - 24
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    The rapid growth and pervasive use of embedded systems makes it easier for an adversary to gain physical access to these devices to launch attacks and reverse engineer of the system. Encrypted execution and data (EED) platforms, where instructions and data are stored in encrypted form in memory, while incurring overheads of encryption have proven to be attractive because they offer strong security... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FPGA based design of a novel enhanced error detection and correction technique

    Publication Year: 2008, Page(s):25 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    With the increase of data transmission and hence sources of noise and interference, engineers have been struggling with the demand for more efficient and reliable techniques for detecting and correcting errors in received data. Although several techniques and approaches have been proposed and applied in the last decade, data reliability in transmission is still a problem. In this paper we propose ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some practical issues on implementing distributed multi-agent reasoning systems

    Publication Year: 2008, Page(s):30 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (435 KB) | HTML iconHTML

    As intelligent systems are being applied to increasingly larger, open and more complex problem domains. These domains demand a systematic approach to handle the complexity in knowledge engineering. The needs include modularity in representation, distribution in computation, as well as coherence in inference. Multiply Sectioned Bayesian Networks provide a distributed multi-agent framework to addres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An application of networked embedded computer systems to provide distributed decision making for intelligent logistics

    Publication Year: 2008, Page(s):37 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (75 KB) | HTML iconHTML

    This paper presents the application of computer systems to provide distributed decision making for intelligent logistics using a communications system architecture enabled by a multi-band antenna system. This communication system architecture is described for a commercial vehicle application that is linked to off board databases for distributed decision making. The distributed decision making prov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Euclidean ARTMAP based target tracking control system

    Publication Year: 2008, Page(s):41 - 47
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (174 KB) | HTML iconHTML

    Neural networks are known for their ability to learn and classify patterns based on certain criteria defined within the training process. Fuzzy ARTMAP neural networks are examples of such systems where the output is decided based on the input/output pattern training scheme. In this research, we build a fuzzy ARTMAP like neural network that depends on an adaptive Euclidian distance neighborhood rat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lyapunov measure and control of periodic orbit

    Publication Year: 2008, Page(s):48 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB) | HTML iconHTML

    The focus of this paper is on the computation of optimal stabilizing control for the control of complex dynamics in a lower dimensional discrete time dynamical system. Lyapunov measure is used for the purpose of the stabilization. Using the results from [17], optimal stabilization problem is posed as a infinite dimensional linear program. Finite dimensional approximation of the linear program is o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fully automated commando training system

    Publication Year: 2008, Page(s):54 - 59
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (505 KB) | HTML iconHTML

    Every designated commando in the police department undergoes training for the improvement of his quick reflexes for attacking the surprise enemy and shooting accuracy in a given short period, typically 4 seconds. Present day commando training system in India lacks efficiency in posing a surprise enemy, timing control, programmability and measure of success or failure. The authors are engaged into ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PEM fuel cell system identification and model order reduction for Hinfin; loop shaping controller design

    Publication Year: 2008, Page(s):60 - 65
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    Low order linear models are normally preferred over more complex ones particularly in the Hinfin control system framework. Controllers designed based on Hinfin linear control theory tend to exhibit orders higher than or equal to the order of the original system. In this contribution, two methods were utilized in order to obtain a low order linear MIMO state space model equiva... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multistage stochastic hydrothermal scheduling

    Publication Year: 2008, Page(s):66 - 71
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (121 KB) | HTML iconHTML

    The paper addresses the stochastic long-term hydrothermal scheduling problem. This problem is usually modeled as a multistage stochastic program and solved using algorithms that are based on dynamic programming. One such algorithm is the stochastic dual dynamic programming (SDDP) algorithm, which is implemented for the hydrothermal power system of the Pacific Northwest in the U.S. The importance o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A general benders decomposition structure for power system decision problems

    Publication Year: 2008, Page(s):72 - 77
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (114 KB) | HTML iconHTML

    We propose a general structure of Benders decomposition for power system decision making. In this framework, three elements of decision-making problems in power systems are mapped into the three types of subproblems of the Benders decomposition approach. An information communication strategy is introduced. We also explain how the approach facilitates the unbundling of computational services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A minimum-velocity-based segmentation scheme for improved performance of an online signature verification system

    Publication Year: 2008, Page(s):78 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (182 KB) | HTML iconHTML

    In this work, a novel segmentation scheme for online handwritten signatures is presented in order to extract local characteristics that are consistent among the different signature samples. In the new segmentation scheme, the segmentation points of the reference/master signature are allocated at the minimum velocity points or ldquovalleysrdquo. To avoid an excessive number of segmentation p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a forensic-aware file system

    Publication Year: 2008, Page(s):84 - 89
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (103 KB) | HTML iconHTML

    As the Internet has become an indivisible part of our daily life, the crime associated with it has increased dramatically as well. However, the dominant approaches currently used to fight against the cybercrime focus only on how to collect and preserve digital evidence after a crime has been committed, in which some of digital evidence could not be collected due to the design of file systems as we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multimedia-content authentication and recovery protocol in peer-to-peer networks

    Publication Year: 2008, Page(s):90 - 95
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (139 KB) | HTML iconHTML

    In peer-to-peer (P2P) and overlay network environments, digital multimedia is allowed to be freely copied, shared and disseminated in a decentralized manner. Such environments do not guarantee authentication or preservation of the data. Furthermore, if the multimedia data, particularly video, images, or audio, has been polluted during this sharing process, there are no decentralized mechanisms tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defending selective forwarding attacks in WMNs

    Publication Year: 2008, Page(s):96 - 101
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (183 KB) | HTML iconHTML

    Wireless Mesh Networks (WMNs) have emerged recently as a promising technology for next-generation wireless networking to provide wide variety of applications that cannot be supported directly by other wireless networks. In WMNs, security is turning out to be a major concern and little attention has been paid to this topic by the research community. In this paper, we investigate a serious security ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation of a cyclic multicast proxy server

    Publication Year: 2008, Page(s):102 - 107
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    The exponential growth of the World Wide Web (WWW) users has made the deployment of proxy servers popular on a network with limited resources. WWW clients perceive better response time, improved performance and speed when response to requested pages are served from the cache of a proxy server, resulting in faster response times after the first document fetch. This work focuses on the development o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image encryption scheme based on using least square approximation techniques

    Publication Year: 2008, Page(s):108 - 111
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    One of the main application of image encryption is to transmit secure information between parties. The aim is to transmit the image securely over the network such that no unauthorized user be able to decrypt the image. In this paper, we propose a new encryption algorithm by transforming the original image into the encrypted one using randomly generated vectors. The original image is decrypted by a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attempts at gauge determination in superconducting transmission lines

    Publication Year: 2008, Page(s):112 - 116
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (142 KB) | HTML iconHTML

    The effects of the Coulomb and Lorenz gauges on the field formulation for superconducting transmission lines are examined. While either of the two correctly determines the electromagnetic fields of the structure, it is shown that when certain restrictions, which lead to a more chaste and direct formulation, are placed on the behavior of the magnetic vector potential, a single gauge is preferred, i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On-chip at-speed linearity testing of high-resolution high-speed DACs using DDEM ADCs with dithering

    Publication Year: 2008, Page(s):117 - 122
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB) | HTML iconHTML

    On-chip testing of high-resolution high-speed DACs is extremely challenging because of the stringent requirements on the accuracy, speed and cost of the measurement circuits. This work proposed a new on-chip strategy for DAC linearity testing applying the proposed deterministic dynamic element matching (DDEM) technique. Low-accuracy two-step flash ADCs are used as test devices. Speed advantage of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.