deber2

39
2. Accession Number13176079 Author Harsh P. Dudouet F. Cascella RG. Jegou Y. Morin C. Author Unabbreviated Harsh P.; Dudouet F.; Cascella R. G.; Jegou Y.; Morin C. Author/Editor Affiliation Harsh P. Dudouet F. Cascella RG. Jegou Y. Morin C. : Inria Rennes - Bretagne Atlantique, Rennes, France Author Email Harsh P: [email protected] Dudouet F: [email protected] Cascella RG: [email protected] Jegou Y: [email protected] Morin C: [email protected] Title Using open standards for interoperability issues, solutions, and challenges facing cloud computing Source 2012 8th International Conference on Network and Service Management (CNSM 2012). IEEE. 2012, 435-40. Piscataway, NJ, USA. Date of Publication 2012 Country of Publication USA Conference Information 2012 8th International Conference on Network and Service Management (CNSM 2012). Las Vegas, NV, USA. 22-26 Oct. 2012. Abstract Virtualization offers several benefits for optimal resource utilization over traditional non-virtualized server farms. With improvements in internetworking technologies and increase in network bandwidth speeds, a new era of computing has been ushered in, that of grids and clouds. With several commercial cloud providers coming up, each with their own APIs, application

Upload: luis-mario

Post on 31-Oct-2014

26 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: deber2

2.

Accession Number 13176079

Author Harsh P. Dudouet F. Cascella RG. Jegou Y. Morin C.

Author Unabbreviated Harsh P.; Dudouet F.; Cascella R. G.; Jegou Y.; Morin C.

Author/Editor Affiliation Harsh P. Dudouet F. Cascella RG. Jegou Y. Morin C. : Inria Rennes - Bretagne Atlantique, Rennes, France

Author Email Harsh P: [email protected]

Dudouet F: [email protected]

Cascella RG: [email protected]

Jegou Y: [email protected]

Morin C: [email protected]

Title Using open standards for interoperability issues, solutions, and challenges facing cloud computing

Source 2012 8th International Conference on Network and Service Management (CNSM 2012). IEEE. 2012, 435-40. Piscataway, NJ, USA.

Date of Publication 2012

Country of Publication USA

Conference Information 2012 8th International Conference on Network and Service Management (CNSM 2012). Las Vegas, NV, USA. 22-26 Oct. 2012.

Abstract Virtualization offers several benefits for optimal resource utilization over traditional non-virtualized server farms. With improvements in internetworking technologies and increase in network bandwidth speeds, a new era of computing has been ushered in, that of grids and clouds. With several commercial cloud providers coming up, each with their own APIs, application description formats, and varying support for SLAs, vendor lockin has become a serious issue for end users. This article attempts to describe the problem, issues, possible solutions and challenges in achieving cloud interoperability. These issues will be analyzed in the ambit of the European project Contrail that is trying to adopt open standards with available virtualization solutions to enhance users' trust in the clouds by attempting to prevent vendor lock-ins, supporting and enforcing SLAs together with adequate data protection for sensitive data. (29 References).

Page 2: deber2

Subject Headings application program interfaces; cloud computing; grid computing; internetworking; open systems; public domain software; resource allocation; security of data; trusted computing; virtualisation.

Key Phrase Identifiers open standard; cloud computing; virtualization; optimal resource utilization; nonvirtualized server; internetworking technology; network bandwidth; grid computing; cloud provider; API; application description formats; SLA; end user computing; cloud interoperability; user trust enhancement; vendor lock-in; data protection.

International Patent Classification Multiprogramming arrangements [G06F9/46]; Security arrangements for protecting computers or computer systems against unauthorised activity [G06F21/00]; Characterised by path configuration, e.g. lan [local area networks] or wan [wide area networks] [H04L12/28]; Arrangements for connecting between networks having differing types of switching systems, e.g. gateways [H04L12/66].

Classification Codes Internet software [C6190J]; Computer networks and techniques [C5620]; Data security [C6130S]; Operating systems [C6150J]; Grid computing [C6190G].

Treatment Practical.

Language English.

ISBN 978-1-4673-3134-0

Publication Type Conference Paper

Inspec Update Code 2013010.

Update Code 201301.

Copyright Copyright 2013, The Institution of Engineering and Technology.

Page 3: deber2
Page 4: deber2

|Resultados de la búsqueda|

3.

Accession Number 13176070

Author Shtern M. Simmons B. Smit M. Litoiu M.

Author Unabbreviated Shtern M.; Simmons B.; Smit M.; Litoiu M.

Author/Editor Affiliation Shtern M. Simmons B. Smit M. Litoiu M. : York University, Toronto, ON, Canada

Author Email Shtern M: [email protected]

Simmons B: [email protected]

Smit M: [email protected]

Litoiu M: [email protected]

Organization Identifier 7991.

Title An architecture for overlaying private clouds on public providers

Source 2012 8th International Conference on Network and Service Management (CNSM 2012). IEEE. 2012, 371-7. Piscataway, NJ, USA.

Date of Publication 2012

Country of Publication USA

Conference Information 2012 8th International Conference on Network and Service Management (CNSM 2012). Las Vegas, NV, USA. 22-26 Oct. 2012.

Abstract Organizations shifting to a public cloud infrastructure face potential hurdles regarding control and security, and must acquire a new set of best practices regarding developing and deploying to a cloud infrastructure. We propose a reference architecture for a virtual private cloud built on cross-provider ondemand compute instances, with a set of components, services, and algorithms to produce a managed platform that reduces the level of trust required for infrastructure-as-a-service (IaaS) providers, increases control and isolation, improves security and data protection, and allows architects, developers, and operations staff to deploy applications to the cloud using their existing body of knowledge and best practices. Two concrete architectures based on this reference are presented, and a prototype implementation is described and tested. (22 References).

Subject Headings cloud computing; data privacy; overlay networks; security of data; virtual private networks; Web services.

Page 5: deber2

Key Phrase Identifiers public service provider; public cloud infrastructure; virtual private cloud; on-demand service; infrastructure as a service; IaaS; data security; data protection; private cloud overlay.

International Patent Classification Multiprogramming arrangements [G06F9/46]; Security arrangements for protecting computers or computer systems against unauthorised activity [G06F21/00].

Classification Codes Internet software [C6190J]; Data security [C6130S].

Treatment Practical; Theoretical or Mathematical.

Language English.

ISBN 978-1-4673-3134-0

Publication Type Conference Paper

Inspec Update Code 2013010.

Update Code 201301.

Copyright Copyright 2013, The Institution of Engineering and

1. Accession Number

13175992

AuthorNoor NSM. Ngah R. Prakoso T. Sukito SNA.

Author Unabbreviated

Noor N. S. M.; Ngah R.; Prakoso T.; Sukito S. N. A.

Author/Editor Affiliation

Noor NSM. Ngah R. Prakoso T. Sukito SNA. : Wireless Communication Centre, Universiti Teknologi Malaysia (UTM), Skudai, Malaysia

Author Email

Noor NSM: [email protected] R: [email protected] T: [email protected] SNA: [email protected]

Organization 54702.

Page 6: deber2

Identifier

TitleFiber drop point design for optical - Wireless access

Source2012 IEEE 3rd International Conference on Photonics (ICP 2012). IEEE. 2012, 365-9. Piscataway, NJ, USA.

Date of Publication

2012

Country of Publication

USA

Conference Information

2012 IEEE 3rd International Conference on Photonics (ICP 2012). Penang, Malaysia. 1-3 Oct. 2012.

Abstract

This paper presents the design of a fiber drop point (FDP) for optical - wireless access. The FDP uses Multiple Input Multiple Output-Orthogonal Frequency Division Multiplexing (MIMO-OFDM) to increase the transmission speed more than 54Mbps. FDP will provide high-speed broadband services to indoor users. The FDP is simulated using OptiSystem software. The analysis of constellation diagram is carried out which represent the transmission performance of the FDP system. This system is operating in wireless local area network (WLAN) 802.11n at 2.4GHz band. The simulation results showed that the maximum speed of 130Mbps is achieved. (9 References).

Subject HeadingsMIMO communication; OFDM modulation; optical fibre subscriber loops; radio access networks; wireless LAN.

Key Phrase Identifiers

optical-wireless access; fiber drop point design; multiple input multiple output-orthogonal frequency division multiplexing; MIMO-OFDM; OptiSystem software; FDP system; wireless local area network; WLAN; constellation diagram; indoor users; FTTH; byte rate 130 MByte/s; frequency 2.4 GHz.

International Patent

Classification

Transmission through free space, e.g. through the atmosphere [H04B10/10]; Transmission through light guides, e.g. optical fibres [H04B10/12]; Orthogonal multiplex systems [H04J11/00]; Characterised by path configuration, e.g. lan [local area networks] or wan [wide area networks] [H04L12/28].

Classification Codes

Optical fibre networks [B6260F]; Free-space optical links [B6260S]; Computer communications [B6210L]; Local area networks [C5620L].

TreatmentPractical.

Numeric Data byte rate 1.3E+08 Byte/s

Page 7: deber2

frequency 2.4E+09 Hz

LanguageEnglish.

Digital Object Identifier

http://dx.doi.org/10.1109/ICP.20...

ISBN978-1-4673-1461-9

U.S. Copyright Clearance Center

Code

978-1-4673-1463-3/12/$31.00.

Publication TypeConference Paper

Inspec Update Code

2013010.

Update Code201301.

Copyright Copyright 2013, The Institution of Engineering and Technology.

4. Accession Number

13175810

AuthorMemon MU. Zhang LX. Shaikh B.

Author Unabbreviated

Memon M. U.; Zhang Li X.; Shaikh B.

Author/Editor Affiliation

Memon MU. : Dept. of Electrical Engineering, Sukkur Institute of Business Administration, Sukkur, PakistanZhang LX. : School of Electronic and Electrical Engineering, University

Page 8: deber2

of Leeds, Leeds, UKShaikh B. : Institute of Information and Communication Technologies, Mehran University of Engineering and Technology, Jamshoro, Pakistan

Author Email

Memon MU: [email protected] LX: [email protected] B: [email protected]

Organization Identifier

66972.

TitlePacket loss ratio evaluation of the impact of interference on zigbee network caused by Wi-Fi (IEEE 802.11b/g) in e-health environment

Source

2012 IEEE 14th International Conference on e-Health Networking, Applications and Services (Healthcom 2012). IEEE. 2012, 462-5. Piscataway, NJ, USA.

Date of Publication

2012

Country of Publication

USA

Conference Information

2012 IEEE 14th International Conference on e-Health Networking, Applications and Services (Healthcom 2012). Beijing, China. Commun. Soc.. 10-13 Oct. 2012.

Abstract

Wireless technologies are well known to provide tremendous benefits to the healthcare sector. In the evaluation of the wireless technologies, ZigBee is found specifically suitable for monitoring due to its low cost, long battery life and widely accepted standard. But ZigBee uses the same ISM free band with other wireless techniques, such as Wi-Fi, which is also widely deployed in health care. The coexistence of these techniques in the crowded ISM band will cause mutual interference, which in medical environment has death indication. This paper aims at providing a comprehensive evaluation of the interference between Wi-Fi and ZigBee technologies. Constructing on earlier work led by researchers in Schneider Electric [2], real-time tests were performed in research laboratory and residential environment and results were analyzed to provide a reference for the deployment of multiple wireless technologies to avoid mutual interference. (7 References).

Subject Headingsbiomedical communication; health care; interference suppression; wireless LAN; Zigbee.

Key Phrase Identifiers

packet loss ratio evaluation; Zigbee network; Wi-Fi; IEEE 802.11b-g; e-health environment; wireless technologies; healthcare sector; crowded ISM band; mutual interference avoidance; medical environment; death

Page 9: deber2

indication; Schneider electric; real-time tests; laboratory environment; residential environment.

International Patent

Classification

Digital computing or data processing equipment or methods, specially adapted for specific applications [G06F19/00]; Radio transmission systems, i.e. using radiation field [H04B7/00]; Characterised by path configuration, e.g. lan [local area networks] or wan [wide area networks] [H04L12/28]; Wireless communication networks [H04W].

Classification Codes

Biomedical communication [B7550]; Electromagnetic compatibility and interference [B5230]; Computer communications [B6210L]; Radio links and equipment [B6250]; Biology and medical computing [C7330]; Local area networks [C5620L].

TreatmentPractical.

LanguageEnglish.

Digital Object Identifier

http://dx.doi.org/10.1109/Health...

ISBN978-1-4577-2039-0

U.S. Copyright Clearance Center

Code

978-1-4577-2040-6/12/$26.00.

Publication TypeConference Paper

Inspec Update Code

2013010.

Update Code201301.

Copyright Copyright 2013, The Institution of Engineering and Technology.

1. Accession Number

13174633

Author Coffey E.

Page 10: deber2

Author Unabbreviated

Coffey E.

Author/Editor Affiliation

Coffey E. : Dynamic Systems Analysis and Simulation Group, Oak Ridge National Laboratory, Oak Ridge, TN, USA

Author EmailCoffey E: [email protected]

Organization Identifier

6146.

TitleAcoustic resonance testing

Source2012 Future of Instrumentation International Workshop (FIIW) Proceedings. IEEE. 2012, 2 pp.. Piscataway, NJ, USA.

Date of Publication

2012

Country of Publication

USA

Conference Information

2012 Future of Instrumentation International Workshop (FIIW). Gatlinburg, TN, USA. 8-9 Oct. 2012.

Abstract Acoustic Resonance Testing (ART) is a nondestructive test that uses the vibrational characteristics of an object to find defects. It is a whole-part test, so measurements taken in one place can indicate defects anywhere. It can be done quickly and requires minimal equipment. ART can be completely automated and make objective, quantitative judgments, eliminating human error. ART uses the fact that a part's physical structure causes it to have a distinct and unique set of characteristic frequencies. Every part with the same physical properties will have the same vibration properties, and any flaw will cause this vibration "fingerprint" to change. After a hammer impact, the characteristic frequencies of the part will be excited and every other frequency will quickly attenuate. By measuring the location and amplitude of several peaks of the part's dynamic response and comparing these values to a database of acceptable values, parts with defects can be quickly separated. ART can be used to find parts with out-of-tolerance dimensions, voids, and cracks, among other things. While the test will not determine the cause of rejection, with appropriate transducer sensitivity and software it can reliably find faults anywhere in a part. Currently Gassco is researching ways to use ART for in-line inspection of gas pipelines. ART is also being used on some automotive production lines to ensure 100% compliance with specifications. It is well-suited for quality assurance on drive train parts, piping sections, shielding and containment hardware, and other applications where fast and dependable flaw detection is critical. (6 References).

Page 11: deber2

Subject Headingsacoustic resonance; cracks; inspection; nondestructive testing; pipelines; structural acoustics; vibrations.

Pre-1995 Subject Headings

voids (solid).

Key Phrase Identifiers

acoustic resonance testing; nondestructive testing; vibrational characteristics; defects; physical structure; hammer impact; attenuation; voids; cracks; in-line inspection; gas pipelines; drive train parts; piping sections; shielding; containment hardware; flaw detection.

International Patent

Classification

Pipe-line systems [F17D1/00]; Investigating or analysing materials by the use of ultrasonic, sonic or infrasonic waves; Visualisation of the interior of objects by transmitting ultrasonic or sonic waves through the object [G01N29/00].

Classification Codes

Structural acoustics and vibration [A4340]; Nondestructive testing: acoustic methods [A8170B]; Nonlinear acoustics and macrosonics [A4325].

TreatmentPractical.

LanguageEnglish.

Digital Object Identifier

http://dx.doi.org/10.1109/FIIW.2...

ISBN978-1-4673-2483-0

U.S. Copyright Clearance Center

Code

978-1-4673-2482-3/12/$31.00.

Publication TypeConference Paper

Inspec Update Code

2013010.

Update Code201301.

Copyright Copyright 2013, The Institution of Engineering and Technology.

Page 12: deber2

7. Accession Number

13167585

AuthorChao Zhou. Ming Hong. Zhongqing Su. Qiang Wang. Li Cheng.

Author/Editor Affiliation

Chao Zhou. Ming Hong. Zhongqing Su. Qiang Wang. Li Cheng. : Department of Mechanical Engineering, Hong Kong Polytechnic University, Hong Kong, Kowloon, China

Organization Identifier

26680.

TitleEvaluation of fatigue cracks using nonlinearities of acousto-ultrasonic waves acquired by an active sensor network

SourceSmart Materials and Structures, vol.22, no.1, Jan. 2013, 015018 (12 pp.). Publisher: IOP Publishing Ltd., UK.

Date of Publication

Jan. 2013

Country of Publication

UK

Abstract There has been increasing interest in using the nonlinear features of acousto-ultrasonic (AU) waves to detect damage onset (e.g., micro-fatigue cracks) due to their high sensitivity to damage with small dimensions. However, most existing approaches are able to infer the existence of fatigue damage qualitatively, but fail to further ascertain its location and severity. A damage characterization approach, in conjunction with the use of an active piezoelectric sensor network, was established, capable of evaluating fatigue cracks in a quantitative

Page 13: deber2

manner (including the co-presence of multiple fatigue cracks, and their individual locations and severities). Fundamental investigations, using both experiment and enhanced finite element analysis dedicated to the simulation of nonlinear AU waves, were carried out to link the accumulation of nonlinearities extracted from high-order AU waves to the characteristic parameters of a fatigue crack. A probability-based diagnostic imaging algorithm was developed, facilitating an intuitive presentation of identification results in images. The approach was verified experimentally by evaluating multi-fatigue cracks near rivet holes of a fatigued aluminum plate, showing satisfactory precision in characterizing real, barely visible fatigue cracks. Compared with existing methods, this approach innovatively (i) uses permanently integrated active sensor networks, conducive to automatic and online health monitoring; (ii) characterizes fatigue cracks at a quantitative level; (iii) allows detection of multiple fatigue cracks; and (iv) visualizes identification results in intuitive images. (39 References).

Subject Headings

aluminium; condition monitoring; crack detection; fatigue cracks; fault location; finite element analysis; nonlinear acoustics; piezoelectric transducers; structural engineering; ultrasonic imaging; ultrasonic waves.

Pre-1995 Subject Headings

plates (structures).

Key Phrase Identifiers

fatigue cracks evaluation; acousto-ultrasonic wave nonlinearities; damage onset detection; damage characterization approach; active piezoelectric sensor network; fatigue crack location; fatigue crack severity; finite element analysis; nonlinear AU waves simulation; probability-based diagnostic imaging algorithm; multifatigue crack evaluation; rivet holes; fatigued aluminum plate; permanently integrated active sensor networks; automatic health monitoring; online health monitoring; multiple fatigue crack detection; intuitive images; fatigue damage; SHM; structural health monitoring.

International Patent

Classification

Operating with piezo-electric effect or with electrostriction [B06B1/06]; Including piezo-electric components; Including electrostrictive components; Including magnetostrictive components [H01L27/20]; Piezo-electric elements in general; Electrostrictive elements in general; Magnetostrictive elements in general; Processes or apparatus specially adapted for the manufacture or treatment thereof or of parts thereof; Details thereof [H01L41/00]; Producing electrical output from mechanical input, e.g. generators [H02N2/18].

Classification Codes

Sonic and ultrasonic applications [B7820]; Inspection and quality control [B0170L]; Finite element analysis [B0290T]; Piezoelectric devices [B2860A]; Sensing devices and transducers [B7230]; General

Page 14: deber2

shapes and structures [E2110A]; Acoustic properties (mechanical engineering) [E2170]; Fracture mechanics and hardness (mechanical engineering) [E2180E]; Construction industry [E3030]; Numerical analysis [E0210L]; Maintenance and reliability [E1020]; Inspection and quality control [E1610]; Instrumentation [E1640].

TreatmentPractical; Theoretical or Mathematical.

CODENSMSTER

LanguageEnglish.

Digital Object Identifier

http://dx.doi.org/10.1088/0964-1...

ISSN0964-1726

U.S. Copyright Clearance Center

Code

0964-1726/13/015018+12/$33.00.

Publication TypeJournal Paper

Inspec Update Code

2013007.

Cited References 1. NASA 2007 System failure case studies National Aeronautics and Space Administration

2. Su Z and Ye L 2009 Identification of Damage Using Lamb Waves: from Fundamentals to Applications (London: Springer-Verlag). http://dx.doi.org/10.10.1007/978...

3. Boller C 2001 Ways and options for aircraft structural health management Smart Mater. Struct.10 432-40. http://dx.doi.org/10.10.1088/096... Inspec Accession Number: 6976519

4. Wong C K W, Chiu W K, Rajic N and Galea S C 2006 Can stress waves be used for monitoring sub-surface defects in repaired structures? Compos. Struct.76 199-208. http://dx.doi.org/10.10.1016/j.c... Inspec Accession Number: 9268774

5. Inman D J, Farrar C R, Lopes V Jr and Steffen V Jr 2005 Damage Prognosis: for Aerospace, Civil and Mechanical Systems (Hoboken: Wiley). http://dx.doi.org/10.10.1002/047...

6. Adams D E 2007 Health Monitoring of Structural Materials and Components: Methods with Applications (Hoboken: Wiley). http://dx.doi.org/10.10.1002/978...

Page 15: deber2

7. Worden K, Farrar C R, Manson G and Park G 2007 The fundamental axioms of structural health monitoring Proc. R. Soc. A 463 1639-64. http://dx.doi.org/10.10.1098/rsp... Inspec Accession Number: 9543143

8. Wang L and Yuan F G 2005 Damage identification in a composite plate using prestack reverse-time migration technique Struct. Health Monit. Int. J.4 195-211. http://dx.doi.org/10.10.1177/147...

9. Sohn H and Lee S J 2010 Lamb wave tuning curve calibration for surface-bonded piezoelectric transducers Smart Mater. Struct.19 015007. http://dx.doi.org/10.10.1088/096... Inspec Accession Number: 11070855

10. Cawley P and Alleyne D 1996 The use of Lamb waves for the long range inspection of large structures Ultrasonics34 287-90. http://dx.doi.org/10.10.1016/004... Inspec Accession Number: 5351231

11. Raghavan A and Cesnik C E S 2007 Review of guided-wave structural health monitoring Shock Vib. Digest39 91-114. http://dx.doi.org/10.10.1177/058...

12. Yu L, Bottai-Santoni G and Giurgiutiu V 2010 Shear lag solution for tuning ultrasonic piezoelectric wafer active sensors with applications to Lamb wave array imaging Int. J. Eng. Sci.48 848-61. http://dx.doi.org/10.10.1016/j.i... Inspec Accession Number: 11892517

13. Kundu T, Nakatani H and Takeda N 2012 Acoustic source localization in anisotropic plates Ultrasonics52 740-6. http://dx.doi.org/10.10.1016/j.u...

14. Ihn J-B and Chang F-K 2008 Pitch-catch active sensing methods in structural health monitoring for aircraft structures Struct. Health Monit. Int. J.7 5-19. http://dx.doi.org/10.10.1177/147... Inspec Accession Number: 10095552

15. Wandowski T, Malinowski P and Ostachowicz W 2011 Damage detection with concentrated configurations of piezoelectric transducers Smart Mater. Struct.20 025002. http://dx.doi.org/10.10.1088/096... Inspec Accession Number: 12235441

16. Kim J-Y, Jacobs L J and Qu J Nonlinear ultrasonic techniques for nondestructive damage assessment in metallic materials Proc. 8th Int. Workshop on Structural Health Monitoring(Stanford, Sept. 2011)

17. Kim J-Y, Jacobs L J and Qu J 2006 Experimental characterization of fatigue damage in a nickel-base superalloy using nonlinear ultrasonic

Page 16: deber2

waves J. Acoust. Soc. Am.120 1266-73. http://dx.doi.org/10.10.1121/1.2... Inspec Accession Number: 9081144

18. Jhang K-Y 2009 Nonlinear ultrasonic techniques for non-destructive assessment of micro damage in material: a review Int. J. Precis. Eng. Manuf.10 123-35. http://dx.doi.org/10.10.1007/s12... Inspec Accession Number: 11132001

19. Cantrell J H and Yost W T 2001 Nonlinear ultrasonic characterization of fatigue microstructures Int. J. Fatigue23 487-90. http://dx.doi.org/10.10.1016/S01... Inspec Accession Number: 7201294

20. Bermes C, Kim J-Y, Qu J and Jacobs L J 2008 Nonlinear Lamb waves for the detection of material nonlinearity Mech. Syst. Sig. Process.22 638-46. http://dx.doi.org/10.10.1016/j.y... Inspec Accession Number: 9815907

21. Deng M and Pei J 2007 Assessment of accumulated fatigue damage in solid plates using nonlinear Lamb wave approach Appl. Phys. Lett.90 121902. http://dx.doi.org/10.10.1063/1.2... Inspec Accession Number: 9388309

22. Solodov I, Wackerl J, Pfleiderer K and Busse G 2004 Nonlinear self-modulation and subharmonic acoustic spectroscopy for damage detection and location Appl. Phys. Lett.84 5386-8. http://dx.doi.org/10.10.1063/1.1... Inspec Accession Number: 8009275

23. Aymerich F and Staszewski W J 2010 Experimental study of impact-damage detection in composite laminates using a cross-modulation vibro-acoustic technique Struct. Health Monit. Int. J.9 541-53. http://dx.doi.org/10.10.1177/147... Inspec Accession Number: 11999542

24. Van Den Abeele K, Carmeliet J, TenCate J A and Johnson P A 2000 Nonlinear elastic wave spectroscopy (NEWS) techniques to discern material damage, part II: single-mode nonlinear resonance acoustic spectroscopy Res. Nondestruct. Eval.12 31-42. http://dx.doi.org/10.10.1080/093... Inspec Accession Number: 6587423

25. Kolomenskii A A, Lioubimov V A, Jerebtsov S N and Schuessler H A 2003 Nonlinear surface acoustic wave pulses in solids: laser excitation, propagation, interactions Rev. Sci. Instrum. Am. Inst. Phys.74 448-52

26. Masuda A, Aoki J, Shinagawa T, Iba D and Sone A 2011 Nonlinear piezoelectric impedance modulation induced by a contact-type failure and its application in crack monitoring Smart Mater. Struct.20 025021. http://dx.doi.org/10.10.1088/096...

Page 17: deber2

27. Stratoudaki T, Ellwood R, Sharples S, Clark M, Somekh M G and Collison I J 2011 Measurement of material nonlinearity using surface acoustic wave parametric interaction and laser ultrasonics J. Acoust. Soc. Am.129 1721-8. http://dx.doi.org/10.10.1121/1.3... Inspec Accession Number: 11976158

28. Barbieri E and Meo M 2010 Discriminating linear from nonlinear elastic damage using a nonlinear time reversal DORT method Int. J. Solids Struct.47 2639-52. http://dx.doi.org/10.10.1016/j.i... Inspec Accession Number: 11496246

29. Hong M, Zhou C, Su Z and Cheng L 2012 Nonlinear properties of Lamb waves under modulation of fatigue damage: finite element simulation with experimental validation Proc. 4th Asia-Pacific Workshop on Structural Health Monitoring Conf.(Melbourne, Dec. 2012) SHM

30. Liu S, Best S, Neild S A, Croxford A J and Zhou Z 2012 Measuring bulk material nonlinearity using harmonic generation NDT&E Int.48 46-53. http://dx.doi.org/10.10.1016/j.n...

31. Deng M 2003 Analysis of second-harmonic generation of Lamb modes using a modal analysis approach J. Appl. Phys.94 4152-9. http://dx.doi.org/10.10.1063/1.1... Inspec Accession Number: 7734080

32. Su Z and Ye L 2005 Lamb wave propagation-based damage identification for quasi-isotropic CF/EP composite laminates using artificial neural algorithm: part II-implementation and validation J. Intell. Mater. Syst. Struct.16 113-25. http://dx.doi.org/10.10.1177/104... Inspec Accession Number: 8554792

33. Norris A N 1998 Finite-amplitude Waves in Solids Nonlinear Acoustics ed M F Hamilton and D T Blackstock (San Diego: Academic) pp 263-77

34. Zhou C, Su Z and Cheng L 2011 Probability-based diagnostic imaging using hybrid features extracted from ultrasonic Lamb wave signals Smart Mater. Struct.20 125005. http://dx.doi.org/10.10.1088/096...

35. Michaels J E 2008 Detection, localization and characterization of damage in plates with an in situ array of spatially distributed ultrasonic sensors Smart Mater. Struct.17 035035. http://dx.doi.org/10.10.1088/096... Inspec Accession Number: 10004817

36. Konstantinidis G, Drinkwater B W and Wilcox P D 2006 The

Page 18: deber2

temperature stability of guided wave structural health monitoring systems Smart Mater. Struct.15 967-76. http://dx.doi.org/10.10.1088/096... Inspec Accession Number: 9107866

37. Wang C H, Rose J T and Chang F-K 2004 A synthetic time-reversal imaging method for structural health monitoring Smart Mater. Struct.13 415-23. http://dx.doi.org/10.10.1088/096... Inspec Accession Number: 8036710

38. Zhao X, Gao H, Zhang G, Ayhan B, Yan F, Kwan C and Rose J L 2007 Active health monitoring of an aircraft wing with embedded piezoelectric sensor/actuator network: I. Defect detection, localization and growth monitoring Smart Mater. Struct.16 1208-17. http://dx.doi.org/10.10.1088/096... Inspec Accession Number: 9921697

39. Su Z, Wang X, Cheng L, Yu L and Chen Z 2009 On selection of data fusion schemes for structural damage evaluation Struct. Health Monit. Int. J.8 223-41. http://dx.doi.org/10.10.1177/147... Inspec Accession Number: 10914051

Inspec Accession Number Links

6976519, 9268774, 9543143, 11070855, 5351231, 11892517, 10095552, 12235441, 9081144, 11132001, 7201294, 9815907, 9388309, 8009275, 11999542, 6587423, 11976158, 11496246, 7734080, 8554792, 10004817, 9107866, 8036710, 9921697, 10914051

Update Code201301.

Copyright Copyright 2013, The Institution of Engineering and Technology.

1.

Accession Number13176100

Page 19: deber2

AuthorYier Jin. Maniatakos M. Makris Y.

Author UnabbreviatedManiatakos M.; Makris Y.

Author Email

Yier Jin: [email protected] M: [email protected] Y: [email protected]

TitleExposing vulnerabilities of untrusted computing platforms

Source

2012 IEEE 30th International Conference on Computer Design (ICCD 2012). IEEE. 2012, 131-4. Piscataway, NJ, USA.

Date of Publication2012

Country of PublicationUSA

Conference Information

2012 IEEE 30th International Conference on Computer Design (ICCD 2012). Montreal, QC, Canada. Comput. Soc.. 30 Sept.-3 Oct. 2012.

Abstract This work seeks to expose the vulnerability of un-trusted computing platforms used in critical systems to hardware Trojans and combined hardware/software attacks. As part of our entry in the Cyber Security Awareness Week (CSAW) Embedded System Challenge hosted by NYU-Poly in 2011, we developed and presented 10 such processor-level hardware Trojans. These are split in five categories with various impacts, such as altering instruction memory, modifying the communication channel, stealing user information, changing interrupt handler location and RC-5 encryption algorithm checking of a

Page 20: deber2

medium complexity micro-processor (8051). Our work serves as a good starting point for researchers to develop Trojan detection and prevention methodologies on modern processor and to ensure trustworthiness of computing platforms. (20 References).

Subject Headingscomputer viruses; microcomputers.

Key Phrase Identifiers

untrusted computing platforms; critical systems; combined hardware-software attacks; cyber security awareness week; CSAW; embedded system; NYU-Poly; processor-level hardware Trojans; Trojan detection development.

International Patent Classification

Digital computers in general; Data processing equipment in general [G06F15/00]; Security arrangements for protecting computers or computer systems against unauthorised activity [G06F21/00].

Classification CodesData security [C6130S]; Microcomputers [C5430].

TreatmentPractical.

LanguageEnglish.

Digital Object Identifierhttp://dx.doi.org/10.1109/ICCD.2...

ISBN978-1-4673-3051-0

U.S. Copyright Clearance Center Code978-1-4673-3052-7/12/$31.00.

Publication TypeConference Paper

Inspec Update Code2013010.

Update Code201301.

Page 21: deber2

CopyrightCopyright 2013, The Institution of Engineering and Technology.

2. Accession Number

13175611

AuthorYoshikai N. Kurino S. Takahashi T.

Author Unabbreviated

Yoshikai N.; Kurino S.; Takahashi T.

Author/Editor Affiliation

Yoshikai N. Kurino S. : Dept. of Math., Nihon Univ., Tokyo, JapanTakahashi T. : Japan Organization for Employment of the Elderly, Persons with Disabilities and Job Seekers Japan

Author Email

Yoshikai N: [email protected] S: [email protected] T: [email protected]

Organization Identifier

12976.

TitleIndividual Responses to a Computer Virus Threat

Source

2012 9th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT 2012). IEEE. 2012, 6 pp.. Piscataway, NJ, USA.

Date of Publication

2012

Country of Publication

USA

Conference Information

2012 9th Asia-Pacific Symposium on Information and Telecommunication Technologies

Page 22: deber2

(APSITT 2012). Santiago and Valparaiso, Chile. 5-9 Nov. 2012.

Abstract

Research on individual behavior and decision making in a virus infection situation is important for developing information security protection. We have previously reported experimental studies that gathered basic information on awareness and behavior in a virus infection situation. In the present study, using a questionnaire and an experiment, we have found that individual behavior in a virus infection situation differs from what the questionnaire responses indicate. Analyzing the experimental data in combination with questionnaire results, we have investigated the correlation between the personal profile and the actions of a person in taking antivirus measures. Multivariate logistic regression analysis of the results showed that "multimedia skill", "group norm", and "altruism" in the personal profile are related to coping behavior in a virus infection situation. We also discuss some possible improvements in our experimental system. (10 References).

Subject Headings

behavioural sciences computing; computer viruses.

Key Phrase Identifiers

computer virus threat; decision making; virus infection situation; information security protection; personal profile; multivariate logistic regression analysis; multimedia skill; group norm; altruism.

International Security arrangements for

Page 23: deber2

Patent Classification

protecting computers or computer systems against unauthorised activity [G06F21/00].

Classification Codes

Data security [C6130S]; Social and behavioural sciences computing [C7810].

TreatmentPractical.

LanguageEnglish.

ISBN978-1-4673-2434-2

Publication Type

Conference Paper

Inspec Update Code

2013010.

Update Code201301.

CopyrightCopyright 2013, The Institution of Engineering and Technology.

6. Accession Number

13171610

AuthorSingh S. Sarje AK. Misra M.

Author Unabbreviated

Singh S.; Sarje A. K.; Misra M.

Author/Editor Affiliation

Singh S. Sarje AK. Misra M. : E & C Dept, Indian Institute of Technology, Roorkee, Roorkee, India

Page 24: deber2

Author Email

Singh S: [email protected] AK: [email protected] M: [email protected]

Organization Identifier

28817.

Title

Client-side Counter Phishing Application Using Adaptive Neuro-fuzzy Inference System

Source

2012 4th International Conference on Computational Intelligence and Communication Networks (CICN 2012). IEEE Computer Society. 2012, 788-92. Los Alamitos, CA, USA.

Date of Publication

2012

Country of Publication

USA

Conference Information

2012 4th International Conference on Computational Intelligence and Communication Networks (CICN 2012). Mathura, India. IEEE. 3-5 Nov. 2012.

Abstract Phishing is an online scam which involves identity theft of unsuspecting users, by which an attacker steals the personal information of users, such as user ID or password. E-mails, instant messaging and web pages are used in carrying out such attacks, out of which Phishing using e-mails is the most dominant method. E-mails containing hyperlinks of Phishing websites are sent by the attacker, who disguises himself as a trusted source, such as customer care centre of a bank or stock broking firm. In this paper, a design is proposed to detect phishing e-mails present in a user's mailbox. The application has

Page 25: deber2

been implemented using an intelligent hybrid technique, Adaptive Neuro-Fuzzy Inference System (ANFIS). E-mails present in a user's mailbox are retrieved and checked for the number of occurrences of each type of phishing indicator. These values of phishing indicators are fed as input to ANFIS, which gives an output value corresponding to each e-mail. This output value is used to categorize the e-mail as genuine, suspicious or phishing e-mail. Thereafter warning is generated to inform the user regarding the presence of phishing e-mails in mailbox. This is a preventive and proactive technique, which detects phishing activity even without opening a phishing web page. The combined strength of the Neural networks and Fuzzy logic makes our approach very powerful. Neural network lets the system learn and adjust its parameters, whereas Fuzzy logic ensures human like knowledge representation and decision making. This concept has been used for the first time which provides results with high accuracy. The application has been tested on a mix of 100 genuine and phishing e-mails and provides no false positives and false negatives. (15 References).

Subject Headings

computer crime; electronic mail; electronic messaging; fuzzy logic; fuzzy reasoning; neural nets; Web sites.

Key Phrase Identifiers

client-side counter phishing application; adaptive neuro-fuzzy inference system; online scam; user ID; password; e-mails; instant messaging; Webpages; hyperlinks; phishing Websites; customer care

Page 26: deber2

centre; bank; stock broking firm; ANFIS; proactive technique; neural networks; fuzzy logic.

International Patent

Classification

In which a programme is changed according to experience gained by the computer itself during a complete run; Learning machines [G06F15/18]; Security arrangements for protecting computers or computer systems against unauthorised activity [G06F21/00]; Computer systems utilizing knowledge based models [G06N5/00]; Messaging, e.g. sms [short messaging service]; Mailboxes; Announcements, e.g. informing users on the status or progress of a communication request [H04W4/12].

Classification Codes

Data security [C6130S]; Knowledge engineering techniques [C6170K]; Information networks [C7210N]; Formal logic [C4210]; Neural computing techniques [C5290].

TreatmentPractical.

LanguageEnglish.

Digital Object Identifier

http://dx.doi.org/10.1109/CICN.2...

ISBN978-1-4673-2981-1

U.S. Copyright Clearance

Center Code

978-0-7695-4850-0/12/$26.00.

Publication Type

Conference Paper

Inspec Update Code

2013009.

Update Code201301.

Copyright Copyright 2013, The Institution of

Page 27: deber2

Engineering and Technology.