2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology最新文献

筛选
英文 中文
Maximum Power Point Tracking of Partially Shaded Photovoltaic Arrays Using Particle Swarm Optimization 基于粒子群优化的部分遮阳光伏阵列最大功率点跟踪
K. Teo, P. Lim, B. Chua, H. Goh, M. K. Tan
{"title":"Maximum Power Point Tracking of Partially Shaded Photovoltaic Arrays Using Particle Swarm Optimization","authors":"K. Teo, P. Lim, B. Chua, H. Goh, M. K. Tan","doi":"10.1109/ICAIET.2014.48","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.48","url":null,"abstract":"This paper presents the particle swarm optimization based maximum power point tracking (MPPT) approach for maximizing output power of photovoltaic (PV) array under partially shaded conditions (PSC). During PSC, the P-V characteristic becomes more complex with multiple maximum power points (MPP). Most of the conventional MPPT approaches will be trapped at the local MPP and hence limiting the maximum power generation. As such, the investigation on particle swarm optimization (PSO) based MPPT is carried out to maximize the PV generated power principally under PSC operation. The performances of conventional MPPT approach and the proposed PSO-MPPT are investigated particularly on the transient and steady state responses under various shaded conditions. The simulation results show that the PSO-MPPT is able to facilitate the PV array to reach the global MPP as well as to assist the PV array to produce more stable output power compared to the conventional perturb and observe (P&O) algorithm.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116824985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Power Adjustment Based Congestion Control in Vehicular Ad-hoc Networks 基于功率调整的车辆自组织网络拥塞控制
Guofeng Lei, Fuqiang Liu, Ping Wang, Xinhong Wang, Ning Wang
{"title":"Power Adjustment Based Congestion Control in Vehicular Ad-hoc Networks","authors":"Guofeng Lei, Fuqiang Liu, Ping Wang, Xinhong Wang, Ning Wang","doi":"10.1109/ICAIET.2014.53","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.53","url":null,"abstract":"Vehicles exchange periodic beacons to keep track of neighbor's moving trends in order to achieve cooperative safety awareness. In this paper, beacon rate is fixed as 10Hz to ensure sufficient tracking accuracy. High rate means heavy channel load. If beacons are transmitted with high power, channel will become extremely congested. To alleviate channel congestion, we propose a power adjustment based congestion control method depending on channel condition evaluation and message priority. In our scheme, channel situations are evaluated by current channel load and historical transmission delay. The mechanism is evaluated in our simulation platform which comprises of traffic simulator VISSIM for realistic urban scenario and network simulator NS3 for IEEE 802.11p-based communication. Simulation results demonstrate that our scheme has improved both the system reliability and efficiency.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117231374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Proposed Usability Heuristics for Testing Gestural Interaction 建议的可用性启发式测试手势交互
N. Chuan, A. Sivaji, W. Ahmad
{"title":"Proposed Usability Heuristics for Testing Gestural Interaction","authors":"N. Chuan, A. Sivaji, W. Ahmad","doi":"10.1109/ICAIET.2014.46","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.46","url":null,"abstract":"Heuristic evaluation is a fast and effective method of usability testing. However, usability heuristics framework used for general testing may not be suitable to evaluate gesture vocabulary of mainstream gestural interaction found in touchscreen devices or emerging technologies natural user interface that uses motion tracking. There is a need to do so during early stages of product development. The objective of this study is to create a set of gesture-specific heuristics that would complement existing general usability heuristics for design and testing of new gestural interaction. The method to do so is to review previous studies of gestural interaction design and usability testing. The result of the study is condensed set of four gesture-specific heuristics.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126614133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Community Energy Management with Electric Vehicles for Effective Use of Solar Energy 社区能源管理与电动汽车有效利用太阳能
D. Satoya, D. Yamashita, R. Yokoyama
{"title":"Community Energy Management with Electric Vehicles for Effective Use of Solar Energy","authors":"D. Satoya, D. Yamashita, R. Yokoyama","doi":"10.1109/ICAIET.2014.47","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.47","url":null,"abstract":"Photovoltaic generation (PV) output varies depending on the time, weather, and season. In these days, batteries equipped in electric vehicles (EVs) can be utilized as substitutes for the storage systems, and are expected to use output of PV generation efficiently. In this paper, authors propose an energy management method with EV batteries to improve the rate of utilization of PV output in the community consisting of houses with PV and EVs. As the result, it demonstrates that power interchange between houses with the appropriate charge-discharge management of EV batteries can improve the effective use of PV.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127414028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Comparative Study of Three Artificial Intelligence Techniques: Genetic Algorithm, Neural Network, and Fuzzy Logic, on Scheduling Problem 遗传算法、神经网络和模糊逻辑三种人工智能技术在调度问题上的比较研究
Abdollah Ansari, A. Abu Bakar
{"title":"A Comparative Study of Three Artificial Intelligence Techniques: Genetic Algorithm, Neural Network, and Fuzzy Logic, on Scheduling Problem","authors":"Abdollah Ansari, A. Abu Bakar","doi":"10.1109/ICAIET.2014.15","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.15","url":null,"abstract":"Since scheduling process is an important and complicated process, many programmers have been searching and working on this issue for years. Still many researchers in the academic institutes are trying to find the best solution. As time is money, time optimization is the most important point, which makes the researchers develop a system for scheduling at the best way by applying the best solution. Once look at the production line of a factory or the number of classes and classrooms in a university, shows that having a time table in these places not only helps regulate things, but also it helps optimize consumption of resources such as time and energy within the constraints and limitations. This paper explains and reviews the three techniques, which have previously been applied on scheduling domain by researchers and developers among several artificial intelligence techniques. These three techniques i.e. Genetic Algorithm, Neural Network and Fuzzy Logic will be defined, discussed and compared in terms of some measures.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125232908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
A Model for Securing Islamic Websites: Formal Specification Paradigm: IT Research Center for the Holy Quran and Its Sciences (NOOR), Taibah University, Madinah, Saudi Arabia 一种保护伊斯兰网站的模式:正式规范范式:神圣古兰经及其科学IT研究中心(NOOR), Taibah大学,麦地那,沙特阿拉伯
B. Abuhaija, A. M. Awadelkarim, N. Shilbayeh, Mohammad M. Alwakeel
{"title":"A Model for Securing Islamic Websites: Formal Specification Paradigm: IT Research Center for the Holy Quran and Its Sciences (NOOR), Taibah University, Madinah, Saudi Arabia","authors":"B. Abuhaija, A. M. Awadelkarim, N. Shilbayeh, Mohammad M. Alwakeel","doi":"10.1109/ICAIET.2014.23","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.23","url":null,"abstract":"The number of reported incidents pertaining to websites attacks has been significantly increased. Websites which provides Islamic contents are no exception. Previously a general architecture of security protocol for websites authentication and content integrity has been planned, introduced and proposed. This paper presents a universal and inclusive specification for the proposed architecture using methodical, criterion, and formal security annotation and syntax. The main aim of such formal design is to describe and examine the associated steps, features and behavior of the proposed security protocol in a systematic manner. The prescribed design covers the entire actions and functionality among the main five participating entities namely Content Provider (website owner), Judge, Water-mark Service Provider, Registration Authority and Layman User. Furthermore, the importance of such idiomatic specification is stemming from the possibility and opportunity of ensuring the correctness of the proposed model, as well as it can be easily used to develop and appraise the associated implementation.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132021404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Capacity Analysis of Full Rate Linear Dispersion Codes 全速率线性色散码的容量分析
M. Gheryani, M. Elfituri
{"title":"Capacity Analysis of Full Rate Linear Dispersion Codes","authors":"M. Gheryani, M. Elfituri","doi":"10.1109/ICAIET.2014.57","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.57","url":null,"abstract":"In this paper, we have studied capacity of linear dispersion codes in frequency-flat Rayleigh fading environments. An exact analytical formula of the ergodic capacity was derived for the full-rate linear dispersion code. The ergodic capacity was given in terms of signal-to-noise ratio and multiple antenna dimension. The exact analytical expression is verified by simulation results. This study will be of benefit to the design and study of linear dispersion code.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123437563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Beacon Rate Control Scheme Based on Fuzzy Logic for Vehicular Ad-Hoc Networks 基于模糊逻辑的车载Ad-Hoc网络信标速率控制方案
N. Wang, Guofeng Lei, Xinhong Wang, Ping Wang, Fuqiang Liu
{"title":"A Beacon Rate Control Scheme Based on Fuzzy Logic for Vehicular Ad-Hoc Networks","authors":"N. Wang, Guofeng Lei, Xinhong Wang, Ping Wang, Fuqiang Liu","doi":"10.1109/ICAIET.2014.54","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.54","url":null,"abstract":"According to IEEE 802.11p protocol, vehicles should periodically broadcast and exchange beacon messages to ensure the cooperative awareness of each other. However, high beacon generation rate may consume a large amount of channel bandwidth and thus lead to severe deterioration of network performance. To solve this problem, we propose an efficient beacon rate control scheme based on fuzzy logic in this paper. Fuzzy logic is proved to be available to handle with imprecise and uncertain information in control problems. Our scheme uses channel busy ratio (CBR), local density and mobility factor as fuzzy factors to obtain the fuzzy result in order to control the beacon rate of vehicles. The scheme is evaluated in our simulation platform, comprised of VISSIM traffic simulator for realistic traffic simulation and NS-3 network simulator for inter-vehicle communications. Simulation results clearly demonstrate the performance of our proposed scheme.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124836174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
OCDM Network Implementation of 1-D OOC and Passive Correlation Receiver 一维OOC与无源相关接收机的OCDM网络实现
H. Abbas, M. Gregory
{"title":"OCDM Network Implementation of 1-D OOC and Passive Correlation Receiver","authors":"H. Abbas, M. Gregory","doi":"10.1109/ICAIET.2014.58","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.58","url":null,"abstract":"Optical Code Division Multiplexing (OCDM) technique is depicted as one of the most promising architectures of the next generation Passive Optical Network (PON). It allows users to share the same wavelength at the same time leading to considerable improvements in the network performance. This paper provides an OCDM multiuser network time domain implementation of a one dimensional optical orthogonal code and passive correlation filter. A detailed description of the network components including transmitter, receiver, encoder and the decoder are provided. The results of this study conclusively indicate a successful restoration of the information data bit that sent from different transmitters to corresponding users using a simple passive correlation receiver.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130740247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automated Regression Test Suite Optimization Based on Heuristics 基于启发式的自动化回归测试套件优化
D. S. S. Prasad, Simy Chacko, S. Kanakadandi, Gopi Krishna Durbhaka
{"title":"Automated Regression Test Suite Optimization Based on Heuristics","authors":"D. S. S. Prasad, Simy Chacko, S. Kanakadandi, Gopi Krishna Durbhaka","doi":"10.1109/ICAIET.2014.18","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.18","url":null,"abstract":"In the Software Development Life Cycle, Testing is an integral and important phase. It is estimated that close to 45% of project cost is marked for testing. Defect removal efficiency is directly proportional to the rigor of the testing and number of test cycles. Given this prelude, important optimization dual is to reduce the testing time and cost without compromising on the quality and coverage. We revisit this popular research and industry sought problem, in the historical data perspective. Proposed model has two steps. N Test cases based on multiple heuristics are recommended as part of first step. These heuristics can be derived based on test manager, test lead and/or test director requirements as inputs. The N test cases that are to be recommended will be derived upon executing evolutionary randomized algorithms such as Random Forest / Genetic Algorithm. These algorithms fed with historically derived inputs such as test case execution frequency, test case failure pattern, change feature pattern and bug fixes & associations. The recommended test suite is further optimized based on a 2 dimensional approach during second step. Test case specific vertical constraints such as distribution of environments, distribution of features as well as test suite composition parameters such as golden test cases, sanity test cases, that serves as horizontal constraints.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129147807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信