By Topic

9th RoEduNet IEEE International Conference

Date 24-26 June 2010

Filter Results

Displaying Results 1 - 25 of 90
  • [Title page]

    Publication Year: 2010, Page(s):1 - 2
    IEEE is not the copyright holder of this material | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • Conference committees

    Publication Year: 2010, Page(s):1 - 2
    IEEE is not the copyright holder of this material | PDF file iconPDF (173 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2010, Page(s):3 - 9
    IEEE is not the copyright holder of this material | PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2010, Page(s): 10
    IEEE is not the copyright holder of this material | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • Presentations

    Publication Year: 2010, Page(s): 11
    IEEE is not the copyright holder of this material | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Plenary lectures

    Publication Year: 2010, Page(s):12 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (102 KB)

    Provides an abstract for each of the invited presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session 1: Network security and privacy (NS)

    Publication Year: 2010, Page(s): 14
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Implementing agents for intrusion detection

    Publication Year: 2010, Page(s):15 - 20
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    Significant power in this direction can be gained by better taking advantage of the patterns available in the data passing through the network. We have conceived various software agents, distributed over a network, that are able to collect and filter the data and also consider the firewall rules. Preliminary experiments show a significant gain. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of a layer 7 BSD firewall

    Publication Year: 2010, Page(s):21 - 24
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    Peer-to-peer (p2p) traffic not only encourages illegal distribution of copyrighted material but also takes most of the bandwidth, therefore reducing the service quality of business critical network applications. While corporate firewalls are trying to address this issue by blocking certain TCP ports, p2p applications avoid those by disguising as well known applications such as HTTP, HTTPS, SMTP or... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A practical analysis of virtual honeypot mechanisms

    Publication Year: 2010, Page(s):25 - 30
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    This article proposes and evaluates the deployment of an automated virtual honeypot. Given that an unskilled attacker uses predefined exploit code, honeypots can be built to identify hackers and prevent them from attacking the production network. Building the virtual honeypot relies on mechanisms from multiple fields such as virtualization, scripting, penetration testing and system administration.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A practical analysis of EAP authentication methods

    Publication Year: 2010, Page(s):31 - 35
    Cited by:  Papers (1)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (857 KB) | HTML iconHTML

    In the context of a growing concern for data security, network access control has become an important part of every network security system. The purpose of this paper is to provide a comparison between different EAP Methods that can be used with IEEE 802.1x, Port Based Network Access Control, standard as a means of protecting a computer network against unauthorized access. Three of the most common... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical analysis of IPv6 security auditing methods

    Publication Year: 2010, Page(s):36 - 41
    Cited by:  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    The paper evaluates IPv6 vulnerabilities in local area networks, by testing a diversity of attack scenarios in specific testbeds. We discuss the particularities of common threats in the context of IPv4 to IPv6 transition, and we indicate possible mitigation techniques. Experiments are conducted using tools specifically written to implement the attacks. The development platform is Scapy and the tes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session 2: Computer vision and signal processing (CVSP)

    Publication Year: 2010, Page(s): 42
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • An FPGA-based stereoscopic camera - electronic design tools and techniques

    Publication Year: 2010, Page(s):43 - 48
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (727 KB) | HTML iconHTML

    Electronic design tools and techniques for the implementation of a stereoscopic camera based on an FPGA (Field Programmable Gate Array) are presented. The stages of an IPP (Image Processing Pipeline) are presented together with the development tools and languages used to implement a stereoscopic camera in hardware. In a further development of the basic system, aspects of the implementation of a 3D... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomous explorative mobile robot navigation and construction

    Publication Year: 2010, Page(s):49 - 54
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1699 KB) | HTML iconHTML

    This paper presents an autonomous device with the ability to reach a destination position, detect its environment and to multifunction. During recent years, rises in natural disasters and armed conflicts have increased the demand for autonomous devices. We propose a concept of two such devices with the ability to comfortably and remotely control such devices and even with an autonomous control in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Control of group of robots

    Publication Year: 2010, Page(s):55 - 60
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (549 KB) | HTML iconHTML

    This paper describes the design of the solution of the 3rd generation of the robot-soccer strategy system for the VŠB-TU Ostrava robot-soccer team. In this generation, we tried to completely redesign our system, implement and evaluate new, popular or advanced technologies. We divided the strategy system into two parts: the higher strategy, which makes decisions about the robots' goals, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fusion based approach for thermal and visible face recognition under pose and expresivity variation

    Publication Year: 2010, Page(s):61 - 66
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (774 KB) | HTML iconHTML

    Many existing works in face recognition are based solely on visible images. The use of bimodal systems based on visible and thermal images is seldom reported in face recognition, despite its advantage of combining the discriminative power of both modalities, under expressions or pose variations. In this paper, we investigate the combined advantages of thermal and visible face recognition on a Prin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Positioning systems for geodesic monitoring devices

    Publication Year: 2010, Page(s):67 - 72
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1591 KB) | HTML iconHTML

    This article describes the development and testing of a special high precision positioning system for an axis of a geodesic monitoring system. One of the reference inputs for the positioning system is the intensity of a beam reflected by a Lüneburg lens. This lens is mounted at every point that ought to be monitored regarding its displacement. Considering the large distances between the poi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A conceptual framework for component-based system metrics definition

    Publication Year: 2010, Page(s):73 - 78
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (867 KB) | HTML iconHTML

    The lack of standard formalism for defining software metrics has led to ambiguity in their definitions which hampers their applicability, comparison and implementation. In this paper we propose a conceptual framework for defining metrics for component-based systems. The proposed approach defines a metamodel of the corresponding context where metrics are applied. The use of algebraic sets and relat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RT visualisation using aJile aJ-80 Real Time embedded platform

    Publication Year: 2010, Page(s):79 - 84
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1149 KB) | HTML iconHTML

    This work deal with a possibilities of using an aJ-80 embedded JAVA processor in real usage. Microprocessor aJ-80 join together the advantages of programming in a higher programming language (as Java) and the system of one-chip controlling components (ATMEL, MICROCHIP, PIC, MOTOROLA etc.). Tested platform is suitable for Real Time - RT. We found several problems suitable for testing of the process... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nonlinear filtering in data signal denoising

    Publication Year: 2010, Page(s):85 - 88
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1120 KB) | HTML iconHTML

    The purpose of this work is to develop a strategy for filtering transmitted (or received) noisy data signals with minimum loss of information, which can be implemented efficiently. This strategy consists of a wavelet domain filtering that combines a discrete wavelet transform based decomposition phase and a wavelet coefficients shrinkage phase. Data-like signals are generated, white noise is added... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pixel sieve method for secret sharing & visual cryptography

    Publication Year: 2010, Page(s):89 - 94
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (752 KB) | HTML iconHTML

    Secret sharing and visual cryptography although they are two different type of cryptographic methods most of the time they are used together. In this paper a method is proposed which combines visual cryptography with secret sharing for encryption of visually represented information. The image is decrypted from the shares on the screen of the computer. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measurement and calculation of cerebrospinal fluid in proportion to the skull

    Publication Year: 2010, Page(s):95 - 99
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1792 KB) | HTML iconHTML

    The aim of this work was to create a method of an image data extracting to measure the intracranial fluids. This method can be used in medical practice for an exact diagnosis and a monitoring before and after patients' surgeries with hydrocephalus. Analyzed data were used from CT and MRI medical instruments. To solve this problem a software was designed and implemented. Semi-automatic selection of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Infrared satellite image segmentation

    Publication Year: 2010, Page(s):100 - 105
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1757 KB) | HTML iconHTML

    Satellite images are difficult to segment due to the complexity of phenomena captured within. Based on a rarely employed technique presented by Ahuja, we proposed a method for satellite infrared image segmentation. The previously introduced transform is extracting a pixel cohesion force field based on their similarities. We have found that the forces convergence points forms median lines of unifor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session 3: Web engineering and web applications (WEA)

    Publication Year: 2010, Page(s): 106
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE