2009 Second International Conference on Computer and Electrical Engineering最新文献

筛选
英文 中文
On-line Colour Image Compression Based on Pipelined Architecture 基于流水线结构的在线彩色图像压缩
2009 Second International Conference on Computer and Electrical Engineering Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.206
A. Halder, D. Kole, S. Bhattacharjee
{"title":"On-line Colour Image Compression Based on Pipelined Architecture","authors":"A. Halder, D. Kole, S. Bhattacharjee","doi":"10.1109/ICCEE.2009.206","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.206","url":null,"abstract":"This paper reports a pipelined architecture that can support on-line compression/decompression of image data. Spatial and spectral redundancy of an image data file is detected and removed with a simple and elegant scheme that can be easily implemented on a pipelined hardware. The scheme provides the user with the ability of trading off the image quality with the compression ratio. The basic theory of byte error correcting code (ECC) is employed in this work to compress a pixel row with reference to its adjacent row. A simple scheme is developed to encode pixel rows of a color image.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"1 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114018373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Solving Cryptarithmetic Problems Using Parallel Genetic Algorithm 用并行遗传算法求解密码问题
2009 Second International Conference on Computer and Electrical Engineering Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.25
Reza Abbasian, M. Mazloom
{"title":"Solving Cryptarithmetic Problems Using Parallel Genetic Algorithm","authors":"Reza Abbasian, M. Mazloom","doi":"10.1109/ICCEE.2009.25","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.25","url":null,"abstract":"Cryptarithmetic is a class of constraint satisfaction problems which includes making mathematical relations between meaningful words using simple arithmetic operators like ‘plus’ in a way that the result is conceptually true, and assigning digits to the letters of these words and generating numbers in order to make correct arithmetic operations as well. A simple way to solve such problems is by depth first search (DFS) algorithm which has a big search space even for quite small problems. In this paper we proposed a solution to this problem with genetic algorithm and then optimized it by using parallelism. We also showed that the algorithm reaches a solution faster and in a smaller number of iterations than similar algorithms.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125595742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A New Mathematical Approach for Synthesis of State Based Models from Scenario Based Models 基于状态的模型与基于场景的模型综合的一种新的数学方法
2009 Second International Conference on Computer and Electrical Engineering Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.64
Y. G. Bonab, A. Isazadeh
{"title":"A New Mathematical Approach for Synthesis of State Based Models from Scenario Based Models","authors":"Y. G. Bonab, A. Isazadeh","doi":"10.1109/ICCEE.2009.64","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.64","url":null,"abstract":"Model Driven Development and Use Case Driven Development methodologies have inspired the proposal of a variety of software engineering approaches that synthesize state based models from scenario-based models. Solving the problem of synthesis for open reactive systems is an inherently difficult problem. In various settings the problem is undecidable, and even in more restricted settings when it becomes decidable, the time and space requirements of the synthesis algorithm may be too large to be practical for large systems. This research presents a new approach to define algorithms of synthesis technique. This approach is based on an ordered sequence of stage for executing the scenarios. It is important to consider the executing stages of a scenario as a sequence. This gives a lot of information about execution of a scenario. Many synthesis approaches address the running stages of a scenario as a single stage. The mathematical foundation presented for this ordered sequence is based on RUN in Live Sequence Chart method presented by Harel. We believe that our mathematical foundation would significantly reduce the complexity of synthesis technique. We show that our approach have some advantages over those of others’; in particular, our mathematical basis to define algorithms for constructing synthesis technique is very efficient.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126597792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Application of Virtual Reality Technology in Teaching and Training 虚拟现实技术在教学与培训中的应用研究
2009 Second International Conference on Computer and Electrical Engineering Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.22
Shuang Li
{"title":"Research on Application of Virtual Reality Technology in Teaching and Training","authors":"Shuang Li","doi":"10.1109/ICCEE.2009.22","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.22","url":null,"abstract":"With the development of educational technology, more and more modern science and technology begins to be applied in teaching and training. Based on introduction of the definition and characters of virtual reality (VR) technology, the VR technology was introduced into the field of teaching and training. The application circumstance of VR in teaching and training was also discussed. Using VR technology, some kind of communication vehicle operation training system was designed. The key problems for operation environment construction, modeling and system running of the teaching and training system were also provided. The research not only offer novel idea for the construction of communication equipment operation training system, but also provide reference for the application of VR technology in others fields.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131052630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Research of Face Recognition Based on Locally Linear Embedding 基于局部线性嵌入的人脸识别研究
2009 Second International Conference on Computer and Electrical Engineering Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.130
Cuihong Zhou, Gelan Yang
{"title":"Research of Face Recognition Based on Locally Linear Embedding","authors":"Cuihong Zhou, Gelan Yang","doi":"10.1109/ICCEE.2009.130","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.130","url":null,"abstract":"Image data taken with various capturing devices are usually multidimensional and therefore they are not very suitable for accurate classification normally expecting to operate only on a small set of relevant features. Locally Linear Embedding is an effective nonlinear dimensionality reduction method for exploring the intrinsic characteristics of high dimensional data. In this paper, novel Local linear embedding for face classification is proposed. We modify the LLE algorithm by preserving more geometrical knowledge of the high-dimensional data, then combining with simple classifiers such as the nearest mean classifier. Experimental simulations are shown to yield remarkably good classification results in high dimension face image sequence.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130721097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A 0.6v Ultra-High-Gain Ultra-Low-Power CMOS LNA at 1.5GHz in 0.18µm Technology 一种0.18µm工艺下1.5GHz的0.6v超高增益超低功耗CMOS LNA
2009 Second International Conference on Computer and Electrical Engineering Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.190
E. Kargaran, H. Kargaran, H. Nabovati
{"title":"A 0.6v Ultra-High-Gain Ultra-Low-Power CMOS LNA at 1.5GHz in 0.18µm Technology","authors":"E. Kargaran, H. Kargaran, H. Nabovati","doi":"10.1109/ICCEE.2009.190","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.190","url":null,"abstract":"This paper describes a CMOS LNA utilizing a folded cascade architecture for GPS front-end receiver in a TSMC 0.18-µm process. The Major Problem in the LNAs with folded cascade architecture is low reversing isolation. In this paper this parameter is improved by adding a transistor. The power gain and the minimal Noise Figure (NF) are two important factors for the circuits. Besides those factors, good linearity, input impedance matching, low supply voltage and the lower power consumption are also desired. The proposed LNA achieves a small signal gain of 23.1 dB. The LNA acquires an NF of 2.1 dB with an input return loss of -14dB and an output return loss of -14 dB. Total Power consumption is only 2.6mW from a 0.6v supply voltage.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132900829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Compatibility and Replaceability Analysis of Timed Web Services Protocols 定时Web服务协议的兼容性和可替代性分析
2009 Second International Conference on Computer and Electrical Engineering Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.106
Emad Elabd, E. Coquery, Mohand-Said Hacid
{"title":"Compatibility and Replaceability Analysis of Timed Web Services Protocols","authors":"Emad Elabd, E. Coquery, Mohand-Said Hacid","doi":"10.1109/ICCEE.2009.106","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.106","url":null,"abstract":"Nowadays, most enterprises use web services as a framework for facilitating application-to-application interaction within and across them. Describing behaviour of web services is becoming more and more important. This behaviour can be described by timed business protocols representing the possible sequences of message exchanges. Studying the behaviour of web services by analyzing their timed business protocols is the main contribution of this work. This paper introduces notions of compatibility and replaceability w.r.t. timed business protocols together with the corresponding verification algorithms.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133172177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Designing a Framework for Distributing Serial Applications 设计一个分发串行应用程序的框架
2009 Second International Conference on Computer and Electrical Engineering Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.224
V. Rafe
{"title":"Designing a Framework for Distributing Serial Applications","authors":"V. Rafe","doi":"10.1109/ICCEE.2009.224","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.224","url":null,"abstract":"The idea is to separate application programs from the various aspects of concurrency, distribution and its communication infrastructure. Automatic Distribution of computationally intensive object oriented programs is one of the active research areas. In this paper, a method for distributing application programs over a network is presented. We use a genetic clustering algorithm to detect mostly connected classes, in a class dependency graph. Each cluster may be deployed in a station across a network and communicate with the other stations via CORBA middleware. Something that distinguishes our environment from the existing ones is the support for automatic exploitation of inherent concurrency in inter-object communications and for non-blocking interactions between objects in different clusters over CORBA event channels.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127808580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Communicating Fixed and Variable Instruction Set Processors 通信固定和可变指令集处理器的设计与实现
2009 Second International Conference on Computer and Electrical Engineering Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.238
V. Sklyarov, I. Skliarova, J. F. Lima
{"title":"Design and Implementation of Communicating Fixed and Variable Instruction Set Processors","authors":"V. Sklyarov, I. Skliarova, J. F. Lima","doi":"10.1109/ICCEE.2009.238","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.238","url":null,"abstract":"The paper describes a computational system that is composed of a special-purpose processor augmented by an application-targeted coprocessor with variable instruction set. The primary objective is to form the processor architecture in such a way that is the most appropriate to a selected scope of applications and to optimize instructions of the coprocessor for a particular application. As an example the scope of combinatorial search algorithms was examined and experiments were carried out and analyzed with the relevant system implemented in FPGAs.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131262842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Managing Malware in Higher Learning Institutions 高校恶意软件管理
2009 Second International Conference on Computer and Electrical Engineering Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.93
Z. Ismail, Christine Simfukwe
{"title":"Managing Malware in Higher Learning Institutions","authors":"Z. Ismail, Christine Simfukwe","doi":"10.1109/ICCEE.2009.93","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.93","url":null,"abstract":"\"Malware\" is an umbrella term that describes a variety of Internet-borne threats, including viruses, spyware,Trojan horses, spam, bots and more. This sophisticated and evolving security threat puts all businesses at risk, no matter how big or small. Malware creates unique challenges to Higher Learning Institutions (HLI) in protecting their information assets. This is largely due to the fact that HLI Information Technology (IT) departments must balance between enabling a highly collaborative, non-restrictive environment and ensuring the confidentiality, integrity, and availability of data and computing resources. HLIs can proactively defend the network to reduce the risks associated with this threat by assessing the vulnerabilities and threats present in their networks and implementing appropriate multilayer security. A multilayer approach involves applying countermeasures at every layer of the computer network, from the perimeter routers and firewalls to users' personal computers in order to increase network security. The goal of this study is to propose a framework for network security protection against malware to increase the level of protection using non technical countermeasures.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124107685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信