By Topic

Advances in Recent Technologies in Communication and Computing, 2009. ARTCom '09. International Conference on

Date 27-28 Oct. 2009

Filter Results

Displaying Results 1 - 25 of 243
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (341 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (10 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - xx
    Request permission for commercial reuse | PDF file iconPDF (187 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (64 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committee Members

    Publication Year: 2009, Page(s):xxii - xxv
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s):xxvi - xxviii
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Agile EDI Framework for B2B Applications

    Publication Year: 2009, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (390 KB) | HTML iconHTML

    The unified software development process or unified process is a popular iterative and incremental software development process framework. The best-known and extensively documented refinement of the unified process is the rational unified process (RUP) created by the Rational Software Corporation, a division of IBM. Agile unified process is a simplified version of the RUP developed by Scott Ambler... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Public Key Cryptosystems Based on Chaotic-Chebyshev Polynomials

    Publication Year: 2009, Page(s):4 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1358 KB) | HTML iconHTML

    Due to rapid developments in limits and possibilities of communications and information transmissions, there is a growing demand of cryptographic techniques, which has spurred a great deal of intensive research activities in the study of cryptography. This paper describes a public key encryption based on Chebyshev polynomials. We discuss the algorithm for textual data and present the cryptanalysis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sender-Side Public Key Deniable Encryption Scheme

    Publication Year: 2009, Page(s):9 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    Consider a situation in which the transmission of encrypted message is intercepted by an adversary who can later ask the sender to reveal the random choices (and also the secret key, if one exists) used in generating the cipher text, thereby exposing the plaintext. An encryption scheme is deniable if the sender can generate `fake random choice' that will make the cipher text `look like' an encrypt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy Based Grid Voltage Stabilization in a Wind Farm Using Static VAR Compensator

    Publication Year: 2009, Page(s):14 - 18
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (429 KB) | HTML iconHTML

    When a squirrel cage induction type wind electric generator (WEG) is connected to power grid, due to variations in load and wind speed, there will be fluctuations in the grid voltage. In this paper, the effect of load and wind speed variations on real power supplied and reactive power consumed by the WEG as well as voltage on the grid are studied. The voltage variation in the grid is controlled by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ensembling Rule Based Classifiers for Detecting Network Intrusions

    Publication Year: 2009, Page(s):19 - 22
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB) | HTML iconHTML

    An intrusion is defined as a violation of the security policy of the system, and hence, intrusion detection mainly refers to the mechanisms that are developed to detect violations of system security policy. Recently, data mining techniques have gained importance in providing the valuable information which in turn can help to enhance the decision on identifying the intrusions (attacks). In this pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced Biometric Identification on Face, Gender and Age Recognition

    Publication Year: 2009, Page(s):23 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (638 KB) | HTML iconHTML

    The face recognition system attains good accuracy in personal identification when they are provided with a large set of training sets. In this paper, we proposed Advanced Biometric Identification on Face, Gender and Age Recognition (ABIFGAR)algorithm for face recognition that yields good results when only small training set is available and it works even with a raining set as small as one image pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Flash Analog-to-Digital Converter Design Using Cadence Tool

    Publication Year: 2009, Page(s):28 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (509 KB) | HTML iconHTML

    In this paper, we design a pipelined flash Analog-to-Digital Converter (ADC) to achieve high speed using 0.18 um CMOS technology. The results obtained are presented here. The physical circuit is more compact than the previous design. Power, processing time, and area are all minimized. This design can be used for modern high speed ADC applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Detailed Study and Analysis of OCR Research in South Indian Scripts

    Publication Year: 2009, Page(s):31 - 38
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (908 KB) | HTML iconHTML

    This paper provides an overview of the OCR (optical character recognition) research in South Indian languages. OCR reading technology is benefited by the evolution of high-powered desktop computing allowing for the development of more powerful recognition software that can read a variety of common printed fonts and handwritten texts. But still it remains a highly challenging task to implement an O... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Time Synchronization Protocols in Wireless Sensor Networks

    Publication Year: 2009, Page(s):39 - 41
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (403 KB) | HTML iconHTML

    Wireless sensor network consists of spatially distributed sensors dedicated to closely observe the real-world phenomena. The sensors that are distributed in an uncontrolled manner needs to configure themselves in a communication network in order to collect information. In case of sensor network data fusion is a basic operation, whereby the collected information from each sensor node needs to be ag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Bidirectional Frame Prediction Using Particle Swarm Optimization Technique

    Publication Year: 2009, Page(s):42 - 46
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    This paper presents a Novel Bidirectional motion estimation technique, which is based on the Particle swarm optimization algorithm. Particle swarm optimization (PSO) is a population based optimization technique which has the potentiality to avoid local minima solution which is usually encountered by the traditional block matching algorithms (BMA) such as the three step search (TSS) and the diamond... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Approach for Non-Invertible Cryptographic Key Generation from Cancelable Fingerprint Biometrics

    Publication Year: 2009, Page(s):47 - 52
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (465 KB) | HTML iconHTML

    The principal drawback of the existing cryptographic algorithms is the maintenance of their key's secrecy. Added with, human users have a difficult time remembering strong but lengthy cryptographic keys. As a result, utilizing individual's biometric features in the generation of strong and repeatable cryptographic keys has gained enormous popularity among researchers. The unpredictability of the u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FPGA Based Implementation of High Performance Architectural Level Low Power 32-bit RISC Core

    Publication Year: 2009, Page(s):53 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1790 KB) | HTML iconHTML

    Power has become an important aspect in the design of general purpose processors. The conventional RISC processors consume too much power as compared with other processors. The power reduction in these processors is done in the fabrication step itself. But this is a complex process. If we can implement the techniques for power reduction in front end process then we can easily design the low power ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Checkpointing and Recovery Algorithm Based on Location Distance, Handoff and Stationary Checkpoints for Mobile Computing Systems

    Publication Year: 2009, Page(s):58 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (854 KB) | HTML iconHTML

    In this paper we present a checkpointing and failure recovery algorithm suited to mobile computing systems. A survey of mobile systems and the algorithms that are presently available is made to gather the essential knowledge about how these systems work. This includes study and analysis of existing checkpointing & recovery algorithms to identify their relative advantages & disadvantages. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Leadership Algorithm for Hierarchical Multi-Smart Robot Coordination in Atomic Power plants

    Publication Year: 2009, Page(s):63 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB) | HTML iconHTML

    A multi smart robot should be able to analyze the situation faster and make appropriate decisions with minimal interference of the human in normal as well as in critical situations for performing various tasks. This is typically designed for the regions where there are high radiation emissions. The use of RFID tags makes the system work in the form of groups under a leader and they communicate amo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantum Circuit Simulator (QCS)

    Publication Year: 2009, Page(s):68 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (491 KB) | HTML iconHTML

    Quantum logic gate is a circuit, which performs a fixed unitary operation on selected qubits in a fixed period of time. The aim of this paper is to propose a simulator - Quantum Circuit Simulator (QCS) that simulates the quantum logic gates. This is a hardware-based simulator. Normally the quantum computers use quantum gates, which perform the arithmetic operations by means of Quantum Arithmetic A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effect of Intensity Modulated Optical Illumination on the Y Parameters of the GaAs MESFET

    Publication Year: 2009, Page(s):71 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB) | HTML iconHTML

    In this paper the effect of an intensity-modulated optical signal on the Y parameters of a MESFET is studied theoretically. It shows that at a constant gate voltage the drain current of the device can be controlled by the intensity of incident optical power density and the frequency of the modulating signal frequency because the Y parameters of the device change with the intensity of incident opti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Analog to Digital Converter Using CMOS Logic

    Publication Year: 2009, Page(s):74 - 76
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB) | HTML iconHTML

    The real world signals are all analog in nature. The digital signals and digital circuits offer greater advantages as compared to analog circuits in processing speed and efficient transmitting. So in order to convert the analog signals to digital efficiently an ldquoAnalog to digital converterrdquo is required. The System on Chip (SoC) forces the analog circuits to be integrated with digital circu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.