2009 International Conference on Emerging Technologies最新文献

筛选
英文 中文
A benchmark for fault monitors in distributed systems 分布式系统中故障监测的基准
2009 International Conference on Emerging Technologies Pub Date : 2009-12-11 DOI: 10.1109/ICET.2009.5353193
S. Hussain, M. Qadir
{"title":"A benchmark for fault monitors in distributed systems","authors":"S. Hussain, M. Qadir","doi":"10.1109/ICET.2009.5353193","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353193","url":null,"abstract":"Fault monitoring is one of the main activities of fault tolerant distributed systems. It is required to determine the suspected /crashed component and proactively take the recovery steps to keep the system alive. The main objective of the fault monitoring activity is to quickly and correctly identify the faults. There are many techniques for fault monitoring which have general and specific parameters which influence their performance. In this paper we find the parameters that can help us classify the fault monitoring techniques. We created a benchmark ACI (Adaptation, Convergence, Intelligence) and applied it on current techniques.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121501025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing and implementing encryption algorithm for addressing GSM security issues 开发和实现解决GSM安全问题的加密算法
2009 International Conference on Emerging Technologies Pub Date : 2009-12-11 DOI: 10.1109/ICET.2009.5353146
Saad Islam, Fatima Ajmal
{"title":"Developing and implementing encryption algorithm for addressing GSM security issues","authors":"Saad Islam, Fatima Ajmal","doi":"10.1109/ICET.2009.5353146","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353146","url":null,"abstract":"GSM bears numerous security vulnerabilities. Although GSM's architecture is designed in such a way to provide various security features like authentication, data/ signaling confidentiality, and secrecy of a user yet the GSM channel is susceptible to replay, interleaving and man-in-the-middle attacks. The GSM speech service is secure up to the point where speech enters the core network. However to achieve end-to-end security it is desired that the GSM subscriber, not the network operator controls the encryption on the speech channel. A new approach of encryption at the user-end is introduced. In this paper we have tested our encryption technique on the GSM communication system using TMS320C6713 DSP Starter Kit (DSK), in real-time. Our technique encrypts the speech before entering the GSM handset which adds security and privacy. The encryption algorithm being private to the communicating GSM subscribers, the GSM channel will become exclusively confidential for them. The DSK board was used as a separate module of the system implementing the encryption algorithm. Real-time experiments were conducted to check the performance of the system in terms of its performance and latency rate.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121720855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A new technique for geometry based visual depth estimation for uncalibrated camera 一种基于几何的无标定相机视觉深度估计新技术
2009 International Conference on Emerging Technologies Pub Date : 2009-04-11 DOI: 10.1109/ICET.2009.5353174
Ibrar ullah Jan, N. Iqbal
{"title":"A new technique for geometry based visual depth estimation for uncalibrated camera","authors":"Ibrar ullah Jan, N. Iqbal","doi":"10.1109/ICET.2009.5353174","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353174","url":null,"abstract":"The most challenging issue in the field of visual control system is the accurate estimation of depth upon which all other parameters of pose estimation may depend. Here we have introduced a new approach for the depth estimation problem of a visual control system with a moving camera and stationary target. A unique visual pattern is designed to achieve the desired depth of the vision based system. In this paper the unknown depths of the special geometrical feature points are estimated from the pre-calculated depth calibrated equations, whose affects are then combined to acquire the desired goal. This specialized technique doesn't require any conventional camera calibration parameters, e.g., camera intrinsic parameters; rather it works on the specialized and accurate depth calculating calibration equations described in this paper. Simulation and experimental applications are presented which verify the performance of the proposed technique. The vision system, i.e., a wireless camera, pointing downwards, is mounted with a mechanical assembly which can move laterally as well as up and down. The required algorithm is designed in MATLAB which is capable of reading real-time images and processing it for proper lateral position and desired depths calculation at particular instants.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122277462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信