{"title":"Application of GPS and Infrared for Car Navigation in Foggy Condition to Avoid Accident","authors":"C. Gupta","doi":"10.1109/ICCEA.2010.289","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.289","url":null,"abstract":"The paper describes about the application of GPS card meant for navigational system by infra-red control of the cars in foggy condition to avoid accident along with microcontrol system. After an exhaustive review of GPS card for various applications, the paper plans to present the experimental details of the system. As a part of theoretical work related with the system it plans to discuss about ambiguity function of the matched filter of the moving target.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115631936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the Performance of the PI Systems through the Use of Neural Network","authors":"M. K. Jameii, M. Nekoui","doi":"10.1109/ICCEA.2010.114","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.114","url":null,"abstract":"Pulse induction systems include the very cheep and often-used metal detectors employed, besides other applications, in geology and mine-detecting robots. these systems only detect the presence of metals but are not capable of distinguishing them from each other in this article a method is introduced in which multiple layer perception networks are used to distinguish metals from each other on the basis of their electromagnetic characteristics . This method has been tested on 200 different samples containing the three metals iron, copper and aluminum. The results obtained show the degree of accuracy of the proposed method is over 95 percent.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"502 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123897714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Broadcasting Scheme with Low Buffer Requirement for Users with Limited Bandwidth","authors":"Yu-Wei Chen, Shin-Shung Chen","doi":"10.1109/ICCEA.2010.103","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.103","url":null,"abstract":"The broadcast method is the most efficient approach to deliver a popular video for utilizing bandwidth. By combining the Fibonacci and staircase methods, this paper presents a hybrid broadcasting method with low buffer requirement to deliver a constant bitrate compressed video. The proposed method allows users with bandwidth of double of the consumption rate to download and watch the video without break. The buffer requirement of the proposed method is 26.4% of the size of whole video. Compared with the Fibonacci method, the proposed method reduces the buffer requirement by about 30% while provides relatively acceptable wait time.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124162790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Control Using Sliding Mode of Two Phase Stepper Motor","authors":"Yousfi Khemissi, A. Abdulwahab","doi":"10.1109/ICCEA.2010.17","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.17","url":null,"abstract":"This paper presents a proposition of sliding mode position controller of stepper motor - two phase are commonly used in low-cost open-loop positioning control systems. However, acceleration and deceleration are limited and operating open-loop can cause the loss of steps and stalling of the motor. To overcome these inherent problems, a low-cost minor closed-loop position control system (SMC) was developed to optimize the torque output, maximize acceleration and deceleration rates and avoid the loss of steps. Two different minor closed-loop position controllers were designed and tested. Both systems employ an optical incremental encoder and both contain two feedback loops: a minor closed-loop (MCL) feeding back a step angle signal and a major closed-loop for position feedback. The first system uses a fixed advance angle MCL control whereas the second uses a fixed advance time MCL control involving a time-based interpolator. Details of these control strategies employed and the results obtained from the prototype systems are presented. The simulation of the dynamic behavior of this non-linear system, achieved under Matlab/Simulink computer package, allows us to examine the performance of this technique: improvement of the stability and the dynamic response.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"322 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123650693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionResearch on Talents Training Mechanism of University Management","authors":"Jianfeng Zhu, Yan Yu","doi":"10.1109/ICCEA.2010.128","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.128","url":null,"abstract":"The Highly-Qualified Personnel in universities and colleges nowadays is in need of a useful mechanism for cultivation. Clearly putting forward the concept and rationale of HQP, this paper brings forward a reasonable cultivating mode by virtue of analyzing different cultivating layers, which includes the selection, evaluating, cultivating and encouraging.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"5 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123729794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Gerhold, N. Kaemmer, A. Weggerle, Christian Himpel, P. Schulthess
{"title":"Pageserver: High-Performance SSD-Based Checkpointing of Transactional Distributed Memory","authors":"S. Gerhold, N. Kaemmer, A. Weggerle, Christian Himpel, P. Schulthess","doi":"10.1109/ICCEA.2010.53","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.53","url":null,"abstract":"The Rainbow cluster operating system provides fault tolerance by storing incremental checkpoints on a solid state disk (SSD) drive. As the access characteristics of SSD drives differ substantially from those of traditional magnetic hard disk drives (HDDs) new interesting techniques of storing checkpoints in an elegant object-oriented fashion can be applied. The usage of transactional distributed memory (TDM) simplifies the distributed checkpointing algorithm as it automatically guarantees consistent checkpoints of the entire Rainbow cluster without additional coordination overhead.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121966406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Three Tier Encryption Algorithm for Secure File Transfer","authors":"Bhargav Balakrishnan","doi":"10.1109/ICCEA.2010.202","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.202","url":null,"abstract":"This encryption algorithm is mainly designed for having a secure file transfer in the low privilege servers and as well as in a secured environment too. This methodology will be implemented in the data center and other important data transaction sectors of the organisation where the encoding process of the software will be done by the database administrator or system administrators and his trusted clients will have decoding process of the software. This software will not be circulated to the unauthorized customers.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122172530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Support Vector Machine (SVM) for English Handwritten Character Recognition","authors":"D. Nasien, H. Haron, S. Yuhaniz","doi":"10.1109/ICCEA.2010.56","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.56","url":null,"abstract":"This paper proposes a recognition model for English handwritten (lowercase, uppercase and letter) character recognition that uses Freeman chain code (FCC) as the representation technique of an image character. Chain code representation gives the boundary of a character image in which the codes represent the direction of where is the location of the next pixel. An FCC method that uses 8-neighbourhood that starts from direction labelled as 1 to 8 is used. Randomized algorithm is used to generate the FCC. After that, features vector is built. The criteria of features to input the classification is the chain code that converted to 64 features. Support vector machine (SVM) is chosen for the classification step. NIST Databases are used as the data in the experiment. Our test results show that by applying the proposed model, we reached a relatively high accuracy for the problem of English handwritten recognition.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"75 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120836883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Implement on Genetic Algorithm and Ant Colony Algorithm in Chinese Question Answering System","authors":"Shuling Di, Pilian He, Huan Li","doi":"10.1109/ICCEA.2010.40","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.40","url":null,"abstract":"This paper transformed the process of Chinese question answering into agent coalition formation first, and then got the solution by using of combination of genetic algorithm and ant colony algorithm. The idea and routine of the algorithm were given. Coding scheme, selecting scheme, crossover operator, mutation operator and so on of genetic algorithm which suitable for Chinese question answering agent coalition were designed. The basic ant colony algorithm was improved. The experiment showed that the algorithm could accelerate the convergence rate and improve the ability of searching an optimum solution, avoid falling into local optimums.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"14 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124518307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposal of Method for Digital Forensics in Physical Distribution","authors":"R. Uda","doi":"10.1109/ICCEA.2010.194","DOIUrl":"https://doi.org/10.1109/ICCEA.2010.194","url":null,"abstract":"A method for making a traceable platform in physical distribution is proposed in this manuscript. Recently, products and produce are required to be traceable by customers and buyers who ask for safety and quality. However, products and produce are sometimes lost or swapped whether intentionally or not in transportation. They are usually packaged individually and then these packages are put together in a cardboard box. Several of the boxes are put together on a pallet and wound with plastic tape. Several of the pallets are put in a container. Nested wrapping in those processes makes traceability unreliable in physical distribution since contents inside a case cannot be verified without opening the case. It is not feasible to unpack all of the nests in order to verify each product and produce when they are transshipped. The method proposed in this paper makes it possible to authenticate these nested items in transshipments by once verifying one code with an attached digital signature that certifies all nested items inside a case. Still more, the items keep traceability even if they are parted later. Moreover, the method keeps compatibility with current labelling standards in physical distribution, and it will contribute to digital forensics in physical distribution in the future.","PeriodicalId":207234,"journal":{"name":"2010 Second International Conference on Computer Engineering and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130147519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}