Leveraging a Crowd Sourcing Methodology to Enhance Supply Chain

به نام خدا

Title: Leveraging a Crowd Sourcing Methodology to Enhance Supply Chain Integrity

Authors: Han Lin, Moses Schwartz, John Michalski, Mayuri Shakamuri, Philip Campbell

Abstract: Supply chain integrity (SCI) is emerging as one of the top security issues facing critical systems. The government’s reliance on commercial off-the-shelf (COTS) products is apparent, as is the threat of critical systems being designed and manufactured overseas. To date, few tools or capabilities exist to prevent or even detect these classes of attacks. Programs, such as DARPA Trust, exist to identify solutions; however, alternative strategies must be explored. It is extremely challenging to establish the trustworthiness of a supply chain for a product or system in today’s globalized climate, especially given the complexity and variability of the hardware and software, and the diverse geographical areas where they are made. Counterfeit items, from individual chips to entire systems, have been found both in commercial and government sectors. Supply chain attacks can be inserted at any point during the product or system life cycle and can have detrimental effects to mission success. We hypothesize that wisdom of crowds techniques may be applicable to the analysis of supply chain integrity. Current supply chain security efforts are hindered by a lack of detailed information on a product’s entire supply chain. End-users have virtually no access to supply chain information, and even major manufacturers may have difficulty getting access to their suppliers’ Sub suppliers. Component testing and even reverse engineering can be used to mitigate risks, but these approaches are imperfect, time consuming, and expensive. This paper will discuss the development of a semi-automated supply chain integrity risk analysis framework to assist the supply chain security analysts in assessing the level of risk associated with a component of a mission critical system. This capability can provide the system designer a more rigorous and efficient approach to assess the security of the components in the design. By fusing all of these tools into a centralized framework, we hypothesis that we can create a capability that will enable analysts to more effectively interrogate the data and extract trending as well as critical information.   

Publish Year: 2012

Published in: ICCST – IEEE

موضوع: مدیریت زنجیره تامین (Supply Chain Management)

لینک مشاهده صفحه اول مقاله

لینک دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان

Handwritten Text Segmentation using Average Longest Path Algori

به نام خدا

Title: Handwritten Text Segmentation using Average Longest Path Algorithm

Authors: Dhaval Salvi, Jun Zhou, Jarrell Waggoner, and Song Wang

Abstract: Offline handwritten text recognition is a very challenging problem. Aside from the large variation of different hand-writing styles, neighboring characters within a word are usually connected, and we may need to segment a word into individual characters for accurate character recognition. Many existing methods achieve text segmentation by evaluating the local stroke geometry and imposing constraint on the size of each resulting character, such as the character width, height and aspect ratio. These constraints are well suited for printed texts, but may not hold for handwritten texts. Other methods apply holistic approach by using setof lexicons to guide and correct the segmentation and recognition. This approach may fail when the lexicon domain is insufficient. In this paper, we present a new global non-holistic method for handwritten text segmentation, which does not make any limiting assumptions on the characterize and the number of characters in a word. Specifically, the proposed method finds the text segmentation with the maximum average likeliness for the resulting characters. For this purpose, we use a graph model that describes the possible locations for segmenting neighboring characters, and we then develop an average longest path algorithm to identify the globally optimal segmentation. We conduct experiments on real images of handwritten texts taken from the IAM handwriting database and compare the performance of the proposed method against an existing text segmentation algorithm that uses dynamic programming.   

Publish Year: 2013

Published in: WACV – IEEE

موضوع: تشخصی دست خط (Handwritten Text Recognition)

لینک مشاهده صفحه اول مقاله

لینک دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرحع علمی فنی مهندسی

حامی دانش بومی ایرانیان

Influence of Sci-Fi Films on Artificial Intelligence and Vice-V

به نام خدا

Title: Influence of Sci-Fi Films on Artificial Intelligence and Vice-Versa

Authors: D Lorenk, M Tarhaniov and P Sincak

Abstract: Sci-fi technological movie domain is an important part of human culture. The paper focus on comparison study of selected robotics sci-fi movie domain from a technological point of view. It is necessary to accomplish technological analysis of studied sci-fi movies and able to distinguish about possible current technology and future direction of the artificial intelligence in the domain of Robot intelligence. The review of existing movies which are in fact influencing thinking of humans is essential since it can influence a future research direction in AI. This information is interesting for inspiration of students and research associates in theory and applications. In conclusion, we envision potential problems of social networks and impact of Internet of things facts which is becoming a reality with IPv6 protocol. The goal of the paper is also to underline the importance of such cultural phenomena as sci-fi movies for the future of humanity.   

Publish Year: 2013

Published in: SAMI – IEEE

موضوع: هوش مصنوعی (Artificial Intelligence)

لینک مشاهده صفحه اول مقاله

لینک دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع علمی فنی مهندسی

حامی دانش بومی ایرانیان

 

NANOIMPRINTED HOLES TO IMMOBILIZE MICROBES

به نام خدا

Title: NANOIMPRINTED HOLES TO IMMOBILIZE MICROBES

Authors: T Kano, T Inaba, and N Miki

Abstract: In this paper we demonstrate highly dense immobilization of bacteria into nanoimprinted holes. Nanoimprinting enables micro holes smaller than 2 mm in diameter with a high accuracy, which cannot be patterned using conventional UV photolithography. In our prior work, we developed a microbial reactor immobilizing bacteria into micro holes, which facilitated collection and evaluation of reaction products while the number of bacteria involved in the reaction could be quantified. However, the holes were made by photolithography and the minimum size was limited to be 3 mm in diameter. Large holes allow multiple bacteria to be immobilized in a hole, which resulted in errors in quantification. The number of bacteria immobilized in a nanoimprinted hole was found to have smaller deviation than in photolithographically formed holes. In addition, density of the immobilized bacteria was experimentally found to be largest in case of 2-mm-holes. The proposed processes will be of great help for precise evaluation of bacteria reaction.   

Publish Year: 2013

Published in: IEEE-MEMS

موضوع : فناوری نانو (Nanotechnology)

 

لینک مشاهده صفحه اول مقاله

لینک دانلود مقاله

 

ایران سای – مرحع علمی فنی مهندسی

حامی دانش بومی ایرانیان

Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart

به نام خدا

Title: Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card

Authors: Devane, S.; Chatterjee, M.; Phatak, D.

Abstract: The rapid growth of e-commerce for buying and selling electronic goods or intangible goods has necessitated the need for development of a number of e-commerce protocols, which ensure integrity, confidentiality, atomicity and fair exchange. In this paper we propose an e-commerce protocol for performing business over the Internet. The protocol uses a smart card for ensuring mutual authentication, dispute resolution and fair exchange and reduces reliance on a trusted third party. Atomicity is also maintained in the protocol.   

Publish Year: 2007

Published by: IAS – IEEE

موضوع: تجارت الکترونیک (Electronic Commerce)

لینک مشاهده صفحه اول مقاله

لینک دانلود مقاله

 

ایران سای – مرجع علمی فنی مهندسی

حامی دانش بومی ایرانیان