2009 Second International Conference on Computer and Electrical Engineering最新文献

筛选
英文 中文
GLS Optimization Algorithm for Solving Travelling Salesman Problem 求解旅行商问题的GLS优化算法
2009 Second International Conference on Computer and Electrical Engineering Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.102
Nourolhoda Alemi Neissi, M. Mazloom
{"title":"GLS Optimization Algorithm for Solving Travelling Salesman Problem","authors":"Nourolhoda Alemi Neissi, M. Mazloom","doi":"10.1109/ICCEE.2009.102","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.102","url":null,"abstract":"Travelling salesman problem (TSP) is well known as one of the combinatorial optimization problems. There are many approaches for finding solution to the TSP. In this paper we used combination of local search heuristics and genetic algorithm (GLS) that has been shown to be an efficient algorithm for finding near optimal to the TSP. We also evaluate the run time behavior and fitness of our approach and compare it with other methods. A reasonable result is obtained and the proposed algorithm is able to get to a better solution in less time.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117133379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Surge control of natural gas centrifugal compressor 天然气离心式压缩机喘振控制
2009 Second International Conference on Computer and Electrical Engineering Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.112
D. Mudroncík, P. Tanuška, Martin Galik
{"title":"Surge control of natural gas centrifugal compressor","authors":"D. Mudroncík, P. Tanuška, Martin Galik","doi":"10.1109/ICCEE.2009.112","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.112","url":null,"abstract":"The paper presents the design of control system for centrifugal compressor surge avoidance. The presented solution of the surge problem is illustrated on an example of real application.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115009263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Power Amplifiers Linearization Based on Digital Predistortion with Memory Effects 基于记忆效应的数字预失真功率放大器线性化
2009 Second International Conference on Computer and Electrical Engineering Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.141
A. Barahimi, S. Mirzakuchaki, Saeid Karami
{"title":"Power Amplifiers Linearization Based on Digital Predistortion with Memory Effects","authors":"A. Barahimi, S. Mirzakuchaki, Saeid Karami","doi":"10.1109/ICCEE.2009.141","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.141","url":null,"abstract":"Power amplifiers require linearization in order to reduce adjacent inter-modulation distortion without losing efficiency. Digital predistortion is a cost effective method to achieve this goal and it needs an accurate model of the amplifier. Most of the amplifier models are based on memoryless modeling. This kind of modeling is simple but it’s not accurate enough if linearization is important; and also for wide band modulations like QAM, we should consider the memory effects of power amplifiers.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124744701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Text Steganography System Using Font Color of the Invisible Characters in Microsoft Word Documents 一种利用Microsoft Word文档中不可见字符字体颜色的文本隐写系统
2009 Second International Conference on Computer and Electrical Engineering Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.127
Md. Khairullah
{"title":"A Novel Text Steganography System Using Font Color of the Invisible Characters in Microsoft Word Documents","authors":"Md. Khairullah","doi":"10.1109/ICCEE.2009.127","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.127","url":null,"abstract":"Steganography can be defined as a method of hiding data within a cover media so that other individuals fail to realize their existence. Image, audio and video are some popular media for steganography. But text is ideal for steganography due to its ubiquity and smaller size compared to these media. However, text communication channels do not necessarily provide sufficient redundancy for covert communication. In this paper, a new approach for steganography in Microsoft Word documents is proposed. The main idea is that setting any foreground color for invisible characters such as the space or the carriage return is not reflected or viewed in the document.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124822691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Student Project Allocation with Preference Lists over (Student, Project) Pairs 学生专题分配偏好列表超过(学生,专题)对
2009 Second International Conference on Computer and Electrical Engineering Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.63
Ahmed H. Abu El-Atta, M. Moussa
{"title":"Student Project Allocation with Preference Lists over (Student, Project) Pairs","authors":"Ahmed H. Abu El-Atta, M. Moussa","doi":"10.1109/ICCEE.2009.63","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.63","url":null,"abstract":"Student project allocations models (SPA) in which lecturers have preferences over students (projects) have been studied in [2, 3]. We present new method to construct a general student project allocation model (SPA-(s, p)) in which the lecturers have preference lists over pairs (student, project), and the students have preference lists over projects. SPA-(s, p) is turned out to be very useful in combination between the student project allocation models with preference lists over students (or projects). Our model proposes several ways to construct the lecturer's preference lists which give us higher efficiency and accurate results. Furthermore, we present algorithmic issues for SPA-(s, p), the algorithm yields a stable matching of students to projects, which respects the preference lists and capacity constraints.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122502886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
A New System Design of Network Invasion Forensics 网络入侵取证新系统设计
2009 Second International Conference on Computer and Electrical Engineering Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.257
Hou Ming, Lizhong Shen
{"title":"A New System Design of Network Invasion Forensics","authors":"Hou Ming, Lizhong Shen","doi":"10.1109/ICCEE.2009.257","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.257","url":null,"abstract":"With the development and progress of science and technology, human are coming into information society, the data safety problem which is brought by rapid development of computer technology has become an outstanding problem. A system structure model of network invasion forensics is designed in this text. The model analyze the invasion detecting, at the mean time, collect all network data of target system to support network forensics, realizing on-line invasion detecting, off-line forensics analysis. This text elaborates the system architecture of model and discusses the model characteristics and existing problem.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122551796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Parallelizing Motion JPEG 2000 with CUDA 并行运动JPEG 2000与CUDA
2009 Second International Conference on Computer and Electrical Engineering Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.277
S. Datla, Naga Sathish Gidijala
{"title":"Parallelizing Motion JPEG 2000 with CUDA","authors":"S. Datla, Naga Sathish Gidijala","doi":"10.1109/ICCEE.2009.277","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.277","url":null,"abstract":"Due to the rapid growth of Graphics Processing Unit (GPU) processing capability, using GPU as a coprocessor for assisting the CPU in computing massive data has become indispensable. Nvidia’s CUDA general-purpose graphical processing unit (GPGPU) architecture can greatly benefit single instruction multiple thread (SIMT) styled, computationally expensive programs. Video encoding, to an extent, is an excellent example of such an application which can see impressive performance gains from CUDA optimization. This paper details the experience of porting the motion JPEG 2000 reference encoder to the CUDA architecture. Each major structural/computational unit of JPEG 2000 is discussed in the CUDA framework and the results are provided wherever required. Our experimental results demonstrate that the CUDA based implementation works 20.7 times faster than the original implementation on the CPU.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124165793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Reference Point and Orientation Detection of Fingerprints 指纹参考点和方向检测
2009 Second International Conference on Computer and Electrical Engineering Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.153
S. Mohammadi, A. Farajzadeh
{"title":"Reference Point and Orientation Detection of Fingerprints","authors":"S. Mohammadi, A. Farajzadeh","doi":"10.1109/ICCEE.2009.153","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.153","url":null,"abstract":"In this paper we suggest a novel approach for detection of a unique reference point and computation of a unique reference orientation of fingerprints for feature extraction in polar coordinates. After finding orientation field of the fingerprint the curvature measurement is done on the result. By using this information it is possible to determine the exact location of the singular points. Based on this information finally the reference point and reference orientation will be obtained. The proposed method is of high accuracy and performance and at the meantime tolerates displacement and rotation of the input fingerprint. This can be applied to all classes of fingerprints especially to problematic arch class ones.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130182192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Advanced Encryption Standard Implemented on FPGA 基于FPGA实现的高级加密标准
2009 Second International Conference on Computer and Electrical Engineering Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.231
Sujatha Hiremath, M. Suma
{"title":"Advanced Encryption Standard Implemented on FPGA","authors":"Sujatha Hiremath, M. Suma","doi":"10.1109/ICCEE.2009.231","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.231","url":null,"abstract":"Advanced Encryption Standard (AES), a Federal Information Processing Standard (FIPS), and categorized as Computer Security Standard. The AES algorithm is a block cipher that can encrypt and decrypt digital information. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits. The Rijndael cipher has been selected as the official Advanced Encryption Standard (AES) and it is well suited for hardware. This paper talks of AES 128 bit block and 128 bit cipher key and is implemented on Spartan 3 FPGA. Synthesis results in the use of 2509 slices, 712 Flip flops, and 4762- 4 input Look Up Tables. The design target is optimization of speed and cost.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124640291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Diagnosis and Detection of Short-Circuit in a Three-Phase Induction Machine 三相感应电机短路的诊断与检测
2009 Second International Conference on Computer and Electrical Engineering Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.113
Y. Soufi, T. Bahi, Mohamed Faouzi Harkat, H. Merabet
{"title":"Diagnosis and Detection of Short-Circuit in a Three-Phase Induction Machine","authors":"Y. Soufi, T. Bahi, Mohamed Faouzi Harkat, H. Merabet","doi":"10.1109/ICCEE.2009.113","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.113","url":null,"abstract":"Due to its simple construction, low cost, manufacture, and its robustness. The use of induction motors is rapidly and increasingly growing in the industry especially in highly important sectors. This leads us to a serious focus on their operation and their availability. The early detection for motor deterioration can increase plant availability and safety in economical way, help to avoid expensive failures, reduce coasts and the fault number. Many publications have investigated the detection and diagnosis of short circuit fault in electrical machines supplied directly online. This paper presents a technique based on spectral analysis of stator currents to detect short-circuit fault in the stator using a mathematical model of three-phase squirrel cage induction motor under stator short-circuit fault. The simulation show the impact and the effectiveness of failure. The tests are validated by numerical simulation and the obtained results clearly show the possibility of extracting signatures to detect and locate faults.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130602639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信