2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)最新文献

筛选
英文 中文
Improved active power sharing strategy for ELC Controlled Synchronous Generators Based Islanded Micro Grid application 基于孤岛微电网的ELC控制同步发电机有功功率共享改进策略
N. Gyawali, Bikram Paudel, B. Subedi
{"title":"Improved active power sharing strategy for ELC Controlled Synchronous Generators Based Islanded Micro Grid application","authors":"N. Gyawali, Bikram Paudel, B. Subedi","doi":"10.1109/SKIMA.2015.7400038","DOIUrl":"https://doi.org/10.1109/SKIMA.2015.7400038","url":null,"abstract":"This paper presents an Improved Active Power Sharing Strategy for Electronic Load Controller (ELC) Controlled Synchronous Generator Based Islanded Micro Grid (MG) Application. ELC regulated synchronous generators operating in parallel forming a MG is considered. Existing MG at Baglung District (Interconnected seven nearby Micro Hydro Plants with cumulative power output of 132 kW) was taken as a reference case for the study. Current active power sharing strategy was realized by considering MG with three generators and new concept was proposed to minimize the existing problem on power sharing. The control strategy is presented only for the MG operated in islanded mode. The case is designed and simulated in MATLAB using Simulink. This study does not consider the reactive power flows and sharing issue. This scheme can be efficiently used in MG Application.","PeriodicalId":261471,"journal":{"name":"2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"56 90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129276463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The effect of the time unit on software development effort estimates 时间单位对软件开发工作估计的影响
M. Jørgensen
{"title":"The effect of the time unit on software development effort estimates","authors":"M. Jørgensen","doi":"10.1109/SKIMA.2015.7399992","DOIUrl":"https://doi.org/10.1109/SKIMA.2015.7399992","url":null,"abstract":"Estimates of software development effort are frequently inaccurate and over-optimistic. In this paper we describe how changes in the granularity of the unit of estimation, e.g., work-days instead of work-hours, affects the effort estimates. We describe four psychological mechanisms, how they interact and discuss the expected total effect of higher granularity units on effort estimates. We argue that the mechanisms in general imply that higher granularity effort units will result in higher effort estimates, e.g., that estimating software development work in work-days or weeks will lead to higher estimates than when estimating in work-hours. A possible implication of this predicted effect is that, in contexts where there is a tendency towards under-estimation, estimation in work-days or weeks instead of work-hours leads to more realistic estimates.","PeriodicalId":261471,"journal":{"name":"2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132804060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A holistic simulation model for remote patient monitoring systems using Wireless Body Area Sensor Networks (WBASNs) 基于无线身体区域传感器网络(WBASNs)的远程病人监护系统整体仿真模型
M. Akbar, Hongnian Yu, S. Cang
{"title":"A holistic simulation model for remote patient monitoring systems using Wireless Body Area Sensor Networks (WBASNs)","authors":"M. Akbar, Hongnian Yu, S. Cang","doi":"10.1109/SKIMA.2015.7399990","DOIUrl":"https://doi.org/10.1109/SKIMA.2015.7399990","url":null,"abstract":"Remote patient monitoring systems mainly depend on the standards and protocols of the Wireless Body Area Sensor Networks (WBASNs). The increasing demand for these systems impose various challenges, including time bounded services, specific data rates, prioritized data transmission and energy consumption, etc. These challenges maps on the different layers of the protocol stack for WBASNs. In this context, a lot of new protocols for applications, MAC, network and physical layer have been proposed; however, few describe a complete simulation model to evaluate patient monitoring system. In this context, this work examines and proposes a simulation model based on the CASTALIA 3.2 simulator with an OMNeT++ framework to evaluate the patient monitoring system. The proposed model consist of six biomedical sensor nodes, including electrocardiography (ECG), blood pressure (BP), accelerometer, temperature, blood oxygen saturation and glucose monitor. The model defines the data rate settings for these nodes at the application layer. All these nodes are configured in star topology and send data to a centralized controller. IEEE 802.15.4 standard is used for the MAC and PHY layer and ZigBee is used over network layer. Slotted carrier sense multiple access with collision avoidance (CSMA/CA) is used as a channel access mechanism, however, the model also accommodate prioritized channel access by configuring guaranteed time service (GTS) for an ECG node. To evaluate the model, the parameters including delay, packet delivery ratio (PDR) and energy consumption is used. To evaluate simulation model over patient monitoring system, we have considered 250 ms as maximum affordable delay. It is observed that most of the nodes delivered data to coordinator under 250 ms Moreover, for the GTS model, the prioritized node (ECG) shows the acceptable delay and PDR values. Further, GTSon mode utilizes less energy as compared to GTSoff mode. Overall, researchers can use this model as a guideline to evaluate new protocols and standards of WBASNs.","PeriodicalId":261471,"journal":{"name":"2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123584251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Communication related issues in GSD: An exploratory study GSD中沟通相关问题的探索性研究
Mohammad Shameem, C. Kumar, B. Chandra
{"title":"Communication related issues in GSD: An exploratory study","authors":"Mohammad Shameem, C. Kumar, B. Chandra","doi":"10.1109/SKIMA.2015.7400043","DOIUrl":"https://doi.org/10.1109/SKIMA.2015.7400043","url":null,"abstract":"Global Software Development (GSD) projects use virtual teams that linked through telecommunication technologies. The work carried out in GSD process involves several issues. One of the key issues named is effective communication among team members. It has a great effect on the success of global software projects. In this paper, the influencing factors for effective communication have been highlighted considering the life cycle of the project development. Furthermore, a framework incorporating the relevant factors such as temporal distances, geographical distance, socio-cultural distance, attitudinal issues and social communication have been proposed and introduced in this paper. According to our study, social communication and attitudinal issues effects the team members also influences the communication in GSD projects. An exploratory research method has been used for collecting data from various Indian software organizations. Moreover, we also developed propositions for further research in this area.","PeriodicalId":261471,"journal":{"name":"2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126190696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Human action invarianceness for human action recognition 人体动作不变性用于人体动作识别
N. N. A. Sjarif, S. Shamsuddin
{"title":"Human action invarianceness for human action recognition","authors":"N. N. A. Sjarif, S. Shamsuddin","doi":"10.1109/SKIMA.2015.7400036","DOIUrl":"https://doi.org/10.1109/SKIMA.2015.7400036","url":null,"abstract":"The uniqueness of the human action shape or silhouete can be used for the human action recognition. Acquiring the features of human silhouette to obtained the concept of human action invarianceness have led to an important research in video surveillance domain. This paper discusses the investigation of this concept by extracting individual human action features using integration moment invariant. Experiment result have shown that human action invarianceness are improved with better recognition accuracy. This has verified that the integration method of moment invariant is worth explored in recognition of human action in video surveillance.","PeriodicalId":261471,"journal":{"name":"2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"219 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124240602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Visual cryptography using image pixel transparency with cover image 视觉密码学使用图像像素透明与封面图像
Dipesh Shrestha, S. Panday
{"title":"Visual cryptography using image pixel transparency with cover image","authors":"Dipesh Shrestha, S. Panday","doi":"10.1109/SKIMA.2015.7400048","DOIUrl":"https://doi.org/10.1109/SKIMA.2015.7400048","url":null,"abstract":"Transparency of pixels of the shares (the two or more encrypted images) can be used to reveal the secret image. The pixels of shares can be generated randomly or the cover image can be used to generate the first share. The encrypted shares generated using cover image seem to be visually less similar to those generated without using cover image. Also, on the basis of image similarity between shares and original image, further encryption of encrypted shares can be performed. Comparison of the outcomes when cover image is used and when not used to generate shares, shows that the latter is more sensitive to the transparency factor (alpha) than the former encouraging the use of properly selected cover image for visual cryptography using pixel transparency.","PeriodicalId":261471,"journal":{"name":"2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127891079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A DBMS based inventory model and its timeframe study in automobile spare parts import management 基于DBMS的汽车零部件进口库存模型及其时间框架研究
P. L. Tamang, P. Paudyal
{"title":"A DBMS based inventory model and its timeframe study in automobile spare parts import management","authors":"P. L. Tamang, P. Paudyal","doi":"10.1109/SKIMA.2015.7399987","DOIUrl":"https://doi.org/10.1109/SKIMA.2015.7399987","url":null,"abstract":"The present study is aimed to study the delay that arises in automobile spare parts import system. This is a case study of FIAT dealership, Batas Brothers Motors Pvt. Ltd (BBMPL) based on import of Nepal-India custom. Study includes comparative research design of FIAT general import model, principal standard import model and Database Management System (DBMS) based import model. Input data taken for DBMS model is sales, warranty, clipping, sub-dealership demand data of FY 2069/70 BS, 70/71 BS (2013/014 AD, 2014/2015 AD). These data are used to forecast demand, cost of freight and custom duties for FY 2071/72 and determine the import time information. An accumulated order of forecasted data is generated by DBMS Model for study of time comparison with standard import model and general inventory model. Statistical summary of study shows that general inventory model takes 2.4 times (108 days) longer duration than that of standard import model i.e, 45 days whereas DBMS model reduces standard time by 0.57 times (26 days). The study suggests DBMS inventory model as best model in comparison with standard import model and general inventory import model. Web based application software of DBMS based inventory model has been developed and its reliability test in import management has been carried out. The model is friendly in business intelligence (BI) and enterprise resource planning (ERP) for import industry. If database of spare parts demand viz-normal workshop sales, warranty sales, clipping sales, sub dealership sales can be collected, the model can be effectively used in other industries also, beside the automobile service.","PeriodicalId":261471,"journal":{"name":"2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126181157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Preserving privacy in social network graph with K-anonymize degree sequence generation 基于k -匿名度序列生成的社交网络图隐私保护
Munmun Bhattacharya, Papri Mani
{"title":"Preserving privacy in social network graph with K-anonymize degree sequence generation","authors":"Munmun Bhattacharya, Papri Mani","doi":"10.1109/SKIMA.2015.7400035","DOIUrl":"https://doi.org/10.1109/SKIMA.2015.7400035","url":null,"abstract":"The notion of being connected is primal in the modern world. Everyday people spend a great amount of their time in the virtual world through various online social networking sites. As a result a huge amount of personal information is being exchanged over the social network making them top of the interest to researchers from every field, various application developing companies, advertising companies and even governments. Analysis of these graphs helps discover invaluable knowledge. But this boon does not come without curse. Many invasive adversaries threat the confidentiality of this private information making the users vulnerable to being exposed and identified. So preserving privacy while publishing the social network graph data is one the most important concerns in today's world. Different technique has been adopted to anonymize social network data before publishing. In this paper we have proposed an iterative algorithm to generate k-anonymize vertex degree sequence of a given social network graph in order to protect the graph against passive attack. We have applied our method to some social network graph datasets and demonstrated their efficiency in preventing vertex re-identification attacks where an adversary has background knowledge about the degree of the target vertex.","PeriodicalId":261471,"journal":{"name":"2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130479648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Collaborative crosschecking system of observed loss estimation for disaster relief management 救灾管理中观测损失估算的协同交叉核对系统
Sirinrat Khwanpheng, Khin T. Lwin, R. Chaisricharoen, P. Temdee
{"title":"Collaborative crosschecking system of observed loss estimation for disaster relief management","authors":"Sirinrat Khwanpheng, Khin T. Lwin, R. Chaisricharoen, P. Temdee","doi":"10.1109/SKIMA.2015.7400049","DOIUrl":"https://doi.org/10.1109/SKIMA.2015.7400049","url":null,"abstract":"Disaster is unavoidable but an effective disaster relief management can improve severe situations. Rapid and precise reliefs delivered to right victims are the key to improve situation after an unavoidable disastrous event. This is one of a great challenge in rural area of most developing countries as all required resources can be lacked in any moment. At the same time, there is a lot of observed information from many different sources which has to be manipulated while the relief is indeed required in the timely manner. The observed information can be over and under estimated because it depends mainly on the individual observers. Therefore to promote effective disaster relief management system, this paper presents a system for crosschecking and ranking the collected information from multiple observers to sort victims based on their priorities. The proposed system consists of three main components: the case gathering service, the crosschecking mechanism and the ranking process. Based on information of a real disastrous area suffered by the earthquake in Chiang Rai province which is in the northernmost of Thailand in 2014, the proposed system is evaluated as high availability, moderate satisfaction along with high adequate precision.","PeriodicalId":261471,"journal":{"name":"2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121148298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cyber-physical model for platoon system 排系统的网络物理模型
Madeleine El-Zaher, Baudouin Dafflon, Franck Gechter
{"title":"A cyber-physical model for platoon system","authors":"Madeleine El-Zaher, Baudouin Dafflon, Franck Gechter","doi":"10.1109/SKIMA.2015.7400045","DOIUrl":"https://doi.org/10.1109/SKIMA.2015.7400045","url":null,"abstract":"Cyber-Physical system (CPS) are now widely used in the design of smart objects. A CPS is the integration of computational elements with physical processes. One of the most widespread application of CPS is the autonomous transportation systems. This paper presents a CPS model for the design of a platoon system approach (i.e. a set of autonomous vehicles that move together without any mechanical link while maintaining a predefined configuration). The proposed approach to platoon issue can be considered to be decentralized since each vehicle perceives its environment and acts based only on its own perceptions. The proposed approach deals with different platoon formation. The vehicles of the platoon are able to maintain their position in the configuration while avoiding collision with obstacles. The paper shows some simulation and experimentation results that allow to evaluate the quality of the proposed platoon approach.","PeriodicalId":261471,"journal":{"name":"2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125619151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信