2009 2nd International Conference on Adaptive Science & Technology (ICAST)最新文献

筛选
英文 中文
Using action research for complex research initiatives 在复杂的研究计划中使用行动研究
2009 2nd International Conference on Adaptive Science & Technology (ICAST) Pub Date : 2009-12-01 DOI: 10.1109/ICASTECH.2009.5409703
M. Greeff, Louis Coetzee
{"title":"Using action research for complex research initiatives","authors":"M. Greeff, Louis Coetzee","doi":"10.1109/ICASTECH.2009.5409703","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409703","url":null,"abstract":"Training methods and the transfer of knowledge and information has essentially remained unchanged for many years. With the pervasiveness of information and communication technology (ICT), an opportunity has been created to fundamentally change the status quo of training. This paper presents one approach of using ICT through the innovative combination of factors such as a person's abilities, styles and preferences with a multimodal interface to facilitate enhanced training. However, many ways exist to guide the research process of such a complex research initiative. Action research is one research method that lends itself to these complex projects. The paper uses the ability based technology interventions (AbTi) research project as a case study to analyse the effectiveness of the action research methodology. The paper describes the accumulated learning as obtained from the AbTi research project, as well as the action research methodology used, in order to ultimately be in a position to effect a fundamental change in training. It is found that action research can be an effective methodology for research initiatives of a complex nature.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131729280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Residue-to-binary converters for the moduli set {22n+1-1,22n,2n-1} 模集{22n+1-1,22n,2n-1}的残二变换器
2009 2nd International Conference on Adaptive Science & Technology (ICAST) Pub Date : 2009-12-01 DOI: 10.1109/ICASTECH.2009.5409752
K. Gbolagade, R. Chaves, L. Sousa, S. Cotofana
{"title":"Residue-to-binary converters for the moduli set {22n+1-1,22n,2n-1}","authors":"K. Gbolagade, R. Chaves, L. Sousa, S. Cotofana","doi":"10.1109/ICASTECH.2009.5409752","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409752","url":null,"abstract":"In this paper, we propose two memoryless converters for the moduli set {22n+1 -1,22n,2n -1}. First, we propose a novel reverse converter, which is purely adder based, using the traditional Chinese Remainder Theorem (CRT). Second, due to the fact that the proposed CRT based structure does not cover the entire dynamic range, a second converter, which covers the entire dynamic range based on Mixed Radix Conversion (MRC), is proposed. The CRT based converter outperforms the MRC based converter both in terms of area and delay. In comparison with related best known state of the art converters, they are all outperformed by the proposed CRT based scheme in terms of both area cost and conversion delay. The theoretical evaluation is supported by the experimental results, which are estimated on a Standard Cell 0.13-µm CMOS technology. These experimental results indicate that, on average, for the same dynamic range, the proposed CRT based converter achieves about 23% delay reduction with more than 3% area reduction, when compared to the existing state of the art MRC based converter. Additionally, the proposed CRT based converter is about 6% faster with about 4% area reduction when compared with the existing CRT based converter.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130556675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Telecommunications & information technology network management; challenges in acquisition, design and systems development 电信与信息技术网络管理;采购、设计和系统开发方面的挑战
2009 2nd International Conference on Adaptive Science & Technology (ICAST) Pub Date : 2009-12-01 DOI: 10.1109/ICASTECH.2009.5409748
D. Padi
{"title":"Telecommunications & information technology network management; challenges in acquisition, design and systems development","authors":"D. Padi","doi":"10.1109/ICASTECH.2009.5409748","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409748","url":null,"abstract":"Recent phenomenal growth in broadband technology, coupled with the need for organizations to stay competitive, requires a corresponding comprehensive understanding of new and advanced technologies. In this regard, new challenges have arisen with respect to mastering the intricacies related to acquisition, design, systems development and methodologies needed to manage these complex technologies. More than ever before network administrators are required to integrate and manage heterogeneous systems and a variety of applications effectively and efficiently. This paper proposes a systematic approach to tackling these challenges. It outlines an effective strategy and methodology for designing a mature industrial-based commercially available product that will provide satisfactory solutions.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127482825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Exchanging situational information in embedded networks 在嵌入式网络中交换态势信息
2009 2nd International Conference on Adaptive Science & Technology (ICAST) Pub Date : 2009-12-01 DOI: 10.1109/ICASTECH.2009.5409713
J. Preden, R. Pahtma
{"title":"Exchanging situational information in embedded networks","authors":"J. Preden, R. Pahtma","doi":"10.1109/ICASTECH.2009.5409713","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409713","url":null,"abstract":"Wireless sensor networks have received a lot of attention in the past decade partially because WSNs can be viewed as the forerunners of ubiquitous computing solutions that are sure to emerge in the following decades. However the development of WSNs has not been as fast as expected, which is to a large extent due to the rigid architecture of the current WSN solutions. We are lacking solutions for creating distributed applications based on WSN technology. The current paper proposes that situation awareness of computing agents starting from the lowest level is one possible solution for creating distributed applications based on the limited computing nodes of WSN systems. The paper gives some suggestions how situation awareness can be achieved in case of resource constrained computing nodes. The paper also proposes a mechanism in the form of an appropriate structuring and encoding of data suitable for use by the WSN nodes. The proposed mechanism can be used for exchanging the situational data collected and created by the embedded nodes. The suggested approach is validated through experiments on a wireless sensor network.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125406833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Economic analysis of hybrid power system for rural electrification in Oman 阿曼农村电气化混合动力系统的经济分析
2009 2nd International Conference on Adaptive Science & Technology (ICAST) Pub Date : 2009-12-01 DOI: 10.1109/ICASTECH.2009.5409712
A. Al-Badi, H. Bourdoucen
{"title":"Economic analysis of hybrid power system for rural electrification in Oman","authors":"A. Al-Badi, H. Bourdoucen","doi":"10.1109/ICASTECH.2009.5409712","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409712","url":null,"abstract":"Hybrid renewable energy systems are becoming attractive for remote areas power generation applications due to advances in renewable energy technologies and increase in the oil price. This paper presents a feasibility study of wind penetration into an existing diesel power plant of an isolated Duqum area in the Sultanate of Oman. Wind data from Al Duqm meteorology station and the actual load data from Duqum have been used in the simulation model. HOMER software has been used to perform the study for the hybrid system with no battery storage. For Wind speed less than 5m/s the existing diesel plant seems to be is the only feasible solution over the range of fuel prices used in the simulation. Moreover, the proposed hybrid system becomes feasible at wind speeds of more than 6 m/s and a diesel cost of 0.368 US $/L or more, which is the current diesel cost in Duqm.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116646219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Enhanced content analysis of fraudulent Nigeria electronic mails using e-STAT 利用e-STAT加强对尼日利亚欺诈性电子邮件的内容分析
2009 2nd International Conference on Adaptive Science & Technology (ICAST) Pub Date : 2009-12-01 DOI: 10.1109/ICASTECH.2009.5409717
O. Longe, .A. Abayomi-Alli, I. O. Shaib, F. A. Longe
{"title":"Enhanced content analysis of fraudulent Nigeria electronic mails using e-STAT","authors":"O. Longe, .A. Abayomi-Alli, I. O. Shaib, F. A. Longe","doi":"10.1109/ICASTECH.2009.5409717","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409717","url":null,"abstract":"A large percentage of fraudulent spam mails are believed to originate from Nigeria or from Nigerians in remote locations. These mails (popularly referred to as 419 spam) come in broad categories but all with the intent of defrauding the recipients'. Testing the validity of senders and receivers address is one method that has been used to filter spam mails. This approach will not filter out ordinary e-mails since typical e-mail users will always include their true e-mail addresses to facilitate replies. Checking the IP-addresses of 419 mails is a way of ascertaining their actual origin. This can be done with the intention to build a database of e-mail abuse or to blacklist addresses from which fraudulent mails are originating keeping in mind that blacklisted IP addresses could be used to stop the delivery of further mails from such addresses in the future. To this end, this research examines features selected specifically from the content analysis of Nigeria spam e-mail. A domain specific statistical content analysis tool (e-STAT) was developed and implemented using Bayesian statistical technique. The software was tested and trained with a sizeable balanced corpus of Nigerian 419 spam e-mails and normal (ham) e-mails. Analysis of classified mails using e-STAT showed that current concept drift patterns among Nigerian 419 spammers and provided a blacklist of about 2,173 e-mail sender's addresses, 563 URLs within spam mails and a total of 13,491 bag-of-words common to Nigerian spam e-mails. The research obtained results that will guide future research in the domain of 419 mails in designing effective spam filters and electronic mail classifiers.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116652749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Numerical Integration Based analysis of Pulse Width Modulated voltage source inverter 基于数值积分的脉宽调制电压源逆变器分析
2009 2nd International Conference on Adaptive Science & Technology (ICAST) Pub Date : 2009-12-01 DOI: 10.1109/ICASTECH.2009.5409707
A. R. Zubair
{"title":"Numerical Integration Based analysis of Pulse Width Modulated voltage source inverter","authors":"A. R. Zubair","doi":"10.1109/ICASTECH.2009.5409707","DOIUrl":"https://doi.org/10.1109/ICASTECH.2009.5409707","url":null,"abstract":"A power electronics circuit is a converter that converts energy from one level of voltage/current/frequency to another using semiconductor-based electronic switches. The process of switching the electronic devices in a power electronic converter from one state to another is called modulation. There are a number of modulation strategies. The less the degree to which undesirable harmonics are created the better the modulation strategy. The figure of merit or criterion of performance is the first-order weighted total harmonic distortion factor (WTHD0). The analysis of Pulse Width Modulation (PWM) Schemes is discussed. Numerical Integration Based Solution is proposed. The results obtained from Matlab sub-programs developed for the analysis are presented. The proposed solution improves both the speed and the accuracy of analysis.","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126571397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Networked virtual and remote laboratories for research collaboration in natural sciences and engineering 用于自然科学和工程研究合作的网络虚拟和远程实验室
2009 2nd International Conference on Adaptive Science & Technology (ICAST) Pub Date : 2009-12-01 DOI: 10.1007/978-3-642-16208-4_22
S. Jeschke, A. Gramatke, Olivier Pfeiffer, C. Thomsen, T. Richter
{"title":"Networked virtual and remote laboratories for research collaboration in natural sciences and engineering","authors":"S. Jeschke, A. Gramatke, Olivier Pfeiffer, C. Thomsen, T. Richter","doi":"10.1007/978-3-642-16208-4_22","DOIUrl":"https://doi.org/10.1007/978-3-642-16208-4_22","url":null,"abstract":"","PeriodicalId":163141,"journal":{"name":"2009 2nd International Conference on Adaptive Science & Technology (ICAST)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127217120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信