2014 International Symposium on Computer, Consumer and Control最新文献

筛选
英文 中文
Using System Dynamics to Integrate Spatial-Temporal Model in Taiwan Coastal Zone 基于系统动力学的台湾海岸带时空模型整合
2014 International Symposium on Computer, Consumer and Control Pub Date : 2014-06-10 DOI: 10.1109/IS3C.2014.187
T. Lin, Yan-Ping Chi
{"title":"Using System Dynamics to Integrate Spatial-Temporal Model in Taiwan Coastal Zone","authors":"T. Lin, Yan-Ping Chi","doi":"10.1109/IS3C.2014.187","DOIUrl":"https://doi.org/10.1109/IS3C.2014.187","url":null,"abstract":"Coastal area has abundant resources however, overdevelopment and utilization by mankind has caused severe abuse of original landscapes. In order to mitigate such deterioration, the concept of Integrated Coastal Zone Management (ICZM) has been proposed to take measurements of geographic nature, applied construction, ecology system, economic value and environmental protection. The objective is to establish a reasonable utilization and sustainable development goal. However, most of the studies on coastal zone management are focused on qualitative approaches or quantitative modules such as sequential (i.e. statistics model) or spatial (i.e. geographic information system) assessment. It is seldom to apply integrated spatial-temporal model with artificial decision assessment, therefore this study combines both system dynamic (SD) which is best known in process timing dynamic complexity, causal loop and timing stagnant, together with cellular automata (CA), which can effectively present spatial interactions of each parameters, to develop a set of integrated spatial and temporal assessment system for coastal area. The objective is to facilitate decision maker or managers to conduct simulation and strategic analysis based on various subjects and modules, and lay out a sustainable coastal management strategy.","PeriodicalId":149730,"journal":{"name":"2014 International Symposium on Computer, Consumer and Control","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127566749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Preliminary Test of a Palm Bio-impedance Spectroscopy Measurement System for Biometric Authentication 棕榈生物阻抗光谱测量系统的设计与初步测试
2014 International Symposium on Computer, Consumer and Control Pub Date : 2014-06-10 DOI: 10.1109/IS3C.2014.218
Yuxiang Yang, Wen Zhang, Q. Sun
{"title":"Design and Preliminary Test of a Palm Bio-impedance Spectroscopy Measurement System for Biometric Authentication","authors":"Yuxiang Yang, Wen Zhang, Q. Sun","doi":"10.1109/IS3C.2014.218","DOIUrl":"https://doi.org/10.1109/IS3C.2014.218","url":null,"abstract":"Biometrics relies on the inherent characteristics of human biology or behavior for authentication. As a burgeoning non-invasive technology, bio-impedance spectroscopy (BIS) technology is mainly used in medical diagnosis. However, its ability to distinguish different people has not yet been exploited. This paper proposes a new biometric identification method based on palm BIS measurement. A palm BIS measurement system based on integrated impedance converter AD5933 was built and measurement experiments on 50 subjects were carried out. Preliminary recognition test based on Euclidean distance (ED) method and absolute distance (AD) method was performed and the recognition accuracy is 74% for ED method and 86% for AD method. This research demonstrates for the first time that there is a possibility of a new biometrics identification method based on palm BIS measurement and is worthy of further research.","PeriodicalId":149730,"journal":{"name":"2014 International Symposium on Computer, Consumer and Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129374131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
IKEv2 Authentication Exchange Model in NS-2 NS-2中的IKEv2认证交换模型
2014 International Symposium on Computer, Consumer and Control Pub Date : 2014-06-10 DOI: 10.1109/IS3C.2014.280
Mohamed Kasraoui, A. Cabani, H. Chafouk
{"title":"IKEv2 Authentication Exchange Model in NS-2","authors":"Mohamed Kasraoui, A. Cabani, H. Chafouk","doi":"10.1109/IS3C.2014.280","DOIUrl":"https://doi.org/10.1109/IS3C.2014.280","url":null,"abstract":"Wireless Sensor Network (WSN)communications has become one of the most emerging fields in the area of wireless communication technologies. Integration of WSN with internet technologies has been enhanced because of the use of 6LowPAN standard. This leads to the challenges and significance of end-to-end security in 6LoWPAN communication between IPv6 enabled sensor networks and the Internet hosts. Many researchers have proposed the use of IPsec/IKE to WSNs for reinforcing the end-to-end security communication. Till now IKE module have not been implemented or added in a network simulator. In the proposed paper we have implemented the IKE module in Network Simulator-2 (NS2) simulator. This new module will helps to study in detail about the end-to-end security in wireless communication. In this paper we have also discussed and compared the pros and cons of network simulators like OMNET++, TOSSIM and COOJA with NS2.","PeriodicalId":149730,"journal":{"name":"2014 International Symposium on Computer, Consumer and Control","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130882097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Novel Approach by Applying Image Authentication Technique on a Digital Document 一种将图像认证技术应用于数字文档的新方法
2014 International Symposium on Computer, Consumer and Control Pub Date : 2014-06-10 DOI: 10.1109/IS3C.2014.42
Jau-Ji Shen, Ken-Tzu Liu
{"title":"A Novel Approach by Applying Image Authentication Technique on a Digital Document","authors":"Jau-Ji Shen, Ken-Tzu Liu","doi":"10.1109/IS3C.2014.42","DOIUrl":"https://doi.org/10.1109/IS3C.2014.42","url":null,"abstract":"In this paper, a new idea of digital document authentication is proposed. We deal with this problem by treating a digital document as an image, hence the authentication code of a digital document can be derived from this document's text itself. No longer to encrypt a document by heavily enlarging the document size with a given complex digital signature, the authentication code is just encoded into the original document image version. The most remarkable benefit of our method is the document can be maintained at the same size after authentication code encryption. Moreover, by adopting this approach, not only the tampered document can be verified by itself, but also the tampered words are able to be located precisely. In the experiment, some attacks such as words substitutions have been conducted to show the performance of our method.","PeriodicalId":149730,"journal":{"name":"2014 International Symposium on Computer, Consumer and Control","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131111039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Diffuser-Aided Time-Domain Diffuse Optical Imaging 漫射辅助时域漫射光学成像
2014 International Symposium on Computer, Consumer and Control Pub Date : 2014-06-10 DOI: 10.1109/IS3C.2014.243
C. Chuang, Chia-Yen Lee
{"title":"Diffuser-Aided Time-Domain Diffuse Optical Imaging","authors":"C. Chuang, Chia-Yen Lee","doi":"10.1109/IS3C.2014.243","DOIUrl":"https://doi.org/10.1109/IS3C.2014.243","url":null,"abstract":"We present the first experimental results of time-resolved diffuser-aided diffuse optical imaging (DADOI) method in this letter. A self-manufactured diffuser plate was inserted between the optode and the surface of a scattering medium. The diffuser was utilized to enhance multiple scattering that destroys image information for baseline measurement of turbid medium. Therefore, the abnormality can be detected with the modified optical density calculation. The time-domain DADOI method can provide better imaging contrast and more simply imaging than the conventional DOT measurement. Besides, it also reveals rich depth information with temporal responses. Therefore, the DADOI offers a great potential to detect the breast tumor and chemotherapy monitoring in clinical diagnosis.","PeriodicalId":149730,"journal":{"name":"2014 International Symposium on Computer, Consumer and Control","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115486261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Estimation and Revision: A Framework for Maximum Power Point Tracking on Partially Shaded Photovoltaic Arrays 估算与修正:部分遮阳光伏阵列最大功率点跟踪框架
2014 International Symposium on Computer, Consumer and Control Pub Date : 2014-06-10 DOI: 10.1109/IS3C.2014.53
Jieming Ma, K. Man, T. Ting, N. Zhang, S. Guan, Prudence W. H. Wong
{"title":"Estimation and Revision: A Framework for Maximum Power Point Tracking on Partially Shaded Photovoltaic Arrays","authors":"Jieming Ma, K. Man, T. Ting, N. Zhang, S. Guan, Prudence W. H. Wong","doi":"10.1109/IS3C.2014.53","DOIUrl":"https://doi.org/10.1109/IS3C.2014.53","url":null,"abstract":"The power-voltage (P-V) characteristics of a photovoltaic (PV) array become more complex with multiple peaks under the partial shading conditions. This may cause failure for the conventional perturb and observe (P&O) method in tracking the maximum power points. This paper introduces a new two-stage maximum power point tracking (MPPT) framework, known as estimation and revision (ER). It intends to combine the offline random search using metaheuristic algorithms with the conventional online MPPT method. The feasibility of the ER method is verified in an MPPT system implemented with a specific DC-DC converter and a partially shaded PV array. The simulation results suggest that the proposed ER-MPPT framework significantly outperform the conventional P&O in terms of both efficiency and capability in tracking the global maximum power point.","PeriodicalId":149730,"journal":{"name":"2014 International Symposium on Computer, Consumer and Control","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124370398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
LDO Linear Regulator with Super-source Follower 带超源从动器的LDO线性调节器
2014 International Symposium on Computer, Consumer and Control Pub Date : 2014-06-10 DOI: 10.1109/IS3C.2014.122
Yi-Tsung Chang, Fu-Lian Hung, Ren-hao Xue, Yu-Da Shiau, P. Cheng
{"title":"LDO Linear Regulator with Super-source Follower","authors":"Yi-Tsung Chang, Fu-Lian Hung, Ren-hao Xue, Yu-Da Shiau, P. Cheng","doi":"10.1109/IS3C.2014.122","DOIUrl":"https://doi.org/10.1109/IS3C.2014.122","url":null,"abstract":"A low dropout regulator with super-source follower is exhibited and a single-transistor-control low dropout based the flipped voltage follower is discussed in this paper. The buffered flipped voltage follower with super-source follower is proposed to lower its output impedance so that the impedance at the gate of the pass device can be reduced and the pole at the gate is pushed to higher frequency as well as. The proposed low dropout with super-source follower is designed and simulated in TSMC 0.18 μm CMOS technology process. The layout design area is 565μm x 508μm. It can be obtained that when power supply voltage Vdd is 3.3 V, the circuit can provide the output voltage of 1.999 V and the power consumption of 15.94 mW with a variation of 4 mV in a load current range from 2 mA to 100 mA.","PeriodicalId":149730,"journal":{"name":"2014 International Symposium on Computer, Consumer and Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114307197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research for a New Novel Evolutionary Algorithm 一种新型进化算法的研究
2014 International Symposium on Computer, Consumer and Control Pub Date : 2014-06-10 DOI: 10.1109/IS3C.2014.290
J. Chiou, Chung-Fu Chang, Jyun-Siang Jhang
{"title":"Research for a New Novel Evolutionary Algorithm","authors":"J. Chiou, Chung-Fu Chang, Jyun-Siang Jhang","doi":"10.1109/IS3C.2014.290","DOIUrl":"https://doi.org/10.1109/IS3C.2014.290","url":null,"abstract":"The performance of a hybrid CODEQ method, called HCODEQ method, proposed in this work is compared with that of the CODEQ and differential evolution (DE) methods. CODEQ method is different from the original differential evolution, the concepts of chaotic search, opposition-based learning, and quantum mechanics are used in the CODEQ method to overcome the drawback of selection of the crossover factor and scaling factor used in the original DE method. And, the convergence of the CODEQ outperformed than the DE method. However, a larger population size must be used in the CODEQ method. That is a drawback for all evolutionary algorithms (EAs). To overcome this drawback, two operations, acceleration operation and migrating operation, are embedded into the CODEQ method. The use of these two operations can improve the convergence speed without decreasing the diversity among individuals. One benchmark function is used to compare the performance of the HCODEQ method with the CODEQ and DE methods. Numerical results show that the performance of the HCODEQ method is better than the other methods.","PeriodicalId":149730,"journal":{"name":"2014 International Symposium on Computer, Consumer and Control","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114865615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Application of ZigBee Wireless Techniques for an Intelligent House Lighting Control System 智能家居照明控制系统ZigBee无线技术的设计与应用
2014 International Symposium on Computer, Consumer and Control Pub Date : 2014-06-10 DOI: 10.1109/IS3C.2014.18
Cong-Hui Huang, Yih-Feng Su, Y. Su, W. Su, J. Chen, W. Zhou
{"title":"Design and Application of ZigBee Wireless Techniques for an Intelligent House Lighting Control System","authors":"Cong-Hui Huang, Yih-Feng Su, Y. Su, W. Su, J. Chen, W. Zhou","doi":"10.1109/IS3C.2014.18","DOIUrl":"https://doi.org/10.1109/IS3C.2014.18","url":null,"abstract":"This paper proposed the design and application of ZigBee wireless techniques for an intelligent house lighting control system. The user interface was designed using the graphical programming software NI Lab VIEW. A fuzzy rule base was constructed using the auxiliary Fuzzy Tool Box. In addition to serving as the core computation unit, the base was also used in the energy saving system making the entire intelligent system a human-focused design. The wired section used the USB-6008 DAQ device produced by NI, whereas the wireless section used the ZigBee wireless network. The control system developed using Lab VIEW can decide if the blinds need to be opened or closed according to the brightness of the indoors/outdoors. The test results showed that the proposed energy saving not only regulated the comfort level, but also that the energy consumption was reduced.","PeriodicalId":149730,"journal":{"name":"2014 International Symposium on Computer, Consumer and Control","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114986133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Drill Signal Detection Technology for Handheld Medical Drilling Device 手持式医用钻孔设备的钻孔信号检测技术
2014 International Symposium on Computer, Consumer and Control Pub Date : 2014-06-10 DOI: 10.1109/IS3C.2014.251
Michael Mayer, Hsin-Hung Lin, Ying-Hua Peng, P. Lee, Min-Liang Wang
{"title":"A Drill Signal Detection Technology for Handheld Medical Drilling Device","authors":"Michael Mayer, Hsin-Hung Lin, Ying-Hua Peng, P. Lee, Min-Liang Wang","doi":"10.1109/IS3C.2014.251","DOIUrl":"https://doi.org/10.1109/IS3C.2014.251","url":null,"abstract":"This research aims to create a medical drilling device where surgeons can receive the signal and data on the computer screen. We analyze the current signal extract from hall effect-based linear current sensor using a Raspberry Pi engineer board to detect the breakthrough signal.","PeriodicalId":149730,"journal":{"name":"2014 International Symposium on Computer, Consumer and Control","volume":"236 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114994664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信