2008 International Conference on Computer and Electrical Engineering最新文献

筛选
英文 中文
Chain Rule Protection over the Internet Using PUGGAD Algorithm 基于PUGGAD算法的互联网链式规则保护
2008 International Conference on Computer and Electrical Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.153
V. Suttichaya, P. Bhattarakosol
{"title":"Chain Rule Protection over the Internet Using PUGGAD Algorithm","authors":"V. Suttichaya, P. Bhattarakosol","doi":"10.1109/ICCEE.2008.153","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.153","url":null,"abstract":"Since data is a vital resource that must be transferred over the Internet, the security issue of this resource must be considered seriously. There are various methods have been proposed by researchers; some of them have been implemented, such as DES and AES. However, those methods have some limitations that allow the plaintext to be unsaved from any threats while it was transferring over the Internet. Nevertheless, one perfect cipher method called one-time pad (OTP) had been proposed. Unfortunately, it has never been implemented in the real application according to the length of the key and the randomness problem. Thus, this paper proposed a method called the PUGGAD, or the Pad/functional key algorithm for General encrypt/Decrypt, to encrypt all types of plaintexts before sending across the Internet to its destination, both in binary mode and text mode. This method is implemented based on the OTP concept except that all complications of OTP have been pulled over. Additionally, the PUGGAD algorithm is the chain rule protection process where a plaintext must be split into an individual block size before the encryption process starts. Thus, obtaining only some blocks of the ciphertext over the Internet under the PUGGAD protection mechanism, hackers cannot decrypt back to the original plaintext as same as other protection methods.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121668470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using Degree-Based Strategy for Network Coding in Content Distribution Network 基于度的内容分发网络编码策略
2008 International Conference on Computer and Electrical Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.20
Tingyi Li, Jinlin Wang, Jiali You
{"title":"Using Degree-Based Strategy for Network Coding in Content Distribution Network","authors":"Tingyi Li, Jinlin Wang, Jiali You","doi":"10.1109/ICCEE.2008.20","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.20","url":null,"abstract":"In a content distribution network based on overlay networks, the peer's upload bandwidth is always constrained. To optimize the system performance, one problem is how to assign the upload capacity to the right neighbors for transferring data blocks. In a system using network coding technology, a strategy which is to select the right neighbors based upon the degrees of them is proposed. The selection probability of each neighbor is determined by its degree. After. this strategy is applied, the utilization of network is improved, and the distribution progress is shortened. From the simulation, we found that the performance of content distribution is obviously better than the baseline system on three metrics, including maximum finish time, average finish time and standard deviation.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125620641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Induction Heating Power Supply Temperature Control Based on a Novel Fuzzy Controller 基于新型模糊控制器的感应加热电源温度控制
2008 International Conference on Computer and Electrical Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.64
Yiwang Wang, Fengwen Cao
{"title":"Induction Heating Power Supply Temperature Control Based on a Novel Fuzzy Controller","authors":"Yiwang Wang, Fengwen Cao","doi":"10.1109/ICCEE.2008.64","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.64","url":null,"abstract":"This paper introduces a kind of novel fuzzy controller for induction heating temperature control. The working principle and the configuration of the control system are analyzed in detail. A complete simulation model of the induction heating system is obtained by MATLAB/SIMULINK software. The results of the simulation are presented and showed the effectiveness and superiority of this temperature control system.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115141041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A New Technique for Improving the Power Quality in Power Transformers by FPGA 利用FPGA提高电力变压器电能质量的新技术
2008 International Conference on Computer and Electrical Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.111
P. Kumar, K. Anjaneyulu, T. M. Krishna
{"title":"A New Technique for Improving the Power Quality in Power Transformers by FPGA","authors":"P. Kumar, K. Anjaneyulu, T. M. Krishna","doi":"10.1109/ICCEE.2008.111","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.111","url":null,"abstract":"Maintenance of good quality of power supply is essential for reliability and stability of power system. The effects due to power transformer switching and the transient effects are investigated in this paper. The DWT based techniques are suggested in the past to analyze the transient effects and to respond at a faster rate to improve the quality of power system and its protection. These measures were though efficient in providing better solution but found to be high resource consuming under remote applications. This high resource consumption results in slower response and reduces the reliability in power system. A FPGA based DWT architecture is suggested to improve the efficiency of estimation and response in the power system. The Field Programmable Gate Arrays (FPGA) based DWT architecture is evaluated with theoretical results from MATLAB and were observed to be meeting the accuracy of estimation.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127729494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Precision and Compact Dynamic Bending Tester 精密紧凑动态弯曲试验机
2008 International Conference on Computer and Electrical Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.117
K. Maru, Y. Fujii
{"title":"Precision and Compact Dynamic Bending Tester","authors":"K. Maru, Y. Fujii","doi":"10.1109/ICCEE.2008.117","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.117","url":null,"abstract":"A method for precision force measurement by using the levitation mass method (LMM) is reviewed. In this method, a mass levitated using a pneumatic linear bearing with sufficiently small friction is made to collide with the object being tested, and the instantaneous value of the impact force is measured as the inertial force acting on the mass. The velocity and acceleration of the mass are measured using an optical interferometer. With this method, the relative combined standard uncertainty is estimated to be very small. The prospects for reducing the size and cost of the optical interferometer are also discussed.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132699762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A 3 Levels Image Segmentation with Integrated Objects and Local Information 基于目标和局部信息的三级图像分割
2008 International Conference on Computer and Electrical Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.13
L. Sheng, Z. Gong, Zhenhua Chen, Shen Long
{"title":"A 3 Levels Image Segmentation with Integrated Objects and Local Information","authors":"L. Sheng, Z. Gong, Zhenhua Chen, Shen Long","doi":"10.1109/ICCEE.2008.13","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.13","url":null,"abstract":"This paper introduces a new integrated method for segmenting image which imitates the human observing mechanism. Human firstly pays attention to large objects, then some details, and lastly the concerned details. At the first stage of the algorithm discontinuous edges are detected in the original image, then cut equidistantly to some segmentations, and the end points of segmentations are gathered into a points set. At the second stage a constrained Delaunay triangulation is yielded from the points set and then a graph is attained too. Graph cut algorithm such as minimum spanning tree (MST), is then performed to assemble triangles into regions. At the last stage, the obtained regions are projected into the original image and region boundaries are refined by snake model. Experimental results show that edges are accurate, and a good spatial coherence is attained.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134519978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Steganographic Approach by Using Session Based Stego-Key, Genetic Algorithm and Variable Bit Replacement Technique 基于会话隐写密钥、遗传算法和可变比特替换技术的隐写方法
2008 International Conference on Computer and Electrical Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.108
T. Bhattacharya, S. Bhowmik, S. Chaudhuri
{"title":"A Steganographic Approach by Using Session Based Stego-Key, Genetic Algorithm and Variable Bit Replacement Technique","authors":"T. Bhattacharya, S. Bhowmik, S. Chaudhuri","doi":"10.1109/ICCEE.2008.108","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.108","url":null,"abstract":"This paper presents a new approach of steganography. The secret image is firstly perturbed by Stego-Key (SK) and again perturbed by a genetically generated, good, session based transposition operator (TO). In the next step this perturbed secret image is embedded within the host image by variable bit replacement using a hash function. At the time of extraction of secret image firstly perturbed image is extracted then by reverse engineering with the session based TO and SK the secret image is obtained.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"365 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114501361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Modeling of Equipment Maintenance Support System Domain Library and its Application in HLA Simulation System 装备维修保障系统领域库建模及其在HLA仿真系统中的应用
2008 International Conference on Computer and Electrical Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.182
C. Qu, Liu Zhang, Yongli Yu, Songshan Wang
{"title":"Modeling of Equipment Maintenance Support System Domain Library and its Application in HLA Simulation System","authors":"C. Qu, Liu Zhang, Yongli Yu, Songshan Wang","doi":"10.1109/ICCEE.2008.182","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.182","url":null,"abstract":"Applying domain engineering, the equipment maintenance support system is analyzed and the essential entities are abstracted. Using the executable specification tool-ExSpect, a domain library is constructed, including maintenance organization module, distribution stock module, transport unit module and management department module. By constructing the simulation Object Model (SOM) and the Interface with Run-Time Infrastructure (RTI), the modules are applied on the High Level Architecture (HLA).","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123386943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Approach to Motion Vector Estimation 一种新的运动矢量估计方法
2008 International Conference on Computer and Electrical Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.177
H. Ebrahimi, A. Nilchi, H. Vahdat-Nejad
{"title":"A New Approach to Motion Vector Estimation","authors":"H. Ebrahimi, A. Nilchi, H. Vahdat-Nejad","doi":"10.1109/ICCEE.2008.177","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.177","url":null,"abstract":"Block matching has been widely used for block motion estimation; however most of the block matching algorithms impose heavy computational load to the system, and require much time for execution. This problem prevents using them in time critical applications. In this paper, a new approach to block matching technique is presented, which has small computational complexity as well as high accuracy. The main assumption of the algorithm is that, all the pixels of a block move equally by a linear motion. Experimental results show the feasibility and effectiveness of the proposed algorithm.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126503659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Task Assignment for Heterogeneous Multiprocessors Using Re-Excited Particle Swarm Optimization 基于重激励粒子群优化的异构多处理器任务分配
2008 International Conference on Computer and Electrical Engineering Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.41
Mohamed B. Abdelhalim
{"title":"Task Assignment for Heterogeneous Multiprocessors Using Re-Excited Particle Swarm Optimization","authors":"Mohamed B. Abdelhalim","doi":"10.1109/ICCEE.2008.41","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.41","url":null,"abstract":"The problem of determining whether a set of periodic tasks can be assigned to a set of heterogeneous processors in such a way that all timing constraints are met has been shown, in general, to be NP-hard. This paper presents a modified algorithm based on the Particle Swarm Optimization (PSO) heuristic for solving this problem. The modified version is called Re-Excited PSO. Experimental results show that our approach outperform the major existing methods. In addition to being able to search for a feasible assignment solution, our PSO approach can further optimize the solution to reduce its energy consumption as well as to obtain good tradeoff between minimizing the design makespan as well as energy consumption.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129701132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信