Proceedings of the IEEE Symposium on Emerging Technologies, 2005.最新文献

筛选
英文 中文
Enterprises application integration 企业应用集成
Proceedings of the IEEE Symposium on Emerging Technologies, 2005. Pub Date : 2005-12-19 DOI: 10.1109/ICET.2005.1558905
K. Qureshi
{"title":"Enterprises application integration","authors":"K. Qureshi","doi":"10.1109/ICET.2005.1558905","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558905","url":null,"abstract":"","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121520496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Effect of buffer length on rate distortion bound for different PLC methods 缓冲长度对不同PLC方法速率失真界的影响
Proceedings of the IEEE Symposium on Emerging Technologies, 2005. Pub Date : 2005-12-19 DOI: 10.1109/ICET.2005.1558848
M. Ehsan, G. Kubin
{"title":"Effect of buffer length on rate distortion bound for different PLC methods","authors":"M. Ehsan, G. Kubin","doi":"10.1109/ICET.2005.1558848","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558848","url":null,"abstract":"Real-time multimedia communication due to its stringent delay requirements needs low delay PLC (packet loss concealment) methods to reduce the effect of lost packets. For audiovisual communications several PLC methods are utilized such as zero substitution or waveform substitution, we compare zero substitution and waveform repetition for a Gaussian source on the Gilbert-Elliott channel model. This allows to model the decrease of distortion with increasing buffer length","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114778329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy-aware fuzzy routing for wireless sensor networks 无线传感器网络的能量感知模糊路由
Proceedings of the IEEE Symposium on Emerging Technologies, 2005. Pub Date : 2005-12-19 DOI: 10.1109/ICET.2005.1558856
M. Yusuf, T. Haider
{"title":"Energy-aware fuzzy routing for wireless sensor networks","authors":"M. Yusuf, T. Haider","doi":"10.1109/ICET.2005.1558856","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558856","url":null,"abstract":"In recent vears. many approaches and techniques have been explored fbr the optinmization of energy usage in wireless sensor network-s. Routing is one of these areas in which attempts fjr etjicient utilization of energy have been made. These attempts use fixed (crisp) metrics for making energy-aware rouiting decisions. In this paper, we present a novel generalized fizzy, logic based approach for energyaware routting in wireless sensor networks. This generalized approach is soft acnd tutnable and hence it can accommodate sensor networks comprising of different types of sensor nodes.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121860951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Minimization of torque ripple in switched reluctance machine for direct drive applications 直接驱动用开关磁阻电机的转矩脉动最小化
Proceedings of the IEEE Symposium on Emerging Technologies, 2005. Pub Date : 2005-12-19 DOI: 10.1109/ICET.2005.1558913
R. T. Naayagi, V. Kamaraj
{"title":"Minimization of torque ripple in switched reluctance machine for direct drive applications","authors":"R. T. Naayagi, V. Kamaraj","doi":"10.1109/ICET.2005.1558913","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558913","url":null,"abstract":"A major problem of switched reluctance motors (SRM) is the torque ripple, which causes undesirable acoustic noise and vibration. If is caused by saliency of the stator and rotor. In this paper, a novel method on the basis of genetic algorithm (GA) is proposed to reduce the torque dip. thereby reducing the associated torque ripple, with simultaneous increase in torque output using GA. by maximizing the flux linkage and inductance ratio and the results are compared with that produced by a standard 8/6 pole, 4 phase, 1 KW, 100 V, 25 A.1500 rpm SRM. The obtained results are encouraging and verified using finite element analysis (FEA).","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121980852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Use case model of genetic algorithms of agents for control of distributed power system networks 分布式电网控制中agent遗传算法的用例模型
Proceedings of the IEEE Symposium on Emerging Technologies, 2005. Pub Date : 2005-12-19 DOI: 10.1109/ICET.2005.1558916
S.M. Alamdar Raza, M. Akbar, F. Kamran
{"title":"Use case model of genetic algorithms of agents for control of distributed power system networks","authors":"S.M. Alamdar Raza, M. Akbar, F. Kamran","doi":"10.1109/ICET.2005.1558916","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558916","url":null,"abstract":"The paper proposes an agent system for distributed generation setup identifying role and requirements of each agent. Genetic algorithms, due to their applicability for optimization solutions of nonlinear and stochastic scenarios, can find place in development of agents for distributed control. Advantages and special features of genetic algorithms for optimization are discussed, identifying some input and output variables. Requirement of compensator as an agent/sub-agent is also proposed. Finally the use case model is proposed showing assigned role of each agent. Each use case has been elaborated with its purpose, data handling, stimuli and responses. A lay out of the sub-systems of each of the proposed main agents has also been included.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134109262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Taxonomy of statistical based anomaly detection techniques for intrusion detection 基于统计的入侵检测异常检测技术分类学
Proceedings of the IEEE Symposium on Emerging Technologies, 2005. Pub Date : 2005-12-19 DOI: 10.1109/ICET.2005.1558893
A. Qayyum, M.H. Islam, M. Jamil
{"title":"Taxonomy of statistical based anomaly detection techniques for intrusion detection","authors":"A. Qayyum, M.H. Islam, M. Jamil","doi":"10.1109/ICET.2005.1558893","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558893","url":null,"abstract":"Security threats to the computer systems have raised the importance of intrusion detection systems. With the advent of new vulnerabilities to computer systems new techniques for intrusion detection have been implemented. Statistical based anomaly detection techniques use statistical properties and statistical tests to determine whether \"observed behavior\" deviate significantly from the \"expected behavior\". Statistical based anomaly detection has been a wide area of interest for researchers since it provides the base line for developing a promising technique. This paper presents a guideline for statistical based anomaly detection techniques with the perspective of various scenarios and areas of implementation. Inde.x TermsAnomaly detection, Intrusion detection, Security threats, Statistical analysis technique, Statistical models.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131008214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Modeling and design of shape optimized SRM with reduced ripple 减小纹波的形状优化SRM建模与设计
Proceedings of the IEEE Symposium on Emerging Technologies, 2005. Pub Date : 2005-12-19 DOI: 10.1109/ICET.2005.1558915
R. T. Naayagi, V. Kamaraj
{"title":"Modeling and design of shape optimized SRM with reduced ripple","authors":"R. T. Naayagi, V. Kamaraj","doi":"10.1109/ICET.2005.1558915","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558915","url":null,"abstract":"This paper describes the shape optimization and torque ripple minimization of switched reluctance machine (SRM) using genetic algorithm. In this paper, a novel method on the basis of genetic algorithm (GA) is proposed to reduce the torque dip, thereby reducing the associated torque ripple, with simultaneous reduction in size with increase in torque output using GA, by maximizing the flux linkage, torque per unit rotor volume and inductance ratio. The results are compared with that produced by a standard 8/6 pole, 4 phase SRM, The obtained results are encouraging and verified using finite element analysis (FEA).","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115437250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Architecture for de-centralized, distributed event communication mechanism through overlay network 通过覆盖网络实现分散式、分布式事件通信机制的体系结构
Proceedings of the IEEE Symposium on Emerging Technologies, 2005. Pub Date : 2005-12-19 DOI: 10.1109/ICET.2005.1558890
F. Umer, A. Qayyum
{"title":"Architecture for de-centralized, distributed event communication mechanism through overlay network","authors":"F. Umer, A. Qayyum","doi":"10.1109/ICET.2005.1558890","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558890","url":null,"abstract":"Overlay Networks have.found widespread popularity inrecenttimes, attributed mainly totheir prerogative andproductivity inmultitude ofnetworking areas, rangingfrommulticasting andpacket routing to efficient object or resourcelocation ina distributed environment. This paper explores theemployment of overlaynetworksin ubiquitous computing environments, encompassingthedesign ofan event managementmechanism forubiquitous entities. The devised architecture makesuse ofan existing DHT basedstructured overlay network andintegrates it withCORBA to develop a decentralized Event CommunicationMechanismfor Ubiquitous Environments. Thecontrived architecture emanates a completely decentralized, fault resilient andscalable Event Management Mechanism.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115692806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The statistical average carrier-to-interference ratio (CIR) of an ad hoc CSMA/CA wireless network providing multiple service-classes 提供多种服务等级的自组织CSMA/CA无线网络的统计平均载波干扰比(CIR)
Proceedings of the IEEE Symposium on Emerging Technologies, 2005. Pub Date : 2005-12-19 DOI: 10.1109/ICET.2005.1558855
S. A. Qasmi, K.T. Wong
{"title":"The statistical average carrier-to-interference ratio (CIR) of an ad hoc CSMA/CA wireless network providing multiple service-classes","authors":"S. A. Qasmi, K.T. Wong","doi":"10.1109/ICET.2005.1558855","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558855","url":null,"abstract":"This work characterizes the statistically expected carrier-tointerference ratio (CIR, C/R) of an ad hoc CSMA/CA wireless communication network, via Monte Carlo simulations. This paper is first in the open literature to model an ad hoc network accounting for all these following factors: (1) more realistic modeling of the network nodes' spatial distribution as via a two-dimensional Poisson process, whereby the network nodes are randomly placed arbitrarily on a two-dimensional plane (instead of the nodes locating deterministically at regularly spaced grid points), (2) suppression of nodes within the carrier-sensing range of a transmitting node, to micmac the CSMA/CA Medium Access Control (MAC) protocol (i.e. a node would self-restrain from transmission if close to a transmitting node), (3) microscopic Rayleigh fading, (4) propagation-distance-dependent path-loss, and (5) more than one service class. Monte Carlo simulations of a CSMA/CA ad hoc network generate the CIR data, whose statistical expected value and dependence on node's spatial Poisson intensity and relative power level are investigated. 1. THE CIR's SIGNIFICANCE & THE FACTORS AFFECTING THE CIR An ad hoc wireless communication network consists of a set of triansceiving nodes, routing each other's data packets without centralized control. An ad hoc network's performance metrics include its channel capacity, throughput, packet transmission time, queuing delay, transmission blocking probability [121, and outage probability. All these quality-of-service (QoS) perlormance metrics depend critically on the carrier-tointerierence ratio (CIR, C/R) at the network nodes. If the CIR is considered a stochastic variable, then each aforementioned QoS metric is also a stochastic entity, whose statistics depends on the CIR's statistics. Various propagation-channel parameters and networkprotocol factors affect this CIR, e.g., propagation-path loss in power, microscopic fading (often statistically modeled as Rayleigh distributed), the spatial distribution of the network's nodes, the network's number of service classes, the network's medium-access-control (MAC) protocol. More precisely, consider a kth-class transmission from node 'n0 to an intended node l transmitted with signal power Pkx) Node irix Tlhe authors were supported by Canada's Naitural Sciences & Engineering Research Council's Discovery Research Grant # NSERC-RGPIN-24977502 and the C;mnadian province of Ontario's 'Premier's Research Excellence Award\". receives this signal at power:","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123664562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Color segmentation for visual attention of mobile robots 移动机器人视觉注意力的颜色分割
Proceedings of the IEEE Symposium on Emerging Technologies, 2005. Pub Date : 2005-12-19 DOI: 10.1109/ICET.2005.1558865
M.Z. Aziz, Mahmoud Shafik, B. Mertsching, A. Munir
{"title":"Color segmentation for visual attention of mobile robots","authors":"M.Z. Aziz, Mahmoud Shafik, B. Mertsching, A. Munir","doi":"10.1109/ICET.2005.1558865","DOIUrl":"https://doi.org/10.1109/ICET.2005.1558865","url":null,"abstract":"Segmentation is a very iniportant step in most qf the nmachine vision applications. A method for color segmentation is proposed as a basic requirement qf visuial attention system of mobile robots. After experiments with different color spaces, the HSI color space is selected for segmentation with nminimtm influence of shades and shadows. The proposed method first classifies the color ofseed pixel and then selects a method for region growing according to nature of the seed pixel Results obtained are very encouraging and accor-ding to requtiremcents qf the application area. This paper addresses the problem of obtaining regions from colored images such that the regions may have minimum influence of shades and shadows in order to produce good input for higher level processing in visual attention systems of mobile robots. HSI (HueSaturation-Intensity) space, sometimes also called HSV (Hue-Saturation-Value) or HSL (Hue-SaturationLuminance), has a good representation of the colors of human perception [3] and has good capability of dealing with highlights, shades, and shadows [2]. As these features suite the requirements of our application area hence our approach performs segmentation in HSI color space and proposes an improved algorithm to obtain better results.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128172476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信