Hagen Samrow, C. Cornelius, J. Salzmann, Andreas Tockhorn, D. Timmermann
{"title":"Utilizing parallelism of TMR to enhance power efficiency of reliable ASIC designs","authors":"Hagen Samrow, C. Cornelius, J. Salzmann, Andreas Tockhorn, D. Timmermann","doi":"10.1109/ICCES.2010.5674862","DOIUrl":"https://doi.org/10.1109/ICCES.2010.5674862","url":null,"abstract":"Due to aggressive scaling, reliability issues influence the design process of integrated circuits more and more. A well known technique to tackle these issues represents Triple Modular Redundancy (TMR). It strongly improves reliability of a design at the expense of at least tripled area and power consumption. In this contribution, we propose an enhanced TMR approach that significantly decreases the power overhead of conventional TMR designs. Therefore, the control logic was modified so as to switch between a TMR mode and a parallel mode. This parallel mode allows the circuit to operate with decreased frequency without losing performance by taking advantage of the parallelism offered by the tripled design. Achieved results of investigations on the ISCAS benchmark circuits show power savings of up to 50 % with a small reliability penalty compared to a conventional TMR approach for permanent failures. We also propose strategies how to utilize both operating modes in order to balance the design concerning reliability and power consumption requirements at runtime.","PeriodicalId":124411,"journal":{"name":"The 2010 International Conference on Computer Engineering & Systems","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114317801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Beyond steganography for Voice Over IP (VOIP)","authors":"Ahmed Maher, A. Hegazy, B. Hasan, Mohamed Hashim","doi":"10.1109/ICCES.2010.5674899","DOIUrl":"https://doi.org/10.1109/ICCES.2010.5674899","url":null,"abstract":"The functional and cost advantages of Internet telephony are evident. By today's technical standards, however, Voice Over IP (VOIP) is still less secure than traditional telephony. At the same time, the hacker scene is constantly looking for new weak spots and developing ingenious methods of attack to gain access to confidential information and penetrate further into the network. One of the most security issues faced by VOIP is end-to-end user identity, specially the responder identity and how to authenticate it. This is important specially to guarantee the privacy and the integrity of the response information. In this paper we will introduce some security issues about VOIP, the role of steganography in VOIP communication, and OTSIP which is a proposed mechanism to secure VOIP based on steganography and One Time Password.","PeriodicalId":124411,"journal":{"name":"The 2010 International Conference on Computer Engineering & Systems","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124522748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GolfSense: A golf course WSN monitoring application","authors":"J. Vicente, Rui Rocha, R. Neves","doi":"10.1109/ICCES.2010.5674843","DOIUrl":"https://doi.org/10.1109/ICCES.2010.5674843","url":null,"abstract":"This paper proposes an environmental monitoring application based on the concept of Wireless Sensor Networks (WSNs). The goal of this application is to enable, through the measurement of relevant parameters, the constant evaluation of the state of the grass in the different zones of a golf course. The environmental monitoring systems currently installed on most golf courses uses a single weather station. This weather station only gives general data about the weather conditions of the region where the course is located and doesn't allow green keepers to distinguish the irrigation needs of the different zones of a golf course. By continuously monitoring the soil condition in real time on all the zones of a golf course it is possible to obtain a more detailed vision of the grass water needs and of the hydrological behaviour of each soil, thus improving irrigation efficiency.","PeriodicalId":124411,"journal":{"name":"The 2010 International Conference on Computer Engineering & Systems","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127515842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fully automatic liver tumor segmentation from abdominal CT scans","authors":"Nader H. Abdel-massieh, M. Hadhoud, K. M. Amin","doi":"10.1109/ICCES.2010.5674853","DOIUrl":"https://doi.org/10.1109/ICCES.2010.5674853","url":null,"abstract":"Liver cancer causes the majority of primary malignant liver tumors among adults. Computed Tomography (CT) scans are generally used to make the treatment plan or to prepare for ablation surgery. Processing CT image includes the automatic diagnosis of liver pathologies, such as detecting lesions and following vessels ramification, and 3D volume rendering. This paper presents a new fully automatic method to segment the tumors in liver structure with no interaction from user. Contrast enhancement is applied to the slices of segmented liver, then adding each image to itself to have a white image with some pepper noise and tumors as dark gray spots. After applying Gaussian smoothing, Isodata threshold is used to turn the image into binary with tumors as black spots on white background. Tests are reported on abdominal datasets showing promising result.","PeriodicalId":124411,"journal":{"name":"The 2010 International Conference on Computer Engineering & Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128415704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generation of iris codes using 1D Log-Gabor filter","authors":"A. Kahlil, F. Abou-Chadi","doi":"10.1109/ICCES.2010.5674879","DOIUrl":"https://doi.org/10.1109/ICCES.2010.5674879","url":null,"abstract":"In general, a typical iris recognition system includes iris imaging, iris liveness detection, iris image quality assessment, and iris recognition. This paper presents an algorithm focusing on the last two steps. The novelty of this algorithm includes improving the speed and accuracy of the iris segmentation process, assessing the iris image quality such that only the clear images are accepted so as to reduce the recognition error, and producing a feature vector with discriminating texture features and a proper dimensionality so as to improve the recognition accuracy and computational efficiency. The Hough transform, polynomial fitting technique, and some morphological operations are used for the segmentation process. The phase data from ID Log-Gabor filter is extracted and encoded efficiently to produce a proper feature vector. Experimental tests were performed using CASIA iris database (756 samples). These tests prove that the proposed algorithm has an encouraging performance.","PeriodicalId":124411,"journal":{"name":"The 2010 International Conference on Computer Engineering & Systems","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126566613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Landmark manipulation system for mobile robot navigation","authors":"Mohammed M Elmogy","doi":"10.1109/ICCES.2010.5674836","DOIUrl":"https://doi.org/10.1109/ICCES.2010.5674836","url":null,"abstract":"In mobile robot scenarios, it is expected that the robot autonomously navigates through home or office environments and processes objects/landmarks during navigation. Landmark manipulation is identified as one important research area in robot navigation systems. We have developed an online robot landmark processing system (RLPS) to detect, classify, and localize different types of landmarks during robot navigation. The RLPS is based on a two-step classification stage which is robust and invariant towards scaling and translations. It provides a good balance between fast processing time and high detection accuracy by combining the strengths of appearance-based and model-based object classification techniques. The experimental results showed that the RLPS is more powerful as it recognizes a wide range of landmarks and efficiently handles landmarks with occlusions, viewpoint variances, and illumination changes.","PeriodicalId":124411,"journal":{"name":"The 2010 International Conference on Computer Engineering & Systems","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127123839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Validation of COSMOS DSL programs","authors":"Mohammed El Amine Matougui, S. Leriche","doi":"10.1109/ICCES.2010.5674874","DOIUrl":"https://doi.org/10.1109/ICCES.2010.5674874","url":null,"abstract":"COSMOS DSL is a language dedicated to the domain of composition of context information. It allows, through its high-level constructions, to treat very large amounts of context data coming from distributed sources, whatsoever in ubiquitous systems or large-scale distributed systems. In this paper, we focus on the safety of programs developed in COSMOS DSL. We discuss the needs of reliability and validation of specific properties such as the lack of deadlocks and vivacity of context information. Then we propose an automatable modeling of COSMOS DSL using the Petri nets formalism to allow verification of behavioral properties in a software tool.","PeriodicalId":124411,"journal":{"name":"The 2010 International Conference on Computer Engineering & Systems","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131654132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}