Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)最新文献

筛选
英文 中文
Derivative observations used in predictive control 用于预测控制的导数观测值
J. Kocijan, Douglas J. Leitht
{"title":"Derivative observations used in predictive control","authors":"J. Kocijan, Douglas J. Leitht","doi":"10.1109/MELCON.2004.1346883","DOIUrl":"https://doi.org/10.1109/MELCON.2004.1346883","url":null,"abstract":"Gaussian processes provide approach to probabilistic nonparametric modelling which allows a straightforward combination of measured data and local linear models in an empirical model. This is of particular importance in the identification of nonlinear dynamic systems from experimental data where usually more data are available far from equilibrium points. We illustrate the utility of such simple nonlinear predictive control example.","PeriodicalId":164818,"journal":{"name":"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128078156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Object by value transfer mechanisms for obligation policy enforcement object loading 用于义务策略强制对象加载的按值对象传输机制
M. Randić, M. Kunstic, B. Blašković
{"title":"Object by value transfer mechanisms for obligation policy enforcement object loading","authors":"M. Randić, M. Kunstic, B. Blašković","doi":"10.1109/MELCON.2004.1347032","DOIUrl":"https://doi.org/10.1109/MELCON.2004.1347032","url":null,"abstract":"Adequate architecture and technology can significantly improve the adaptability and performance of the policy-based management systems. We present how the policy enforcement point operation can be improved by applying the \"object by value\" transfer mechanisms. Policy enforcement object transferred and loaded into the policy enforcement point as a stateful object can support the adaptable behaviour of the point. We experimented with the two standard object by using the value technologies such as CORBA valuetypes and Java serialization on RMl. Examples in this paper refer to the CORBA valuetypes only.","PeriodicalId":164818,"journal":{"name":"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129661171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Estimation of difficult-to-measure process variables using neural networks - a comparison of simple MLP and RBF neural network properties 用神经网络估计难以测量的过程变量-简单MLP和RBF神经网络特性的比较
D. Sliskovic, E. Nyarko, N. Peric
{"title":"Estimation of difficult-to-measure process variables using neural networks - a comparison of simple MLP and RBF neural network properties","authors":"D. Sliskovic, E. Nyarko, N. Peric","doi":"10.1109/MELCON.2004.1346888","DOIUrl":"https://doi.org/10.1109/MELCON.2004.1346888","url":null,"abstract":"In this paper, two different artificial neural networks are tested and compared with regard to their application in the estimation of difficult-to-measure process variables. Two of the most commonly used neural networks, the MLP (multilayer perceptron) and RBF (radial basis function) neural networks, with simple structure and standard training methods are chosen as examples. Neural network training is based on available data from a database of process variables measured over a long time period. The database in this paper is obtained using a simulation model of a real process. Without going deeper into theoretical background, relative properties of these neural networks are given through the results obtained by testing the trained networks and analysis performed on these results.","PeriodicalId":164818,"journal":{"name":"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129645273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A secure authenticated key agreement protocol 一个安全的认证密钥协议
C. Popescu
{"title":"A secure authenticated key agreement protocol","authors":"C. Popescu","doi":"10.1109/MELCON.2004.1347048","DOIUrl":"https://doi.org/10.1109/MELCON.2004.1347048","url":null,"abstract":"Authenticated key agreement protocols have an important role for building secure communications amongst two or more entities over the Internet. In this paper we propose an efficient and secure authenticated key agreement protocol based on Diffie-Hellman key agreement. Our protocol is more efficient than previous authenticated key agreement protocols because it requires only 1 integer multiplication. We show that our protocol meets the security attributes under the assumption that the elliptic curve discrete logarithm problem is secure.","PeriodicalId":164818,"journal":{"name":"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130727270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using database framework in Web applications 在Web应用程序中使用数据库框架
D. Ridjanovic, V. Okanović
{"title":"Using database framework in Web applications","authors":"D. Ridjanovic, V. Okanović","doi":"10.1109/MELCON.2004.1347025","DOIUrl":"https://doi.org/10.1109/MELCON.2004.1347025","url":null,"abstract":"In software engineering, every new period brings new terms. First there were objects, and then came components and patterns, and now frameworks are becoming the current buzzword. Frameworks are powerful, but hard to develop and use effectively for application developers. It is often better to use and customize the open source frameworks than to develop in-house frameworks. Even if you are not developing the framework, but instead using an open source framework, there is still much work to be done. Deploying a framework involves a major investment in training and mentoring to allow developers to make the best use of the complex interfaces, abstract classes and classes. In this paper we discuss the open source frameworks and give an example of a database framework use in the dynamic Web applications development.","PeriodicalId":164818,"journal":{"name":"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130359829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The valuation of new generation assets in a competitive electricity market 在竞争激烈的电力市场中对新一代资产的估值
E. Caruso, M. Dicorato, A. Minoia, M. Trovato
{"title":"The valuation of new generation assets in a competitive electricity market","authors":"E. Caruso, M. Dicorato, A. Minoia, M. Trovato","doi":"10.1109/MELCON.2004.1348237","DOIUrl":"https://doi.org/10.1109/MELCON.2004.1348237","url":null,"abstract":"The selection and the valuation of a power project reveal a very difficult task in a liberalized electricity market. In conjunction with the highly capital-intensive feature of electricity supply, different factors can influence the profitability of the investment, such as: market rules, plant location, load demand and fuel cost trend, etc. In this paper, a methodology based on the long-term simulation of an electricity market is proposed to investigate the financial feasibility of new generation assets. The simulation tool handles zonal- or nodal- based pricing schemes, with different kinds of equality and inequality constraints. The procedure has been applied to evaluate the penetration level of combined cycle gas turbine power plants in southern Italy.","PeriodicalId":164818,"journal":{"name":"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129618550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Serial multiplier architectures over GF(2/sup n/) for elliptic curve cryptosystems 椭圆曲线密码系统的GF(2/sup n/)串行乘法器结构
L. Batina, N. Mentens, Berna Örs, Bart. Preneel, Bart. Preneel
{"title":"Serial multiplier architectures over GF(2/sup n/) for elliptic curve cryptosystems","authors":"L. Batina, N. Mentens, Berna Örs, Bart. Preneel, Bart. Preneel","doi":"10.1109/MELCON.2004.1347047","DOIUrl":"https://doi.org/10.1109/MELCON.2004.1347047","url":null,"abstract":"We present an FPGA implementation of a new multiplier for binary finite fields that combines two previously known methods. The multiplier is designed for polynomial bases which allow more flexibility in hardware and is dedicated to efficient implementations of elliptic curve cryptography. An extension to a digit-serial architecture is also sketched. For the introduced architecture we also discuss resistance to side-channel attacks.","PeriodicalId":164818,"journal":{"name":"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129927626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Selective video transmission by means of virtual reality based object extraction 基于虚拟现实的对象提取选择性视频传输
J. P. Bandera, C. Urdiales, F. Sandoval
{"title":"Selective video transmission by means of virtual reality based object extraction","authors":"J. P. Bandera, C. Urdiales, F. Sandoval","doi":"10.1109/MELCON.2004.1346815","DOIUrl":"https://doi.org/10.1109/MELCON.2004.1346815","url":null,"abstract":"This paper presents a new technique to extract objects from a real complex background so that a video sequence can be decomposed into a set of objects as required for object-oriented video compression techniques. The proposed method is based on a background subtraction technique. However, instead of using a fixed background, the system relies on predicting one from a previously constructed virtual model of the environment. Thus, camera movements are allowed. These movements are estimated by means of a tracker device. We also present the virtual model construction technique for indoor environments. The method has been successfully tested for several different video sequences including capture errors, partially mapped virtual environments and camera positioning errors. Further work will focus on extending the virtual models not only to environment, but also to objects, and integrating the method in a MPEG4 standard compression system.","PeriodicalId":164818,"journal":{"name":"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124691784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Electric energy demand analysis using fuzzy decision-making system 电力能源需求模糊决策分析系统
A.C. de Lima, S.C. Guimardes, J. Camacho, D. Bispo
{"title":"Electric energy demand analysis using fuzzy decision-making system","authors":"A.C. de Lima, S.C. Guimardes, J. Camacho, D. Bispo","doi":"10.1109/MELCON.2004.1348014","DOIUrl":"https://doi.org/10.1109/MELCON.2004.1348014","url":null,"abstract":"To obtain energy services, the integrated planning resources (IPR) work with an analysis that contemplates rationalization; independent production and environmental factors related to the energy supply systems. With this on mind for a consumer unity billed by means of a binomial tariff, the fuzzy decision making system for demand analysis (FDMSDA) can be considered as a tool to determine a new functioning condition, contemplating the energy average price supplied by own generation or local utility to the technology of load shaving due to the \"conventional\" and \"blue and green hour-seasonal\" Brazilian tariff structure.","PeriodicalId":164818,"journal":{"name":"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124971377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Measurement and analysis of voltage events in a low-voltage distribution network 低压配电网电压事件的测量与分析
J. Barros, E. Perez
{"title":"Measurement and analysis of voltage events in a low-voltage distribution network","authors":"J. Barros, E. Perez","doi":"10.1109/MELCON.2004.1348245","DOIUrl":"https://doi.org/10.1109/MELCON.2004.1348245","url":null,"abstract":"The paper presents the results of several months monitoring of voltage events in a low-voltage distribution network. Voltage dips, short interruptions and overvoltages in voltage supply are considered in the study. The voltage event detection method employed uses three Kalman Filters, one per voltage phase, to detect and estimate in real-time the magnitude and phase angle of the three-phase voltage supply during the event. Statistical analysis of the voltage events recorded and the effect of these voltage events on equipment are also considered in the paper.","PeriodicalId":164818,"journal":{"name":"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125995684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信