Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Industrial and Information Systems (ICIIS), 2009 International Conference on

Date 28-31 Dec. 2009

Filter Results

Displaying Results 1 - 25 of 115
  • [Title page]

    Publication Year: 2009 , Page(s): i - ii
    Save to Project icon | Request Permissions | PDF file iconPDF (1007 KB)  
    Freely Available from IEEE
  • Conference Organizing Committee

    Publication Year: 2009 , Page(s): iii - iv
    Save to Project icon | Request Permissions | PDF file iconPDF (258 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • International review panel

    Publication Year: 2009 , Page(s): v - vii
    Save to Project icon | Request Permissions | PDF file iconPDF (403 KB)  
    Freely Available from IEEE
  • International Advisory Committee

    Publication Year: 2009 , Page(s): viii
    Save to Project icon | Request Permissions | PDF file iconPDF (230 KB)  
    Freely Available from IEEE
  • Content pages

    Publication Year: 2009 , Page(s): 1 - 13
    Save to Project icon | Request Permissions | PDF file iconPDF (1197 KB)  
    Freely Available from IEEE
  • An end to end correctness verification approach for application specific usage control

    Publication Year: 2009 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (709 KB) |  | HTML iconHTML  

    Usage control is a comprehensive access control model developed to cater the security needs of the wide range of application domains. Safety property of the usage control model ensures only the design level safety whereas the correctness of usage control in software application depends on the correctness of implementation as well. Most of the research in access control left the correctness of implementation as a general software verification problem. Software verification in general requires an extensive exploration of the complete state space, whereas access control of an application evolves over few repeated protection states. This paper presents a method to verify the correctness of usage control implementation by capturing and analyzing only the protection states. We use this method in the end to end correctness verification approach, which ensures the design as well as implementation correctness of usage control and we also provide an illustrative case study. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel and efficient cryptosystem for long message encryption

    Publication Year: 2009 , Page(s): 7 - 9
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (562 KB) |  | HTML iconHTML  

    Due to more overhead of asymmetric cryptosystems, traditionally, the symmetric cryptosystem is used to encrypt long messages. In case of symmetric cryptosystems, it creates the problem of key management. So to encrypt long messages, we usually, take the help of both symmetric and asymmetric cryptosystems. In this paper, we proposed an asymmetric cryptosystem for encrypting long messages, which is not only efficient but also secure. In consideration of the aspect of efficiency and computation, our proposed scheme uses elliptic curve cryptosystem. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Human iris pattern recognition using phase components of image

    Publication Year: 2009 , Page(s): 10 - 14
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (870 KB) |  | HTML iconHTML  

    The increase in security concerns on issues such as identity, theft indicates the needs of a new reliable security system. Iris recognition is perhaps the most accurate means of personnel identification due to the uniqueness of the patterns contained in each iris. This paper presents new image processing algorithm which specifically focuses on the characteristics of the phase components obtained from two-dimensional Fourier Transformation of image. The Phase Only Correlation (POC) and Band Limited Phase Only Correlation (BLPOC) are the most fundamental transformations, the features of which include superior discrimination capability over the ordinary recognition system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secured communication using Steganography Framework with sample RTF implementation

    Publication Year: 2009 , Page(s): 15 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3195 KB) |  | HTML iconHTML  

    It is important to have secured communication channels as we often need to share our secret information. Encryption is one of the widely used techniques to ensure secure communication, however, sending encrypted messages often draw eavesdropper's attention to intercept the messages and reveal the original message. The concept of steganography focuses on embedding secret information into the digital media such as images, audio, video files and even in text documents, without drawing any attention of eavesdropper to think that such information is embedded. In this paper, a novel approach is proposed in information hiding, by using a common framework that will generate the digital stegano medium. As a proof of concept, we propose a module that will support this framework, using inter-character spacing and an optimized approach for message compression by custom bit encoding on RTF documents (Rich Text Format). Level of security is further enhanced by supporting encryption and diffusion, before applying the Steganography. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A modified remote user authentication scheme using smart card based on ECDLP

    Publication Year: 2009 , Page(s): 22 - 25
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (637 KB) |  | HTML iconHTML  

    In this paper, a modified of Jena remote user authentication scheme using smart cards based on Elliptic Curve Discrete Logarithm Problem (ECDLP) has been proposed. A remote user authentication scheme is a two-party protocol whereby an authentication server confirms the identity of a remote individual logging on to the server over an untrusted, unsecured network. The password based authentication schemes are commonly used for authenticating remote users. Many passwords based schemes both with and without smart card have been proposed; each scheme has its merits and demerits. However, the scheme proposed by Jena is vulnerable to the masquerade attack. In this paper, we shall discuss the masquerade attack on their scheme. Furthermore, we shall present an enhanced scheme for preventing the above attack. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A random block length based cryptosystem through multiple cascaded permutation-combinations and chaining of blocks

    Publication Year: 2009 , Page(s): 26 - 31
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (681 KB) |  | HTML iconHTML  

    In this paper a four stage character/bit level encoding technique (RBCMCPCC) has been proposed, where the first three steps take input block of length 128 bit, 192bit and 256 bit, respectively, and generate intermediate blocks of the same lengths using identical lengths of keys in each step. The fourth stage generates final cipher blocks based on random session-keys. Before execution of the fourth sage, all 256 bit blocks are passed through the chaining process to ensure the generation of non-identical intermediate stream. A two dimensional matrix based substitution and folding operation is performed in the first stage of encryption, whereas a three dimensional matrix based permutation and substitution operation is done in the next sage. Again, a four dimensional matrix oriented substitution and transposition operation is applied in the third stage. Finally, wrapping operation is done to produce the cipher text. To expound the effectiveness of the algorithm, the obtained results are compared with BAM, TDES, CTSCCT and RSA algorithms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network coding-aware data aggregation for a distributed Wireless Sensor Network

    Publication Year: 2009 , Page(s): 32 - 36
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (685 KB) |  | HTML iconHTML  

    Wireless Sensor Networks (WSNs) are immensely deployed for monitoring information like humidity, temperature and soil fertility. As the sensor nodes sense data and floods them in the network, the network traffic increases and may result in congestion which leads to broadcast storm problem. This paper addresses the utility of network coding to optimize data aggregation and to decrease the number of transmitted messages in a WSN. A coding-aware deployment strategy is presented which create opportunity for network coding at aggregate sensor nodes. Our deployment strategy leads to a topology which supports many-to-many network flows (multiple sources and multiple sink network flow). It also gives protection against multiple failures in the network. Furthermore, we propose a heuristic that restricts unnecessary transmissions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power Line Intercom - narrowband voice communication over power line

    Publication Year: 2009 , Page(s): 37 - 42
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (908 KB) |  | HTML iconHTML  

    Designing a PABX system using the existing power line infrastructure as the transmission medium is an effective method of implementing a fast and easily installable communication solution. The scope of this research is to develop such a system for a small scale organizational environment to avoid the complexities and time consumption of cable installation. As the power line transmission technique, we used narrowband frequency shift keying to counter the noise disturbances in power line. In addition we used a novel communication protocol to further reduce the effects of noise and to achieve reliable transmission. We integrated the switching function into the central unit which is the central control element in the system. We were able to achieve voice communication at the rate of 2 kbps and to switch between four extensions. Further improvements in the voice quality can be achieved by using advanced noise reduction algorithms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self organizing wireless sensor network with distributed intelligent (SOWDI)

    Publication Year: 2009 , Page(s): 43 - 48
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1155 KB) |  | HTML iconHTML  

    A wireless sensor network is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor/control physical or environmental conditions, such as temperature, pressure or motion, at different locations. Main processing center gather information from remote locations while centrally controlling those centers. Reliability of communication can be achieved using routing and error checking algorithms. This paper briefly presents the design approach of a successful self organizing wireless sensor network, with multi master capability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Case study of WSN as a replacement for SCADA

    Publication Year: 2009 , Page(s): 49 - 54
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (555 KB) |  | HTML iconHTML  

    The increasing interconnectivity of SCADA (Supervisory Control and Data Acquisition) networks has exposed them to a wide range of network security problems. Also in that case WSN (Wireless Sensor Networks), which is a new computing paradigm that emerged from the fusion of the SCADA systems and Ad hoc networks technologies, have gained the advantage over SCADA due to its simplicity and the ad-hoc nature of the network. This paper provides an overview of all the issues that are involved in strengthening the interconnectivity of SCADA networks and how the WSN has gained the advantage as a solution for SCADA. The paper describes the general architecture of WSN and SCADA networks and the properties of some of the commonly used SCADA communication protocols. This paper presents an overview of challenges in the design and implementation of WSNs. It summarizes the potential challenges that influence the WSNs design. Also this paper proposes an example solution to interconnect such environments using low cost and customizable sensor nodes which each has the computational power built in. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ethernet frame tunneling over GPRS/EDGE for universal network monitoring

    Publication Year: 2009 , Page(s): 55 - 61
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (828 KB) |  | HTML iconHTML  

    Many equipment manufactures introduce proprietary protocols in network monitoring and equipment configuration to maintain market monopoly. This paper presenting a low cost solution to access, monitor and configure such equipments irrespective of its communication method. The solution consists of especially designed hardware modules which are collocated and connected with the equipments (need to monitor remotely) distributed over large geographical area. The system is designed such that multiple peer to peer connections can be setup with remotely held equipments to ensure the physical connectivity. Due to its' peer to peer and low level nature, system supports proprietary or standard network monitoring despite the differences of the equipment or the network monitoring software implementation. Furthermore, this paper discuss the solution facilitated the transportation of analogue and digital alarms from remote sites to a central network monitoring node which often equipment operators need separate transport system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transcoding based optimum quality video streaming under limited bandwidth

    Publication Year: 2009 , Page(s): 62 - 67
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1029 KB) |  | HTML iconHTML  

    Bandwidth scarcity is a common problem faced in multimedia transmission over broadband wireless networks. From a consumer's perspective, the effectiveness of multimedia delivery suffers significantly in such networks. Further, in a mobile environment, when the number of users increases, they experience interruptions in the received multimedia streams. Adaptive streaming is one solution that can be adopted in any network environment regardless of the nature of the network. Adaptive streaming can be achieved using transcoding techniques. Transcoding is a mechanism that converts a video to a form that has less information so that the resulting data volume is appropriate for streaming over a low bandwidth network. However, the quality of the video stream drops due to transcoding. The advantage is that when there is a large number of users sharing the network, users could watch a video at a lower quality with no interruption if the transcoding is applied before the video is streamed to the end user. i.e., a compromise can be made between the video quality and network delay. The main focus of this research is to analyze the variation of transcoding parameters with respect to bandwidth, in order to achieve an adaptive streaming solution of optimum achievable quality in a low bandwidth broadband network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A service platform for subscription-based live video streaming

    Publication Year: 2009 , Page(s): 68 - 73
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (911 KB) |  | HTML iconHTML  

    The development and expansion of broadband technologies has stimulated the multimedia streaming market for the delivery of live streaming services which can be used for a variety of applications. The design of a generic audio and video streaming platform that can be employed for a wide range of applications is presented in this paper. A key feature of the platform is the `subscription framework' which enables the service users to subscribe to a set of live feeds with their application specific requirements. The platform is capable of adjusting its service functionalities and the extent to which the media streams are secured for a particular user based on the requirements given at the service subscription. The platform is designed based on a layered architecture and a prototype implementation is carried out within the University network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Total traceability system: A sustainable approach for food traceability in SMEs

    Publication Year: 2009 , Page(s): 74 - 79
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1153 KB) |  | HTML iconHTML  

    Traceability systems have become a dominant management information system within the production and marketing companies as they can efficiently control the supply chain, by minimizing the risks of the production process, and helping to enhance the consumer/customer reliability on products. There may have some limitations of using available traceability systems with small and medium scale industries as there may have design-reality gap of such systems. In this paper, we first analyzed effectiveness, limitations and practical problems of the available traceability systems for supply chain management. Design gap between real system and proposed model, high cost, accuracy and lack of technically qualified staff are some main problems of such systems. Then we introduced a novel system, "Total Traceability System", to overcome such limitations and problems by minimizing the gap between design and on-the ground reality (minimize the design reality gap). Further, we are going to implement our system with a sales and marketing company business model. Our system mainly addresses the cost effectiveness, accuracy, user friendliness, preciseness and security. Furthermore, we have planned to implement this system in three phases. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiplier-free realtime phase tracking in digital synchronous QPSK receiver for coherent optical detection

    Publication Year: 2009 , Page(s): 80 - 82
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2338 KB) |  | HTML iconHTML  

    A multiplier-free phase estimation algorithm based on the barycentre approach for coherent QPSK detection is presented. A selectivity mechanism was developed that significantly improved its performance. In addition to recently published measurement results, theoretical background and new simulation results are presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Survey on optical burst switching in WDM networks

    Publication Year: 2009 , Page(s): 83 - 88
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3642 KB) |  | HTML iconHTML  

    Optical burst switching (OBS) is the promising area it can meet the bandwidth requirement of bandwidth intensive application. OBS is switching technique for the next generation optical networks. However, there are certain issues such as burst aggregation, scheduling, contention resolution and QoS that needs to be addressed in OBS. In this paper, we summarize the results of current research trends on optical burst switching networks. We present the classification of different scheduling algorithms and contention resolution techniques. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A parametric study of equiangular spiral antenna (arm type)

    Publication Year: 2009 , Page(s): 89 - 93
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (16631 KB) |  | HTML iconHTML  

    The equiangular spiral antenna is a frequency independent antenna. Therefore it can also be considered as a broadband antenna. In this paper we carry out a parametric study of this antenna by using the electromagnetic solver HFSS. A guideline is presented on the antenna parameters in order to optimize the bandwidth and radiation characteristics. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid T-shaped monopole / dielectric resonator antenna as EMI sensor

    Publication Year: 2009 , Page(s): 94 - 97
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (733 KB) |  | HTML iconHTML  

    The increased use of high frequency electronic equipment in modern day technologies causes electromagnetic interference with each other. To avoid this, the detection of unwanted electromagnetic radiations is required in industry where electromagnetic interference and compatibility (EMI/EMC) problems are quite an important issue. For EMI measurement, it is required to place a sensor to receive the radiation from the equipment. In this paper, a dielectric loaded T-shaped ultra wideband monopole antenna is designed and used as sensors for measuring electromagnetic interference. The performance of a sensor depends on its antenna factor, which is the ratio of the incident electric field on the antenna surface to the received voltage at the load end. Here the antenna factor of the same antenna is presented for the desired and cross polarization of the incident field. The results for antenna factor show an ultra wide bandwidth with the cross polarization isolation better than 86 dB / m for the T-monopole / DRA as EMI sensor. The simulated return loss characteristics show well agreement with the measured data of a prototype antenna. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electromagnetic field computation: The beginnings and current directions in optimization

    Publication Year: 2009 , Page(s): 98 - 103
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (23781 KB) |  | HTML iconHTML  

    This paper traces the discipline of electromagnetic field computation from the early days of network models to finite differences, integral equation solutions and now the all encompassing finite element method. The discipline enjoyed phenomenal growth under the sponsorship of the IEEE Magnetics Society. The pioneers took a broad view of this subspecialty of electrical engineering as a discipline intersecting with mathematical physics, numerical mathematics and computer science. This liberal non-confining view has spawned further sub-disciplines leading to CAD techniques, and inverse problems, matrix solution methods and parallel processing. The paper then focuses on what is currently the most active area of research, inverse problem solution and optimization where much of the new work lies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Convergence analysis of turbo equalization in ST block-coded MIMO systems

    Publication Year: 2009 , Page(s): 104 - 111
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (731 KB) |  | HTML iconHTML  

    We investigate the probabilistic convergence behavior of minimum mean square error (MMSE) turbo equalization in space-time (ST) block-coded multiple-input multiple-output (MIMO) systems with finite block lengths. For this purpose, the extrinsic information transfer characteristics (EXIT)-band chart technique, which was originally proposed for analyzing turbo decoding of parallel concatenated codes is applied. The impact on the convergence behavior and performance due to the use of ST block coding is analyzed through the EXIT-band characteristics. The convergence behaviors of the exact and approximate implementations of MMSE equalization are compared. We show that in the hybrid equalization schemes, the EXIT-band chart analysis can be used to determine the number of iterations that should be performed using the exact implementation. Our results clearly demonstrate the usefulness of the EXIT-band chart technique as a simple tool to analyze the convergence behavior of turbo equalization in systems with finite block lengths. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.