2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)最新文献

筛选
英文 中文
Fast response SSSC based on instantaneous power theory 基于瞬时功率理论的快速响应SSSC
M. Suliman, S. M. Bashi
{"title":"Fast response SSSC based on instantaneous power theory","authors":"M. Suliman, S. M. Bashi","doi":"10.1109/ICECCPCE.2013.6998757","DOIUrl":"https://doi.org/10.1109/ICECCPCE.2013.6998757","url":null,"abstract":"The abilities of SSSC over impedance type make it more preferable in many applications. Fine control schemes and settings should be applied in order to achieve these superior abilities. In addition, the quadrature voltage generated by SSSC with respect to the phase voltage gives its ability to control the load angle and then the power flow of the transmission line. This paper propose control scheme for regulating power flow of the transmission line by using the voltage as a reference. Dynamic response of the SSSC was investigated by the digital simulation. Simulation results illustrate effectiveness of the SSSC under control schemes with use of instantaneous power theory. Furthermore, the SSSC with quadrature voltage control scheme showed its ability to control the power flow of the transmission line.","PeriodicalId":226378,"journal":{"name":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117133070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Efficient infrared sensor and camera based monitoring system 基于高效红外传感器和摄像头的监控系统
Q. S. Hamad, M. Croock, Salih Al Qaraawi
{"title":"Efficient infrared sensor and camera based monitoring system","authors":"Q. S. Hamad, M. Croock, Salih Al Qaraawi","doi":"10.1109/ICECCPCE.2013.6998764","DOIUrl":"https://doi.org/10.1109/ICECCPCE.2013.6998764","url":null,"abstract":"In this paper, an efficient control algorithm for infrared (IR) sensor based camera monitoring system is proposed. The aim of this algorithm is to detect and record the state of the motioned objects that cross the covered area by the monitoring scheme, in which both consumed power and storage capacity are reduced. This is done by controlling the work of the allocated cameras to operate independently depending on the received signals of the distributed IR sensors. The obtained results show the efficiency and powerful of the proposed system in terms of required power and storage capacity and coverage.","PeriodicalId":226378,"journal":{"name":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125940142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
GPU acceleration of object detection on video stream using CUDA 使用CUDA的GPU加速视频流上的目标检测
Shefa A. Dawwd, U. Salim
{"title":"GPU acceleration of object detection on video stream using CUDA","authors":"Shefa A. Dawwd, U. Salim","doi":"10.1109/ICECCPCE.2013.6998761","DOIUrl":"https://doi.org/10.1109/ICECCPCE.2013.6998761","url":null,"abstract":"Object detection is one of the important applications of the computer vision, image and video processing. However the best accuracy and fast invariant detecting function under changing object states such as (position, scale, illumination and noise) is a central aspect problem of the object detection in the video frames and images that cannot be realized by using sequential processing with a single core General Purpose Central Processing Unit (GPCPU). In this paper, to solve these problems and speed up the highly intensive calculation required, a simple and an efficient template matching algorithm of object detection is proposed. It is based on using sliding window across the video frame with applying two similarity measures as a window function: Sum of Absolute Difference (SAD) and pyramid downscale multi-resolution Sum of Absolute Difference that is called (PSAD). The implementation operation is achieved by using Graphic Processing Unit (GPU) that is based on using parallel processing technique, Data Level Parallelism (DLP), and single instruction multiple data (SIMD) operations with Compute Unified Device Architecture (CUDA). For both SAD and PSAD a comparable speedup of 161x and 97x is achieved respectively for an image size of 768×567 using MATLAB environment.","PeriodicalId":226378,"journal":{"name":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116446635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Minimizing of scheduling time under fair centralized scheduling and efficient routing algorithms for WiMAX based mesh networks 基于WiMAX的网状网络在公平集中调度和高效路由算法下的调度时间最小化
Z. Farej, O. Alani
{"title":"Minimizing of scheduling time under fair centralized scheduling and efficient routing algorithms for WiMAX based mesh networks","authors":"Z. Farej, O. Alani","doi":"10.1109/ICECCPCE.2013.6998750","DOIUrl":"https://doi.org/10.1109/ICECCPCE.2013.6998750","url":null,"abstract":"In WiMAX mesh networks (WMN) the interferences among links have high effect on their performance. Therefore, an efficient routing algorithm is needed to choose the less interfered and more balanced links during the construction of the routing tree. Two Routing Tree Construction Algorithms, Paralleled (Par-RTCA) and Balanced-Paralleled (Bal-Par-RTCA) are introduced. The Bal-Par-RTCA, which is based on balancing the data and parallelizing the routes of the data from SS (Subscriber Station) to BS (Base Station), has the feature of Testing the Down-Node Group (TDNG). This feature increases the chance of conversion of Primary Interferences (PI) into Secondary Interferences (SI). The Modified Fair Relay Centralized Scheduling Algorithm (MFRCSA), which make use of spatial reuse efficiently, is also introduced here to avoid SI and increase concurrent transmissions over a certain time slot. As a result, system performance is enhanced in terms of Length of scheduling (L) and Links Concurrency Ratio (LCR). With spatial reuse and relative to the IEEE 802.16 standard Breadth First Tree (BFT) RTCA, the simulation results of the proposed Par-RTCA and Bal-Par-RTCA show LCR enhancement of 11.11% and 14.28%respectively.","PeriodicalId":226378,"journal":{"name":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","volume":"39 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130847914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Process migration based on memory to memory mechanism 基于内存到内存机制的进程迁移
A. Khidhir, B. Mustafa, N. Saleh
{"title":"Process migration based on memory to memory mechanism","authors":"A. Khidhir, B. Mustafa, N. Saleh","doi":"10.1109/ICECCPCE.2013.6998765","DOIUrl":"https://doi.org/10.1109/ICECCPCE.2013.6998765","url":null,"abstract":"Process migration involves transferring both static and dynamic states of a process from one machine to another. Migration requires checkpointing the dynamic states of a process, including the process address space, and storing them as files on source machine hard disk. Transferring the checkpointed information needs establishing a network connection, accessing the disk, reading files contents and sending them to the destination machine. This paper presents a migration mechanism that reduces disk access time by exploiting shared memory concept to transfer process address space between machines. This is done by acquiring additional privilege for the destination system that operates on the migrant process. Also, enabling read access rights for a specified region of pages of the process address space in the source machine. This mechanism is implemented on a distributed system of two machines.","PeriodicalId":226378,"journal":{"name":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123910862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A proposed color image protection system based on color embedding 提出了一种基于颜色嵌入的彩色图像保护系统
Peshawa J. Muhammad Ali, N. Semary
{"title":"A proposed color image protection system based on color embedding","authors":"Peshawa J. Muhammad Ali, N. Semary","doi":"10.1109/ICECCPCE.2013.6998752","DOIUrl":"https://doi.org/10.1109/ICECCPCE.2013.6998752","url":null,"abstract":"Color Hiding is a new term used for both image protection and image compressing. This paper presents a new technique for embedding the color details of an image inside a grayscale scrambled version of the image. Color details of any image consist of three components red, green and blue. The proposed technique determines the number of the most important bits of each component. The technique embeds the extracted most significant bits MSB bits of the image inside a grayscale semi-scrambled version according to level of importance of each color component. The semi-scrambled version of the image has a limited quality to encourage costumers for buying the decoding key. System results have been evaluated using standard quality assessment measures. The proposed system shows desirable results for both decoded and encoded images which indicate the ability of being used in video stream protection.","PeriodicalId":226378,"journal":{"name":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129329568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A workshop: Essential soft skills for engineers 工作坊:工程师必备软技能
H. A. Albayati
{"title":"A workshop: Essential soft skills for engineers","authors":"H. A. Albayati","doi":"10.1109/ICECCPCE.2013.6998778","DOIUrl":"https://doi.org/10.1109/ICECCPCE.2013.6998778","url":null,"abstract":"Inspired by the IEEE training course “Stuff You Didn't Learn in Engineering School”, IEEE ComSoc Iraq Chapter team prepared a one full day workshop at (17 Dec 2013) for the engineering students in Technical College of Mosul (TCoM) titled “Essential Soft Skills for Engineers”, within the activities of ICECCPCE13.","PeriodicalId":226378,"journal":{"name":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122304691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Key note lecture multidisciplinary in cryptology and information security 重点讲座:密码学与信息安全的多学科
S. Sadkhan
{"title":"Key note lecture multidisciplinary in cryptology and information security","authors":"S. Sadkhan","doi":"10.1109/ICECCPCE.2013.6998773","DOIUrl":"https://doi.org/10.1109/ICECCPCE.2013.6998773","url":null,"abstract":"Summary form only given. To reach the high depths of knowledge and expertise which are required nowadays, scientists focus their attention on minute areas of study. However, the most complex problems faced by scientists still need the application of different disciplines to tackle them, which creates a necessity for multi-disciplinary collaboration. Cryptology is naturally multidisciplinary field, drawing techniques from a wide range of disciplines and connections to many different subject areas. In recent years, the connection between algebra and cryptography has tightened, and established computational problems and techniques have been supplemented by interesting new approaches and ideas. Cryptographic engineering is a complicated, multidisciplinary field. It encompasses mathematics (algebra, finite groups, rings, and fields), probability and statistics, computer engineering (hardware design, ASIC, embedded systems, FPGAs) and computer science (algorithms, complexity theory, software design), control engineering, digital signal processing, physics, chemistry, and others. This lecture provides an introduction to the disciplinary, multidisciplinary and their general structure (interdisciplinary, trans-disciplinary, and cross-disciplinary). And it also gives an introduction to the applications of the multidisciplinary approaches to some of the cryptology fields. Also the lecture provides some facts about the importance of the suitability and of the multidisciplinary approaches in different scientific, academic, and technical applications.","PeriodicalId":226378,"journal":{"name":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121880659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Iterative block DFE (IBDFE) and IC techniques based chip-level multiple access systems 基于迭代块DFE (IBDFE)和IC技术的芯片级多址系统
S. Al-Iesawi, M. S. Ahmed, T. M. Salman
{"title":"Iterative block DFE (IBDFE) and IC techniques based chip-level multiple access systems","authors":"S. Al-Iesawi, M. S. Ahmed, T. M. Salman","doi":"10.1109/ICECCPCE.2013.6998768","DOIUrl":"https://doi.org/10.1109/ICECCPCE.2013.6998768","url":null,"abstract":"In wireless broadband communications using single-carrier interleave division multiple access (SC-IDMA) with frequency domain equalization (FDE), a new combination of iterative block decision feedback equalization (IBDFE) and interference cancellation (IC) techniques is proposed to deal with several users accessing the common channel. Filtering operations of IBDFE, which are used to remove intersymbol interference (ISI), are implemented by fast Fourier transforms (FFTs) that yield a much lower complexity than equivalent time domain (TD) structures. Further, the proposed structure is performed iteratively and IBDFE is designed according to the minimum mean square error (MMSE) criteria. The feedback signal after error-correction code is directly designed from soft detection at the previous iteration. Simulations performed for downlink communication on wireless fading multipath channels show that the combination of IBDF-IC provides an efficient solution with good performance for IDMA systems in ISI channels. Further, IBDFE-IDMA outperforms existing SC-FDE and multi-carrier IDMA schemes with cyclic prefixing (CP) and zero padding (ZP) techniques.","PeriodicalId":226378,"journal":{"name":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125379968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time-frequency analysis of photoplethysmogram for measuring deepness of anesthesia 测量麻醉深度的光容积图时频分析
Ahmad Al-Taan, W. Stork, S. Schumann, S. Wirth, Karla Hahn, J. Guttmann
{"title":"Time-frequency analysis of photoplethysmogram for measuring deepness of anesthesia","authors":"Ahmad Al-Taan, W. Stork, S. Schumann, S. Wirth, Karla Hahn, J. Guttmann","doi":"10.1109/ICECCPCE.2013.6998746","DOIUrl":"https://doi.org/10.1109/ICECCPCE.2013.6998746","url":null,"abstract":"One of the most important objectives of anesthesiologists is to ensure an adequate depth of anesthesia for patients during surgeries. The adequate depth of anesthesia does not mean patient's sleeping as deep as possible but it means as deep as necessary to prevent awareness without unintentional overloading the patient with high doses of the anesthesia's drug. Overloading patients that already have history of cardiac illness or other diseases may cause death or complications during recovery stage after the surgery. Therefore monitoring depth of anesthesia will prevent such complications and ensure suitable dose of drugs. Pulse oximeter is one of the standard devices already used in the operation theater. Photoplethysmogram (PPG) is the signal given using pulse oximeter carries information about cardiopulmonary system. The rhythms of both the cardiac and respiratory systems are changed during surgeries. The Autonomic Nervous system (ANS) controls the cardiorespiratory systems during consciousness but this control will have more effects during unconsciousness. We studied the changes of the photoplethysmogram during surgeries to determine level of anesthesia during surgery. Time-Frequency method of analysis was used then system identification to get a mathematical model that represents our system. The results show high correlation up to (95.27%) between the standard methods (BIS Index) with the method developed in this study. The results depend on the processed part of the signal and on the identification methods.","PeriodicalId":226378,"journal":{"name":"2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129807450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信