2009 2nd International Conference on Adaptive Science & Technology (ICAST)最新文献

筛选
英文 中文
New three-input XOR and XNOR gates based on Generalized Threshold Gates using RTDs 基于rtd的广义门限门的新型三输入异或或门
2009 2nd International Conference on Adaptive Science & Technology (ICAST) Pub Date : 2009-12-01 DOI: 10.1109/ICASTECH.2009.5409753
S. M. Mirhoseini, M. Sharifi, D. Bahrepour
{"title":"New three-input XOR and XNOR gates based on Generalized Threshold Gates using RTDs","authors":"S. M. Mirhoseini, M. Sharifi, D. Bahrepour","doi":"10.1109/ICASTECH.2009.5409753","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409753","url":null,"abstract":"In this paper by utilizing a new concept for designing logic gates based on MOBILE, we have presented new three-input XOR and XNOR gates which were based on Generalized Threshold Gate (GTG) topology. The proposed gates use fewer elements count in comparison with other implementations which utilize MOBILE as a main part. The correct operation of XOR and XNOR gates were confirmed by using HSPICE simulator.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132072898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-health services in rural communities in the developing countries 发展中国家农村社区的电子保健服务
2009 2nd International Conference on Adaptive Science & Technology (ICAST) Pub Date : 2009-12-01 DOI: 10.1109/ICASTECH.2009.5409722
E. E. Essien, E. E. Williams
{"title":"E-health services in rural communities in the developing countries","authors":"E. E. Essien, E. E. Williams","doi":"10.1109/ICASTECH.2009.5409722","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409722","url":null,"abstract":"Health service delivery to rural communities has always been a vexed problem for most governments in developing countries. Several factors impeding the success of government programmes in this sub-sector include corruption, inadequate supply of drugs, paucity and/poor quality of medical personnel, lack of medical equipment and facilities, cost (transportation to the hospital, medical bills) to the patients of obtaining medical attention and interference by unorthodox medical practitioners. This paper surveys the problems that inhibit provision of adequate preventive and curative health care to rural communities and suggests affordable and sustainable ways in which ICT can be used to solve these problems. Special emphasis is given to use of ICT for public enlightenment for preventive health care and also for the implementation of affordable access to curative health care.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131491319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
In-the-wire authentication: Protecting client-side critical data fields in secure network transactions 在线认证:在安全网络事务中保护客户端关键数据字段
2009 2nd International Conference on Adaptive Science & Technology (ICAST) Pub Date : 2009-12-01 DOI: 10.1109/ICASTECH.2009.5409720
Mark Currie
{"title":"In-the-wire authentication: Protecting client-side critical data fields in secure network transactions","authors":"Mark Currie","doi":"10.1109/ICASTECH.2009.5409720","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409720","url":null,"abstract":"Secure Internet services like online banking require a \"trusted terminal\" on the client-side. However, even where strong client-side security is employed, the client PC is often used for input and output of sensitive information like PINs/passwords, amounts, account numbers, etc. These transactions are therefore vulnerable to manipulation by malware. A method is presented here allowing web users to share small amounts of secret information including passwords and account numbers with a large number of existing Internet services by creating a cryptographically secure trusted path between the web user and the service. The trusted path is created with the support of a hand-held user terminal device \"in-the-wire\" between the user's PC and the service thus preventing malware on the user's PC from manipulating login and other sensitive data. A key feature is that the trusted terminal device can be retrofitted on the client-side and require no changes to the server-side. This creates a new class of client-centric communications security hardware allowing web users to protect their transactions using strong hardware security without relying on service providers. It offers the industry an alternative to the current service-centric approach which is often hamstrung by a chicken-and-egg problem of critical mass adoption.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121612668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Schottky-barrier CNTFET and resonant transmission through it 肖特基势垒CNTFET及其共振传输
2009 2nd International Conference on Adaptive Science & Technology (ICAST) Pub Date : 2009-12-01 DOI: 10.1109/ICASTECH.2009.5409732
M. Sharifi, M. Sanaeepur
{"title":"Schottky-barrier CNTFET and resonant transmission through it","authors":"M. Sharifi, M. Sanaeepur","doi":"10.1109/ICASTECH.2009.5409732","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409732","url":null,"abstract":"In this paper we have completed previous works on SBCNFET and proposed a new three capacitance model. Using this new model we have calculated the energy profile in the channel. Moreover the transmission coefficient through the channel has been studied and modified relations which consider the electron coherency is proposed. Solving Poisson and Schrödinger equations self consistently, the validity of above mentioned issues are assessed.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123763951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tracking a Sycophant Wireless Sensor Network for its seamless integration to mobile Wireless Sensor Networks 跟踪一个谄媚的无线传感器网络,使其无缝集成到移动无线传感器网络
2009 2nd International Conference on Adaptive Science & Technology (ICAST) Pub Date : 2009-12-01 DOI: 10.1109/ICASTECH.2009.5409737
Sedat Dogru, A. Erkmen, I. Erkmen
{"title":"Tracking a Sycophant Wireless Sensor Network for its seamless integration to mobile Wireless Sensor Networks","authors":"Sedat Dogru, A. Erkmen, I. Erkmen","doi":"10.1109/ICASTECH.2009.5409737","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409737","url":null,"abstract":"In this paper we introduce our novel concept of Sycophant Wireless Sensors (SWS) which is a static ecto-parasitic clandestine sensor network mounted incognito on a mobile agent using only the agent's mobility without intervention. SWS networks not only communicate with each other through mobile WSN but also cooperate with them to form a global hybrid Wireless Sensor Network (WSN). Our work develops the SLAM methodology integrating the different type of mobilities of SWS networks and mobile WSN's where the units of the latter network need also to track SWS besides cooperating and maintaining connectivity between the different SWS networks to form a seamless hybrid sensor network. This paper focuses on that latter issue. Demonstrative results are provided on the experimental setup including performance analysis of the methodology which also is conducted in simulation besides the hardware implementation for an elaborate sensitivity analysis to system parameters.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134046551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Broadband / future generation network services deployment in rural and remote areas 在乡郊及偏远地区部署宽频/下一代网络服务
2009 2nd International Conference on Adaptive Science & Technology (ICAST) Pub Date : 2009-12-01 DOI: 10.1109/ICASTECH.2009.5409736
JT Mosenthal, B. Nleya, NG Manthoko
{"title":"Broadband / future generation network services deployment in rural and remote areas","authors":"JT Mosenthal, B. Nleya, NG Manthoko","doi":"10.1109/ICASTECH.2009.5409736","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409736","url":null,"abstract":"In this paper we provide an overview of current broadband and future generation services and their possible deployment in rural areas on the African continent. We discuss the challenges for deployment. In general Broadband access and the future generation network in rural areas should be increased through any technology, including wireless, wire line and optical. To be economically viable, rural areas need access to health care, government services, educational and business opportunities. It is in our viewthat in the interim wireless, high-speed Internet can fill the broadband void in rural areas by providing a cost- effective, overall platform for some of the services.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131794893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Intrussion detection by penetration test in an organization network 在组织网络中通过渗透测试进行入侵检测
2009 2nd International Conference on Adaptive Science & Technology (ICAST) Pub Date : 2009-12-01 DOI: 10.1109/ICASTECH.2009.5409719
N. Hamisi, N. Mvungi, D. Mfinanga, B. Mwinyiwiwa
{"title":"Intrussion detection by penetration test in an organization network","authors":"N. Hamisi, N. Mvungi, D. Mfinanga, B. Mwinyiwiwa","doi":"10.1109/ICASTECH.2009.5409719","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409719","url":null,"abstract":"This paper presents a study made on network security in an organization's local area network (LAN). Intrusion detection test in a campus network was performed using penetration test methods and the results analyzed. The objectives were to identify different form of network attacks and methods used to capture the hacking. During the study, the risks and attacks caused by hackers to the network were evaluated. The results obtained are seen as a good indicator of the security state of the network. Hence, an organization network that responds well to penetration test can be given a certificate. Such certificate will provide a positive sign and confidence to the network users. The study was conducted in a dynamic situation by doing experiments during different periods of time. The case study was a campus LAN, The network administrator permitted network information like internet protocol (IP) address to be gathered and analyzed and to performed the penetration test that enabled , hackers and attackers methods to be dentified. It was realized that 90% of network the users has no fear of the network security risk inspite of the finding that network security rating of the case study is at 50 percent.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123132451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A sustainable model for information and communication technology in Nigeria's tertiary educational transformation 信息和通信技术在尼日利亚高等教育转型中的可持续模式
2009 2nd International Conference on Adaptive Science & Technology (ICAST) Pub Date : 2009-12-01 DOI: 10.1109/ICASTECH.2009.5409724
S. Orike, C. Ahiakwo
{"title":"A sustainable model for information and communication technology in Nigeria's tertiary educational transformation","authors":"S. Orike, C. Ahiakwo","doi":"10.1109/ICASTECH.2009.5409724","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409724","url":null,"abstract":"Information and Communication Technology (ICT) has revolutionalized and globalized all aspects of human endeavor. The effects of ICT in transforming the educational sector and contributions to the advancement of knowledge through teaching and learning is the rationale behind this study, which investigates the impact of ICT in transforming tertiary education in Nigeria. The study identified three key areas in addressing the transformation: expanding the access to teaching and learning; improving the quality of education; and making it affordable in terms of cost and time. A mixed methodology approach was adopted which involved the use of questionnaires and unstructured interviews administered on students and lecturers, using a case study survey strategy. A novel sustainable ICT model termed guided transformation was developed.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124509539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
High temperature electronics: R&D challenges and trends in materials, packaging and interconnection technology 高温电子:材料、封装和互连技术的研发挑战和趋势
2009 2nd International Conference on Adaptive Science & Technology (ICAST) Pub Date : 2009-12-01 DOI: 10.1109/ICASTECH.2009.5409731
E. Amalu, Nduka Nnamdi (Ndy) Ekere, R. Bhatti
{"title":"High temperature electronics: R&D challenges and trends in materials, packaging and interconnection technology","authors":"E. Amalu, Nduka Nnamdi (Ndy) Ekere, R. Bhatti","doi":"10.1109/ICASTECH.2009.5409731","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409731","url":null,"abstract":"The development of new high temperature electronics (HTE)/systems is the key to achieving high reliability safety critical operations in aerospace, automotive and well-logging applications. Reliability issues associated with the operation of HTE devices have been shown to account for some of the recent aircraft crashes as well as failures of the electronic control Unit in modern vehicles. The reliability of electronic systems is partly dependent on its operating ambient conditions; and reliability generally decreases in harsh operating conditions. The life expectancy of components and systems is known to reduce exponentially as the operating temperature increases; adversely impacting long-term system reliability. As under-bonnet, aerospace and well-logging applications require the direct exposure of sensors to very harsh conditions - these applications demand new HTE systems which can operate reliably in harsh conditions whilst preserving their properties/functions over long operating periods. The packaging and interconnection of the new HTE systems requires better understanding of the complex interactions between HTE system parameters and specific environmental conditions. The paper presents an overview of HTE research, reviews the trends in materials, component packaging and interconnect technology. The paper also outlines the key challenges in HTE research and the outstanding R&D issues.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127047042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Control and society 控制与社会
2009 2nd International Conference on Adaptive Science & Technology (ICAST) Pub Date : 2009-12-01 DOI: 10.1109/ICASTECH.2009.5409690
P. Albertos
{"title":"Control and society","authors":"P. Albertos","doi":"10.1109/ICASTECH.2009.5409690","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409690","url":null,"abstract":"The concept of system, as a set of components and their relations and interactions, is a common one in Nature, human-made devices and human society. And most systems can be considered as composed of subsystems, one of them being the control subsystem. In this paper, first, the controlled behavior of natural systems is emphasized, pointing out what is being learned from them to develop automatic control systems in different fields of application. Then, the relevance of the control subsystem in many important industrial developments is also discussed. In human activities, control and regulating systems also play a crucial role. In this Digital Era, the relevant role played by Communication, Computers and Control is also analyzed. Some illustrative examples will serve as a reference for further discussion. Finally, some advanced topics related with the CCC technology are reviewed.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127237864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信