2008 IEEE Region 5 Conference最新文献

筛选
英文 中文
Low Resolution Technique for Fast Identification of Carotid Artery in Computed Tomography 计算机断层扫描快速识别颈动脉的低分辨率技术
2008 IEEE Region 5 Conference Pub Date : 2008-04-17 DOI: 10.1109/TPSD.2008.4562762
C. Stuerke
{"title":"Low Resolution Technique for Fast Identification of Carotid Artery in Computed Tomography","authors":"C. Stuerke","doi":"10.1109/TPSD.2008.4562762","DOIUrl":"https://doi.org/10.1109/TPSD.2008.4562762","url":null,"abstract":"Just as in human experience, algorithms designed to automatically locate a target within a large picture can benefit from a step back that looks at the big picture. The methodology, shown here, greatly reduces the resolution so that large scale orientation markers can be used. With very large pixels, the processing is very fast, and the results of automated cropping provide a much reduced image for further processing.","PeriodicalId":410786,"journal":{"name":"2008 IEEE Region 5 Conference","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117101218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FPGA Implementation of an 8-bit Simple Processor 一个8位简单处理器的FPGA实现
2008 IEEE Region 5 Conference Pub Date : 2008-04-17 DOI: 10.1109/TPSD.2008.4562743
E. Ayeh, K. Agbedanu, Y. Morita, O. Adamo, P. Guturu
{"title":"FPGA Implementation of an 8-bit Simple Processor","authors":"E. Ayeh, K. Agbedanu, Y. Morita, O. Adamo, P. Guturu","doi":"10.1109/TPSD.2008.4562743","DOIUrl":"https://doi.org/10.1109/TPSD.2008.4562743","url":null,"abstract":"Since its \"birth\" in 1971, embedded microprocessor has been widely used as a tool for technological innovations and cost reduction. Its speed and programmability are the main characteristics determining its performance. Therefore, for a design to be competitive, its processor has to fit the following characteristics: relatively inexpensive, flexible, adaptable, fast, and reconfigurable. A solution to this is the use of Field-programmable gate arrays (FPGA) as design tool. This paper describes the realization of an 8-bit FPGA based simple processor. Our system was implemented on the Xilinx Spartan 3 xc3s200FT256 using ISE foundation 8.1 and VHDL. 132 (6%) of the slices, 351 Bels were used. A maximum frequency of 95.364 MHz was reached with a minimum period of 10.486 ns.","PeriodicalId":410786,"journal":{"name":"2008 IEEE Region 5 Conference","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132347904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Distance Relay Mal-Operation due to Presence of SSSC on Adjacent Lines in Inter Phase Faults 相间故障中相邻线路存在SSSC引起的距离继电器误动
2008 IEEE Region 5 Conference Pub Date : 2008-04-17 DOI: 10.1109/TPSD.2008.4562747
A. Kazemi, S. Jamali, H. Shateri
{"title":"Distance Relay Mal-Operation due to Presence of SSSC on Adjacent Lines in Inter Phase Faults","authors":"A. Kazemi, S. Jamali, H. Shateri","doi":"10.1109/TPSD.2008.4562747","DOIUrl":"https://doi.org/10.1109/TPSD.2008.4562747","url":null,"abstract":"Thh paper discusses a distance relay mal-operation in the presence of Static Synchronous Series Compensator (SSSC), one of the series connected Flexible Alternating Current Transmission System (FACTS) devices, in the case of inter phase, phase to phase and three phase, faults. This is done by presenting the measured impedance at the relaying point in the presence of SSSC at the near end of the line behind. The measured impedance is greatly influenced in the presence of SSSC on the line or even in the case of SSSC installation on the adjacent lines, near end of the line behind. The measured impedance at the relaying point depends on many factors including the power system structural conditions, pre-fault loading, the fault resistance, and SSSC structural and controlling parameters.","PeriodicalId":410786,"journal":{"name":"2008 IEEE Region 5 Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125676481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Fundamentally Secure Payment Device Interfaced to Regular PCs 一个基本安全的支付设备接口到普通的个人电脑
2008 IEEE Region 5 Conference Pub Date : 2008-04-17 DOI: 10.1109/TPSD.2008.4562736
A. Bouhraoua, M. Al-Shammari
{"title":"A Fundamentally Secure Payment Device Interfaced to Regular PCs","authors":"A. Bouhraoua, M. Al-Shammari","doi":"10.1109/TPSD.2008.4562736","DOIUrl":"https://doi.org/10.1109/TPSD.2008.4562736","url":null,"abstract":"The present contribution introduces a new way for solving the issue of security for payments over the internet. It particularly addresses the issues related to the PC weaknesses like the combination of key loggers and spyware software. The device uses exclusively symmetric encryption (AES) that ties the device directly to the payment server base at fabrication time. The device is connected to the PC through the USB interface from which it takes its power. The platform architecture is built around three entities: a I/O processor (IOP) responsible for the communication and user interface and a management of keys processor (MKP), responsible for all of the messages processing. Encryption is assured by a dedicated hardware engine for increased performance. The device is made known to the payment server at fabrication time through the assignment of a device ID. Both the server and the device will use secret keys known only to the two parties. This way, the authentication and security are guaranteed at the source. The device ID along with the device and server set of keys are assembled in a data storage packet, scrambled, encrypted by a completely secret device internal key, and stored on a local serial EEPROM. Moreover, the EEPROM setting procedure is a one way procedure where no way of reading back the clear device ID and set of keys is available. The strength of this approach is the fact that the device ID is associated with a set of device keys within the payment server database.","PeriodicalId":410786,"journal":{"name":"2008 IEEE Region 5 Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114773914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Characterizing Power and Resource Consumption of Encryption/Decryption in Portable Devices 便携式设备中加密/解密的功率和资源消耗特征
2008 IEEE Region 5 Conference Pub Date : 2008-04-17 DOI: 10.1109/TPSD.2008.4562749
B. Soewito, L. Vespa, N. Weng
{"title":"Characterizing Power and Resource Consumption of Encryption/Decryption in Portable Devices","authors":"B. Soewito, L. Vespa, N. Weng","doi":"10.1109/TPSD.2008.4562749","DOIUrl":"https://doi.org/10.1109/TPSD.2008.4562749","url":null,"abstract":"One way to facilitate private communication is to transform information using encryption. However, encryption algorithms are computation-intensive and power-hungry operations for portable devices, which have computing resource limits and energy constraints. Choosing a suitable encryption-decryption algorithm to implement in portable devices is an important decision that needs to be made in order to secure the exchange of sensitive information without over utilizing the power source, processor and memory in mobile devices. This paper provides a methodology to comprehensively evaluate encryption/decryption algorithms for portable devices based on energy, delay, and footprint. Our result is based on four cutting edge algorithms: RC6, Serpent, Mars, and Twofish, and can help to analyze the power and resource overhead of encryption/decryption, as well as other applications running on mobile devices.","PeriodicalId":410786,"journal":{"name":"2008 IEEE Region 5 Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121048074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Light Weight Anti-Phishing with User Whitelisting in a Web Browser 轻量级反网络钓鱼与用户白名单在Web浏览器
2008 IEEE Region 5 Conference Pub Date : 2008-04-17 DOI: 10.1109/TPSD.2008.4562720
Yue Wang, Rinky Agrawal, Baek-Young Choi
{"title":"Light Weight Anti-Phishing with User Whitelisting in a Web Browser","authors":"Yue Wang, Rinky Agrawal, Baek-Young Choi","doi":"10.1109/TPSD.2008.4562720","DOIUrl":"https://doi.org/10.1109/TPSD.2008.4562720","url":null,"abstract":"Phishing often causes more financial damages to enterprises and users than virus and worms. Proposed techniques so far mostly are to provide protection for the banks or other enterprise corporations and/or require changes in Web servers. Regular home users are left without protection against phishing, other than the traditional rudimentary email filtering. Furthermore, security toolbars on browsers have been shown to be not effective. In this paper, we propose a light-weight user white list technique to provide protection for home users. We argue that for home users, white listing is advantageous over blacklisting, a popular technology. We show it is effective and efficient while imposing little burden on users and requiring no modification of servers.","PeriodicalId":410786,"journal":{"name":"2008 IEEE Region 5 Conference","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127349250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Impact of Self-Heating on Frequency Response of Current Mirrors in Bipolar Technology 双极技术中自热对电流镜频率响应的影响
2008 IEEE Region 5 Conference Pub Date : 2008-04-17 DOI: 10.1109/TPSD.2008.4562724
K.R. Sinha, R. Carter, H. T. Russell, W. Davis
{"title":"Impact of Self-Heating on Frequency Response of Current Mirrors in Bipolar Technology","authors":"K.R. Sinha, R. Carter, H. T. Russell, W. Davis","doi":"10.1109/TPSD.2008.4562724","DOIUrl":"https://doi.org/10.1109/TPSD.2008.4562724","url":null,"abstract":"This paper presents analytical formulations to characterize the frequency domain nonideal effects due to dynamic self-heating in current mirrors designed on silicon-on-insulator bipolar process technology. This analysis shows that the thermally induced \"zero-pole doublet\" in the transfer function of the output impedance of current mirrors can show peaking in the frequency response, near the thermal cutoff frequency unless design constraints are imposed. Analytical expressions of output impedance, Zo(s), for the most prevalent current mirrors are derived incorporating thermal effects, and design recommendations are proposed to mitigate such effects. The effects of dynamic self-heating have been demonstrated through simulations in current mirrors using the Vertical Bipolar Inter-Company (VBIC) model in the SPECTRE simulator. The simulation result agrees within 10.0% with the theoretical model.","PeriodicalId":410786,"journal":{"name":"2008 IEEE Region 5 Conference","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115470079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
UAV Autopilot Integration and Testing 无人机自动驾驶仪集成与测试
2008 IEEE Region 5 Conference Pub Date : 2008-04-17 DOI: 10.1109/TPSD.2008.4562731
D. Erdos, S. Watkins
{"title":"UAV Autopilot Integration and Testing","authors":"D. Erdos, S. Watkins","doi":"10.1109/TPSD.2008.4562731","DOIUrl":"https://doi.org/10.1109/TPSD.2008.4562731","url":null,"abstract":"The development of an unmanned aerial vehicle (UAV) platform and the integration of avionics for a search and rescue UAV is examined. The project follows the guidelines for the UAV Challenge - Outback Rescue which is an international aerospace competition. The selection process for a commercial autopilot and avionics package is described. The selected system is integrated into a standard hobby remote control aircraft and configured for autonomous flight and navigation. The autopilot system must be tuned to the aircraft platform and flight characteristics. Flight tests are described for a GPS-based grid search pattern.","PeriodicalId":410786,"journal":{"name":"2008 IEEE Region 5 Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121148582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Verification of Dynamic Separation of Duty Policy for Role-based Business Processes 基于角色的业务流程的动态职责分离策略验证
2008 IEEE Region 5 Conference Pub Date : 2008-04-17 DOI: 10.1109/TPSD.2008.4562752
Aashay Thipse, R. Hewett
{"title":"Verification of Dynamic Separation of Duty Policy for Role-based Business Processes","authors":"Aashay Thipse, R. Hewett","doi":"10.1109/TPSD.2008.4562752","DOIUrl":"https://doi.org/10.1109/TPSD.2008.4562752","url":null,"abstract":"Separation of duty (SoD) is a widely used security principle to help prevent frauds in a business process. Though SoD has been studied by many researchers, most of them are concerned with specifications of various types of SoD constraints for policy enforcement. For large organizations that employ SoD policies, the ability to automatically verify if a given user-role assignment complies with SoD policies is of the great value for security management. This paper proposes an algorithm for constraint checking of simple dynamic SoD. Unlike most previous work that enforces SoD policy at run time (when roles are activated), our approach examines policy enforcement build-time (prior to run rime, i.e. when roles are assigned to users but not activated).","PeriodicalId":410786,"journal":{"name":"2008 IEEE Region 5 Conference","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122504389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Numerical Computation of the Radiated Fields from a Thin Wire Dipole 细线偶极子辐射场的数值计算
2008 IEEE Region 5 Conference Pub Date : 2008-04-17 DOI: 10.1109/TPSD.2008.4562744
S. Walker
{"title":"Numerical Computation of the Radiated Fields from a Thin Wire Dipole","authors":"S. Walker","doi":"10.1109/TPSD.2008.4562744","DOIUrl":"https://doi.org/10.1109/TPSD.2008.4562744","url":null,"abstract":"A numerical comparison is made of three different computational methods used to determine the electric fields radiated by an isolated thin wire dipole antenna. These fields are calculated by the far-field equation, near-field equations obtained from the induced emf method, and the method of moments using constant, linear, and sinusoidal sub-domain functions. These methods are compared to each other while varying the distance between the source and field point in order to see at which distances these results agree. Validation of these results is done by comparing the resulting input admittance against measured data by Mack.","PeriodicalId":410786,"journal":{"name":"2008 IEEE Region 5 Conference","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116791051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信