By Topic

Information Security and Intelligence Control (ISIC), 2012 International Conference on

Date 14-16 Aug. 2012

Filter Results

Displaying Results 1 - 25 of 96
  • [Front cover]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (200 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2012, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (355 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (179 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):I - VII
    Request permission for commercial reuse | PDF file iconPDF (432 KB)
    Freely Available from IEEE
  • Welcome message from general chairs and program chairs

    Publication Year: 2012, Page(s): VIII
    Request permission for commercial reuse | PDF file iconPDF (376 KB) | HTML iconHTML
    Freely Available from IEEE
  • Advisory committee

    Publication Year: 2012, Page(s): IX
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • Organizing committee

    Publication Year: 2012, Page(s): X
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • Program committee

    Publication Year: 2012, Page(s):XII - XV
    Request permission for commercial reuse | PDF file iconPDF (235 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • Machine learning algorithms for data categorization and analysis in communication

    Publication Year: 2012, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (474 KB) | HTML iconHTML

    Machine learning and pattern recognition contains well-defined algorithms with the help of complex data, provides the accuracy of the traffic levels, heavy traffic hours within a cluster. In this paper the base stations and also the noise levels in the busy hour can be predicted. 348 pruned tree contains 23 nodes with busy traffic hour provided in east Godavari. Signal to noise ratio has been pred... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A proposal of sensor data collection system using mobile relay nodes

    Publication Year: 2012, Page(s):4 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1231 KB) | HTML iconHTML

    In recent years, the demand for wireless sensor network that present valuable information to users is increasing rapidly. However, in achieving wireless sensor network, the communication channel from the nodes to the data centers purchase a problem, especially in respect to the cost of furnishing IP/mobile networks for each and every one of the nodes. Many researches attempt to tackle this problem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimedia support framework for distributed web-based collaborative editing

    Publication Year: 2012, Page(s):9 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    Web-based applications offer a range of the benefits over traditional desktop applications; they are good for wide accessibility, platform independence, rich user experience, dynamic content, high scalability easy-to-share, and easy-to-use. This paper proposes a web-based framework of multimedia support for collaborative editing. A transmission protocol that integrates OT with the consideration of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A greedy approach for floopanning mass modules

    Publication Year: 2012, Page(s):13 - 16
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    Because of its efficiency in evaluating area cost and perturbation, slicing structure had been widely used to represent a floorplan in a VLSI decades ago. Due to the possibility of relatively higher dead space, slicing structure is almost replaced by non-slicing structure to represent a floorplan or placement now. However, with the fast growing of chip complexity, the amount of modules/transistors... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A matrix algebra for the linear complexity of periodic sequences

    Publication Year: 2012, Page(s):17 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (173 KB) | HTML iconHTML

    A matrix algebra is presented for the linear complexity of periodic sequences over finite fields. An algorithm is developed to compute the rank of the circulant matrices and it can be viewed as a matrix formulation of Blackburn's algorithm. The rank-nullity property is shown precisely between the pseudocirculant matrices and the Hasse matrices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simple two steps algorithm for face recongition

    Publication Year: 2012, Page(s):21 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    In this paper, we propose a very simple face recognition method. This method first exploits a linear combination of all the training samples to express the test sample. Then it evaluates the capability of each class in expressing the test sample and assigns the test sample to the class that has the strongest capability. Using the expression result, the proposed method can classify the testing samp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simple testing structure for analog circuits

    Publication Year: 2012, Page(s):25 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (501 KB) | HTML iconHTML

    This paper presents a simple current-mode testing structure for analog circuit. The proposed structure is designed by the concept of the switch-current (SI) circuit. The proposed structure moderates the rigorous matching requirement and nonidealities induced by the conventional scan based testing structure. The proposed analog testing structure is divided into two operating modes that are self eva... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An overkill detection system for improving the testing quality of semiconductor

    Publication Year: 2012, Page(s):29 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    The advance in semiconductor testing technology have improved the device quality and reliability. The testing strategy applied to dies at the wafer is definitely an important topic. The wafer-level testing scribes the wafer and selects the good dies for packaging. However, it has become increasingly difficult to identify outliers from the intrinsic distribution at test. The disagreeable overkill i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The DDRx memory controller extended for reconfigurable computing

    Publication Year: 2012, Page(s):33 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (305 KB) | HTML iconHTML

    With the popularity of the DDRx memory there are a lot of applications in digital products and platforms and the reconfigurable computing system has potential to accelerate in large amounts of data computing. However, current trend is towards combining a microprocessor with one or many reconfigurable computing units. Thus, the massive data transfer among CPUs, memory modules and reconfigurable acc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power optimal partitioning for dynamically reconfigurable FPGA

    Publication Year: 2012, Page(s):37 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (495 KB) | HTML iconHTML

    To implement a circuit system on dynamically reconfigurable FPGAs (DRFPGAs), we must partition it into sub-circuits and execute each sub-circuit in order. Traditional partitioning methods focus on optimizing the number of communication buffers. In this paper, we study the partitioning problem targeting at power optimization for the DRFPGAs. We analyze the power consumption caused by the communicat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of embedded remote control system

    Publication Year: 2012, Page(s):41 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    In the recent years, the Global System for Mobile Communications (GSM) based short message service (SMS) and the ARM (advanced RISC machine) processors based embedded systems have been widely used in the industry applications. Based on the ARM embedded system and the GSM modem, an embedded remote control system has been designed in this paper to monitor the remote machine and send automatically th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A modified energy efficient backup hierarchical clustering algorithm for WSN

    Publication Year: 2012, Page(s):45 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (478 KB) | HTML iconHTML

    In this paper, we integrate the multi-hop technique with a backup-based clustering algorithm using the residual energy to organize sensors. By using an adaptive backup strategy as well as the residual energy, the algorithm not only realizes load balance among sensor node, but also achieves dynamic cluster head distribution across the network in a timeout manner. Simulation results also demonstrate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel statistical automaton for network cloud traffic classification

    Publication Year: 2012, Page(s):49 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (238 KB) | HTML iconHTML

    Traffic classification is crucial in many network and cloud applications, they are from QoS enforcement, network monitoring to security and firewalls. In recent years, all the classification with deep packet inspection (DPI) are using the exact matching with the existing policy semantics. However, if the policy semantics is changed, then the DPI classifier is no longer able to be a workable traffi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient identity based threshold proxy signature scheme in cloud environment

    Publication Year: 2012, Page(s):53 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    Threshold proxy signature is more practical, flexible and secure than traditional proxy signature and multi-proxy signature schemes. However, the majority of existing identity-based threshold proxy signature schemes is still inefficient and impractical. Cloud services allow users to create, store, edit, and read electronic documents on the internet conveniently. While access control mechanisms ena... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hybrid intelligent protocol in sink-oriented wireless sensor networks

    Publication Year: 2012, Page(s):57 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    We propose a hybrid intelligent protocol named as CEEP which results in a cross-layered style without creating any extra interfaces for information to provide energy efficiency in sink-oriented wireless sensor networks. Congestion mitigating can serve as a basis for such an efficient protocol on the sensor nodes which are designated to collect and transmit information toward the base station. At t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-dimension Hash index design for main-memory RFID database applications

    Publication Year: 2012, Page(s):61 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    A large-scale RFID application often requires an efficient index structure design for database to provide a highly efficient data processing. This paper presents a new indexing scheme, called Multi-dimension Hash index (MH index), that satisfies all the requirements of a good RFID database applications. The main idea is to provide RFID applications extremely high efficiency in data manipulations o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.