Y. Soufi, T. Bahi, Mohamed Faouzi Harkat, H. Merabet
{"title":"Diagnosis and Detection of Short-Circuit in a Three-Phase Induction Machine","authors":"Y. Soufi, T. Bahi, Mohamed Faouzi Harkat, H. Merabet","doi":"10.1109/ICCEE.2009.113","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.113","url":null,"abstract":"Due to its simple construction, low cost, manufacture, and its robustness. The use of induction motors is rapidly and increasingly growing in the industry especially in highly important sectors. This leads us to a serious focus on their operation and their availability. The early detection for motor deterioration can increase plant availability and safety in economical way, help to avoid expensive failures, reduce coasts and the fault number. Many publications have investigated the detection and diagnosis of short circuit fault in electrical machines supplied directly online. This paper presents a technique based on spectral analysis of stator currents to detect short-circuit fault in the stator using a mathematical model of three-phase squirrel cage induction motor under stator short-circuit fault. The simulation show the impact and the effectiveness of failure. The tests are validated by numerical simulation and the obtained results clearly show the possibility of extracting signatures to detect and locate faults.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130602639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reference Point and Orientation Detection of Fingerprints","authors":"S. Mohammadi, A. Farajzadeh","doi":"10.1109/ICCEE.2009.153","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.153","url":null,"abstract":"In this paper we suggest a novel approach for detection of a unique reference point and computation of a unique reference orientation of fingerprints for feature extraction in polar coordinates. After finding orientation field of the fingerprint the curvature measurement is done on the result. By using this information it is possible to determine the exact location of the singular points. Based on this information finally the reference point and reference orientation will be obtained. The proposed method is of high accuracy and performance and at the meantime tolerates displacement and rotation of the input fingerprint. This can be applied to all classes of fingerprints especially to problematic arch class ones.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130182192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reactive Power Compensation in Order to Improve Static Voltage Stability in a Network with Wind Generation","authors":"Mostafa Eidiani, Yasser Ashkhane, M. Khederzadeh","doi":"10.1109/ICCEE.2009.239","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.239","url":null,"abstract":"The most important requirement of a power system for maintaining desired voltage profile and voltage stability is the existence of sufficient amount of reactive power reserve in the proper location of the power system. The requirement to locally generate reactive power, has made determining the installation point to be a requirement. In this paper some methods for identification of critical buses in power system are studied and results obtained from applying different compensateion methods on a test system are presented. In addition, the effect of application of wind generation on static voltage stability of the power system, are studied.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130986422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Power Generating System for Mobile Electronic Devices Using Human Walking Motion","authors":"R. Baghbani, M. Ashoorirad","doi":"10.1109/ICCEE.2009.58","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.58","url":null,"abstract":"In the design of mobile electronics, power is one of the most difficult restrictions to overcome; and current trends indicate this will continue to be an issue in the future. Consumer electronic equipments are becoming small, portable devices that provide users with a wide range of functionality, from communication to music playing. The battery technology and the power consumption of the device limit the size, weight and autonomous lifetime. One promising alternative to batteries is to use parasitic energy dissipated in the movement of the wearer of device to power it. In this paper we designed a system included a rotary arm extending down from the sole, which ultimately drove the small electrical generator through a stepped-up gearbox. A one- way clutch mechanism was used to transmit torque to the gearbox. This allowed for additional spin following the initial impact of a step, also preventing lockup due to rotary inertia in the gears. The entire generator system was designed to fit in the heel of a standard running shoe, with the rotary arm compressing once during each heel strike.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128211207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advanced Encryption Standard Implemented on FPGA","authors":"Sujatha Hiremath, M. Suma","doi":"10.1109/ICCEE.2009.231","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.231","url":null,"abstract":"Advanced Encryption Standard (AES), a Federal Information Processing Standard (FIPS), and categorized as Computer Security Standard. The AES algorithm is a block cipher that can encrypt and decrypt digital information. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits. The Rijndael cipher has been selected as the official Advanced Encryption Standard (AES) and it is well suited for hardware. This paper talks of AES 128 bit block and 128 bit cipher key and is implemented on Spartan 3 FPGA. Synthesis results in the use of 2509 slices, 712 Flip flops, and 4762- 4 input Look Up Tables. The design target is optimization of speed and cost.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124640291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Force Sensing Resistor (FSR) in Design of Pressure Scanning System for Plantar Pressure Measurement","authors":"N. K. Rana","doi":"10.1109/ICCEE.2009.234","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.234","url":null,"abstract":"This paper aims at development of low cost dynamic foot pressure scanner. To estimate the peak pressure points on the foot sole, a study was conducted on a healthy male group. In all, 8 subjects were placed for observation on EMED (from Novel Inc.) foot mat system at different clinics. The data, thus recorded, was analyzed using Novel-Win-Mask software and it is concluded that, on a single pressure head for a normal person, the deviation from mean value is not too much. Hence in case of a normal foot, the peak pressure points are heel, 1st, 3rd, 5th Meta tarsal head (MTH) and toe. Although 5 points for plantar pressure analysis look sufficient but one can add few more points to provide a complete coverage of pressure distribution on shoe sole. Using this data, shoe sole of different sizes were developed with 8 force sensing resistors (FSR) placed in each sole. The sole was connected to multi-channel Biopac MP100 data acquisition system (DAS) through an amplifier circuit. The USB interface is provided between DAS and the computer system. The data recording and analysis was performed using data acquisition software Acq. 3.7.3. The developed system is flexible and portable for field studies and also advantageous due to large memory size, dynamic recording of pressure and no fear of foot step modification. The data analysis can provide early information regarding diabetic foot ulceration and also could be used for shoe sole design.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126877126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Student Project Allocation with Preference Lists over (Student, Project) Pairs","authors":"Ahmed H. Abu El-Atta, M. Moussa","doi":"10.1109/ICCEE.2009.63","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.63","url":null,"abstract":"Student project allocations models (SPA) in which lecturers have preferences over students (projects) have been studied in [2, 3]. We present new method to construct a general student project allocation model (SPA-(s, p)) in which the lecturers have preference lists over pairs (student, project), and the students have preference lists over projects. SPA-(s, p) is turned out to be very useful in combination between the student project allocation models with preference lists over students (or projects). Our model proposes several ways to construct the lecturer's preference lists which give us higher efficiency and accurate results. Furthermore, we present algorithmic issues for SPA-(s, p), the algorithm yields a stable matching of students to projects, which respects the preference lists and capacity constraints.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122502886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New System Design of Network Invasion Forensics","authors":"Hou Ming, Lizhong Shen","doi":"10.1109/ICCEE.2009.257","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.257","url":null,"abstract":"With the development and progress of science and technology, human are coming into information society, the data safety problem which is brought by rapid development of computer technology has become an outstanding problem. A system structure model of network invasion forensics is designed in this text. The model analyze the invasion detecting, at the mean time, collect all network data of target system to support network forensics, realizing on-line invasion detecting, off-line forensics analysis. This text elaborates the system architecture of model and discusses the model characteristics and existing problem.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122551796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring Integral Image Word Length Reduction Techniques for SURF Detector","authors":"Shoaib Ehsan, K. Mcdonald-Maier","doi":"10.1109/ICCEE.2009.138","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.138","url":null,"abstract":"Speeded Up Robust Features (SURF) is a state of the art computer vision algorithm that relies on integral image representation for performing fast detection and description of image features that are scale and rotation invariant. Integral image representation, however, has major draw back of large binary word length that leads to substantial increase in memory size. When designing a dedicated hardware to achieve real-time performance for the SURF algorithm, it is imperative to consider the adverse effects of integral image on memory size, bus width and computational resources. With the objective of minimizing hardware resources, this paper presents a novel implementation concept of a reduced word length integral image based SURF detector. It evaluates two existing word length reduction techniques for the particular case of SURF detector and extends one of these to achieve more reduction in word length. This paper also introduces a novel method to achieve integral image word length reduction for SURF detector.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126689924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ID Based Signature Schemes for Electronic Voting","authors":"T. Menon, R. Sindhuja","doi":"10.1109/ICCEE.2009.123","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.123","url":null,"abstract":"Electronic voting is being used increasingly in several areas of work. The existing protocols and systems for voting are fraught with difficulties and flaws, which allow malicious users to tamper with the votes. Votes have to be unforgeable, anonymous and verifiable. In this paper, we suggest the use of 2 ID-Based signatures for an e-voting system. We describe a designated verifier ring signature, which will ensure both the security of the vote, as well as voter anonymity. In order for the voter to check if his/her vote has been taken into account, we provide a receipt for the voter, from the voting authority, using a new ID-Based designated verifier signature. The receipt will not allow the voter to reveal their vote to someone else, thus ensuring the security of the voter.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"52 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113983179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}