scispace - formally typeset
Search or ask a question

Showing papers in "Computers & Electrical Engineering in 2009"


Journal ArticleDOI
TL;DR: A hybrid IDS is proposed by combining packet header anomaly detection and network traffic anomaly detection which are anomaly-based IDSs with the misuse- based IDS Snort which is an open-source project and evaluated using the MIT Lincoln Laboratories network traffic data as a testbed.

247 citations


Journal ArticleDOI
TL;DR: In this paper, a new cryptography method based on the central dogma of molecular biology is introduced, which simulates some critical processes in central dogma, it is a pseudo DNA cryptography method.

207 citations


Journal ArticleDOI
TL;DR: This paper surveys the hardware assisted solutions proposed in the literature for watermarking of multimedia objects to achieve low power usage, real-time performance, reliability, and ease of integration with existing consumer electronic devices.

86 citations


Journal ArticleDOI
TL;DR: Dynamic neural networks are used in the present work to develop soft sensors for the NO"x and O"2 emission due to combustion operation in industrial boilers to demonstrate the effectiveness of the proposed models.

74 citations


Journal ArticleDOI
TL;DR: The results show the proposed DFRST based watermarking scheme is secure, and the watermark is imperceptible and robust against various audio signal processing attacks.

69 citations


Journal ArticleDOI
TL;DR: A self-verification authentication mechanism with lower computation and key management cost is introduced and suffers from the expensive complexity of the public-key infrastructure (PKI) and a high computation overhead.

67 citations


Journal ArticleDOI
TL;DR: Because of the multiresolution decomposition for DWT and physically meaningful factorization for NMF, the proposed scheme can achieve good robustness, which is also demonstrated in the following experiments.

61 citations


Journal ArticleDOI
TL;DR: It is found that the STPKE protocol is still vulnerable to undetectable on-line password guessing attacks by using formal description, BPR model, and a countermeasure is suggested to resist these attacks.

57 citations


Journal ArticleDOI
TL;DR: This paper gives the first formal definition and security model of an identity-based multi-proxy signature scheme, then proposes and proves its security in this security model from bilinear pairings.

55 citations


Journal ArticleDOI
TL;DR: In this paper, the authors proposed a new and efficient ID-based designated verifier signature scheme that is strong and unforgeable, and showed that anyone who intercepts one signature can verify subsequent signatures.

51 citations


Journal ArticleDOI
TL;DR: Fast Walsh transform (FWT) based SS image watermarking scheme is proposed that serves the dual purposes of authentication in data transmission as well as QoS assessment for digital media through dynamic estimation of the wireless channel condition.

Journal ArticleDOI
TL;DR: It is pointed out that Park et al.'s protocol is vulnerable to the dictionary attack upon identity privacy, and two schemes with mutual authentication, half-forward secrecy, lower computation cost and less exchanged messages are proposed.

Journal ArticleDOI
TL;DR: Two different parallelization techniques to speedup the GF(p) elliptic curve multiplication in affine coordinates and the corresponding architectures are proposed and show better throughput of the proposed implementations as compared to existing reported architectures.

Journal ArticleDOI
TL;DR: A new efficiency algorithm based on the conventional ant colony optimization (ACO) to solve the communication network design when considering both economics and reliability, called improved ant colony optimizations (IACO).

Journal ArticleDOI
TL;DR: It is concluded that a refactoring of current RELs based on a set of design principles is necessary to achieve a reasonable level of DRM interoperability, and an open layered framework for development of DRM systems is proposed.

Journal ArticleDOI
TL;DR: A novel transition region extraction and thresholding method based on gray level difference is proposed by analyzing properties of transition region and can accurately extract transition region of an image and get ideal segmentation result.

Journal ArticleDOI
Tudor Barbu1
TL;DR: This paper approaches the video cut transition detection domain, providing a novel feature-based automatic identification method, and proposes a feature extraction technique that uses 2D Gabor filtering, computing tridimensional image feature vectors for the video frames.

Journal ArticleDOI
TL;DR: A high level power estimation methodology for a Network-on-Chip (NoC) router, that is capable of providing cycle accurate power profile to enable power exploration at system level and the use of the model for evaluating the effect of different core mappings using SPLASH-2 benchmark showing the utility of the power macro model.

Journal ArticleDOI
TL;DR: A dynamic model of a variable speed stand alone wind generation system is developed and additional pole-placement based PI and PID controllers in the excitation control circuit are shown to control the violently oscillating and even growing transients very effectively.

Journal ArticleDOI
TL;DR: This family of techniques is based on the improved pixel-wise (PW) watermarking scheme and includes a multi spectral-maximum PW method (MS-MPW) which is proposed to improve the PSNR value as well as the level of water marking security, when compared with MS-PW method.

Journal ArticleDOI
TL;DR: This paper aims to propose a novel e- check mechanism which allows a payer attaching the face value and the information of a payee to an e-check when dealing with a transaction.

Journal ArticleDOI
TL;DR: A routing protocol for Bluetooth scatternets is proposed that customizes the Ad hoc On-Demand Distance Vector (AODV) routing protocol by making it power-aware and suitable for scaternets and enhances the AODV flooding mechanism.

Journal ArticleDOI
TL;DR: Simulation analysis reveals that equipping A ODV with an appropriate probabilistic route discovery method can result in significant performance improvements in terms of routing overhead, MAC collisions and end-to-end delay while still achieving a good throughput when compared with the traditional AODV.

Journal ArticleDOI
TL;DR: Experimental results show that the power consumption of DTL circuits depends on unpredictable initial state of T-flip-flops, and DTL randomizes thePower consumption without using random number/mask generators while its delay time is reasonable in comparison with other logic styles.

Journal ArticleDOI
TL;DR: This paper presents a simple and efficient method for the design of recursive digital fractional order integrator when the order of integration is a real number between 0 and 1.

Journal ArticleDOI
TL;DR: This paper provides formal security proofs under a strong security model in the random oracle model after minor modification in the proxy signature schemes.

Journal ArticleDOI
TL;DR: A time-delay control theory is applied to analyze the mechanism of packet-dropping at router and the window-updating in TCP source in TCP congestion control for a TCP/ RED dynamic model and suggests that, if the network parameters satisfy certain conditions, the TCP/RED system is stable and its queue length can converge to any target.

Journal ArticleDOI
TL;DR: The routing scheme for WRON, using any two of the three routing parameters, is generalized in this paper and serves as the basis of a redundant architecture, the redundant wavelength routed optical network (RDWRON).

Journal ArticleDOI
TL;DR: A novel two-phase scheduling strategy TPSS which takes timing constraints and security needs into consideration for security-critical real-time applications on heterogeneous clusters and significantly improves the flexibility of scheduling and outperforms other algorithms is proposed.

Journal ArticleDOI
TL;DR: A model of the control and communication over WSANs is made theoretically, based on which it is demonstrated that the control method proposed could stabilize the control system quickly.