2006 IEEE Region 5 Conference最新文献

筛选
英文 中文
IEEE 1451 with IEEE 1275: Synergy for sensing and control IEEE 1451与IEEE 1275:传感和控制的协同
2006 IEEE Region 5 Conference Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507409
P. Frenger
{"title":"IEEE 1451 with IEEE 1275: Synergy for sensing and control","authors":"P. Frenger","doi":"10.1109/TPSD.2006.5507409","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507409","url":null,"abstract":"IEEE 1451 is a family of related low-level standards covering the use of networked sensors and actuators. These techniques improve interoperability by enabling simple transducers to be upgraded to intelligent status. IEEE 1451 utilizes interface protocols from hardwired and wireless communication practices. IEEE 1275 describes a computer network initialization and testing process. This standard employs a byte-coded virtual machine to operate independent of CPU, software, or network configuration. It contains its own embedded programming language. The author describes how these complimentary standards may be utilized to create novel plug-and-play, hot-swap, self-configuring, pre-calibrated, multi-drop networks, for closed-loop, intrinsically-safe medical, scientific and robotic applications.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116929781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
From cancer gene expression data to simple vital rules 从癌症基因表达数据到简单的生命规则
2006 IEEE Region 5 Conference Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507407
R. Hewett, Ali Goksu, Soma Datta
{"title":"From cancer gene expression data to simple vital rules","authors":"R. Hewett, Ali Goksu, Soma Datta","doi":"10.1109/TPSD.2006.5507407","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507407","url":null,"abstract":"Microarray gene expression profiling technology generates huge high-dimensional data. Finding analysis techniques that can cope with such data characteristics is crucial in Bioinformatics. This paper proposes a variation of an ensemble learning approach combined with a clustering technique to extract “simple” and yet “vital” rules from genomic data. The paper describes the approach and evaluates it on cancer gene expression data sets. We report experimental results including comparisons with other results obtained from a similar ensemble learning approach as well as some sophisticated techniques such as support vector machines.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126637473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New steganalysis technique for the digital media forensics examiner 数字媒体取证审查员的新隐写分析技术
2006 IEEE Region 5 Conference Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507436
S. Agaian, B. M. Rodriguez, Gilbert L. Peterson
{"title":"New steganalysis technique for the digital media forensics examiner","authors":"S. Agaian, B. M. Rodriguez, Gilbert L. Peterson","doi":"10.1109/TPSD.2006.5507436","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507436","url":null,"abstract":"Steganographic fingerprints are convened with the individuality of the steganographic methods. The basic goals of this article are: 1. To evaluate sequential and randomly embedded steganographic evidence within digital images. 2. To identify the “steganographic fingerprint” of spatial domain based steganographic methods. Steganographic fingerprinting is the next step towards forensic analysis, reachable only if one may localize steganographic content within an image. The presented detection method works equally well for sequential and random embedding. We will show that the new method may improve the message length estimation, detection accuracy and give an indication of the embedding method. In addition we will show the false alarm rate of 0.9 for the proposed method, while the false alarm rate for the commonly used technique RS Steganalysis is 2.4.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116384009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The novel Arc low-pass filter 新颖的弧形低通滤波器
2006 IEEE Region 5 Conference Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507414
Ranjith Raghunath, Joann M. Moreno, A. Grigoryan
{"title":"The novel Arc low-pass filter","authors":"Ranjith Raghunath, Joann M. Moreno, A. Grigoryan","doi":"10.1109/TPSD.2006.5507414","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507414","url":null,"abstract":"In this paper, we propose a new form of the amplitude response for designing low-pass filters, that is defined by a modified arctangent function in the frequency domain. This is a parameterized and very smooth function which can be used for any tolerance scheme with given specifications. The filter depends on two parameters that allow us to straighten the magnitude response from the passband to stopband without increasing the computational complexity of the filter. The main properties of the low-pass filter with the proposed magnitude response, which we call the Arc low-pass filter, are considered and compared with the well known Chebyshev and Butterworth filters.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122990202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Open Source solutions for secure government systems 为安全的政府系统利用开源解决方案
2006 IEEE Region 5 Conference Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507466
Michael Worden
{"title":"Leveraging Open Source solutions for secure government systems","authors":"Michael Worden","doi":"10.1109/TPSD.2006.5507466","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507466","url":null,"abstract":"Recent updates to federal government and Department of Defense (DoD) security policies have opened the door to the official use of Open Source Software (OSS) as a solution set for the development of secure enterprise systems. New policies published by the National Institute of Standards and Technology (NIST) and the DoD have significantly changed the guidelines associated with deployment of industry-standard OSS security solutions, including: ● Linux - including the NSA sponsored “Security Enhanced Linux” product ● OpenSSL - a full-strength general-purpose cryptography ● Tripwire and Open Source Tripwire® - A change Monitoring and Analysis and auditing product","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114565407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fractal steganography using artificially generated images 分形隐写术使用人工生成的图像
2006 IEEE Region 5 Conference Pub Date : 2006-04-07 DOI: 10.1117/12.777663
S. Agaian, Johanna M. Susmilch
{"title":"Fractal steganography using artificially generated images","authors":"S. Agaian, Johanna M. Susmilch","doi":"10.1117/12.777663","DOIUrl":"https://doi.org/10.1117/12.777663","url":null,"abstract":"There exist a variety of fractal-based data hiding methods in an image. The main contribution of the previous work was to embed data by modifying the original, pre-existing image or embedding an encrypted datastream in an image. In this paper, we propose a fractal based approach for hiding sensitive information in a cover image (including artificially generated fractal images). The fractal parameters of the image are altered by the steganographic data while the image is generated. This results in an image that is generated with the data already hidden in it and not added after the fact. We show that the input parameters of the algorithm, such as the type of fractal and number of iterations, will serve as a simple encryption key for the hidden information. We also explain how the capacity of the image is affected by the variation of the parameters. Finally, we demonstrate that the proposed algorithms are immune to the commonly used steganographic detection algorithms.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128205228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
THD-optimal staircase modulation of single-phase multilevel inverters 单相多电平逆变器的thd优化阶梯调制
2006 IEEE Region 5 Conference Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507417
Bill Diong
{"title":"THD-optimal staircase modulation of single-phase multilevel inverters","authors":"Bill Diong","doi":"10.1109/TPSD.2006.5507417","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507417","url":null,"abstract":"This paper considers the problem of achieving the minimum THD of the staircase-modulated output voltage of single-phase multilevel inverters, with or without elimination of the lowest harmonics. The minimal THD values together with the corresponding necessary step angles (and also dc source ratios when the source values are not constrained to be equal) have been obtained for various waveform cases. The results show that requiring harmonic elimination yields slightly to somewhat worse distortion, and that using unequal dc source voltages is better than using equal ones, as expected.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128590094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Power quality issue with variable speed drive a case study for oil exploration operation in Russia 变速驱动的电能质量问题——以俄罗斯石油勘探作业为例
2006 IEEE Region 5 Conference Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507418
Bijoy Chat
{"title":"Power quality issue with variable speed drive a case study for oil exploration operation in Russia","authors":"Bijoy Chat","doi":"10.1109/TPSD.2006.5507418","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507418","url":null,"abstract":"The use of variable speed drive (VSD) has been increased significantly to improve the energy efficiency and conservation. It is estimated that pumping system accounts for nearly 20% of the world's energy used by electric motors and 25% to 50% of the total electrical energy usage in certain industrial facilities [1]. As such, there is a significant incentive to improve the efficiency and performance of pumps.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116274572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A pseudo random I/O scrambling and transformation approach in prevention of software piracy 一种防止软件盗版的伪随机I/O置乱与转换方法
2006 IEEE Region 5 Conference Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507459
B. Chatt, Rajesh Bhairampally, Amarsh Movva, A. Chopra
{"title":"A pseudo random I/O scrambling and transformation approach in prevention of software piracy","authors":"B. Chatt, Rajesh Bhairampally, Amarsh Movva, A. Chopra","doi":"10.1109/TPSD.2006.5507459","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507459","url":null,"abstract":"This paper discusses a technique where input-output (I/O) is scrambled by mathematical manipulation. The process is effective in diverting the attention of adversary in terms of actual purpose of the application software. The technique is particularly useful when the software application performs certain number of mathematical equations, and produces a numerical result. The paper also demonstrates how the approach is effective in preventing reverse-engineering of the application. The paper illustrates the implementation of the scheme for a software application, and describes various software issues and practicality of implementation.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122278403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Position dependent photocurrent intensity of MSM photodetectors MSM光电探测器的位置依赖光电流强度
2006 IEEE Region 5 Conference Pub Date : 2006-04-07 DOI: 10.1109/TPSD.2006.5507430
S. Yuan, Jianning Wang, Yumin Zhang, J. Krasinski
{"title":"Position dependent photocurrent intensity of MSM photodetectors","authors":"S. Yuan, Jianning Wang, Yumin Zhang, J. Krasinski","doi":"10.1109/TPSD.2006.5507430","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507430","url":null,"abstract":"It was found experimentally that the photocurrent intensity in a Metal-Semiconductor-Metal (MSM) structure has a strong dependence on the position of the incident laser beam; however, there is no satisfactory explanation of this phenomenon. We simulated this process with device simulator ATLAS, and the result agrees with experiment pretty well. We also investigated various factors such as material property and external bias voltage that affect the current density, and found that the photocurrent changed significantly with these parameters.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133038878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信