{"title":"A Model for Greener Power Generation for NE Sri Lanka","authors":"R. Davidrajuh, D. Velauthapillai","doi":"10.1109/ICCEE.2008.120","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.120","url":null,"abstract":"This paper presents a model for greener power generation to satisfy electricity needs of North-east Sri Lanka (NE-SL). With the absence of indigenous fossil fuel and large-scale hydrologic resources, NE-SL depends on the import of fossil fuel for electricity generation, causing economic and environmental hardships. This paper explores a sustainable power generation using a mix of renewable energy resources.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133592863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Ontology Based Resource Scheduling Scheme in Grids","authors":"H. Vahdat-Nejad, N. Nematbakhsh","doi":"10.1109/ICCEE.2008.178","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.178","url":null,"abstract":"Traditional schedulers in the grid environment do not support semantic description of grid resources and jobs. They do exact matching between resource requesters and providers. These mechanisms are too restrictive because there is no prior agreement on how a resource or a service or a job will be represented. In this paper, we propose an extensible scheduler that uses the semantic description of entities related to scheduling. More precisely, the scheduler uses the semantic description of resources and jobs by means of ontology. Furthermore, it exploits a semantic matching scheme to perform scheduling. Experimental results show the feasibility and effectiveness of the proposed scheduler.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132786747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Color Mining Based Customer Oriented Coloring Pipeline of Coloring Scheme for Efficient City Design","authors":"S. Chin, Jinsoo Oh","doi":"10.1109/ICCEE.2008.151","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.151","url":null,"abstract":"The research conducted in this paper is to present coloring pipeline of coloring scheme for city design. Coloring pipeline consists of coloring DB acquired from color guideline, image DB collected from real scenes, 3D models and a simulator of coloring scheme. Color scheming supporting system allows customers to simulate harmonized coloring schemes for city design without a particular knowledge of color theory as providing a dominant color and sub-colors automatically, in which it reduces processing cost. In addition, the system provides interactivity in which customers manipulate 3D simulated scenes by rotating, zooming and navigating. The experimental results are presented.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114202017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"2DPCA Feature Selection Using Mutual Information","authors":"P. Sanguansat","doi":"10.1109/ICCEE.2008.98","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.98","url":null,"abstract":"In two-dimensional principal component analysis (2DPCA), 2D face image matrices do not need to be previously transformed into a vector. In this way, the image covariance matrix can be better estimated, compared to the old fashion. The feature is derived from eigenvectors corresponding to the largest eigenvalues of the image covariance matrix for data of all classes. Normally, the number of the largest eigenvalues is selected manually for obtaining the optimal feature matrix. In this paper, we propose a novel method for feature selection in 2DPCA, based on mutual information concept for automatically selecting the number of the largest eigenvalues. The non-parametric quadratic mutual information between class labels and features is used as a selection criterion. This does not only allows reducing of the dimension of feature matrix but also obtaining the good recognition accuracy. Experimental results on Yale face database showed an efficient of our proposed method.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132814537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-Time Detection of Vehicles for Advanced Traffic Signal Control","authors":"C. Han, Qinyu Zhang","doi":"10.1109/ICCEE.2008.126","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.126","url":null,"abstract":"Vehicle detection by video cameras is one of the most promising new technologies for wireless large-scale data collection and implementation of advanced traffic control and management schemes such as vehicle guidance/navigation. In this paper we propose an approach to detect and count vehicles at an intersection in real-time, using a fixed camera. After identifying moving objects images via background frame differencing, edge detection, erosion and dilation operations are performed to suppress noise. Separated and rotated properly, the denoised binary image is then used to generate a vertical projection histogram from which information about the size and coordinates of each component is utilized to compute the number of vehicles. This detection algorithm gives an approximate number of vehicles. An adaptive traffic signal control strategy controls the traffic flow. The simulating results show a great efficiency of traffic control and management scheme in practice.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125465357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Continuously Sintering Furnace Temperature Control System Based on Intelligent PID Adjustment","authors":"Shukun Cao, Lei Shi, X. Ze, Heng Zhang","doi":"10.1109/ICCEE.2008.195","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.195","url":null,"abstract":"To meet the demands of temperature control accuracy in continuously sintering furnace with multiple hearths, this system was constituted with PC, XMT624 and solid state relay for temperature field control. According to the characteristics of heating process, temperature inertia, lag of sintering furnace, adopted intelligent PID algorithm to achieve the large-scale temperature adjustments, it overcomes the limitation of traditional PID control. Through online setting intelligent instrument unit realtimely, the system achieves the target of temperature control accuracy in 2degC per thousand centigrade.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125888039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Key Management Scheme for Query Based Routing in Sensor Networks","authors":"S. Moon, H. Lee, T. Cho","doi":"10.1109/ICCEE.2008.139","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.139","url":null,"abstract":"Wireless sensor networks (WSN) are emerging technologies that enable various applications including tracking, monitoring and control. Because of ad-hoc, wireless communication and limitation of resources, much vulnerability arises. In false report injection attacks, an attacker tries to confuse a user or deplete energy resource of sensor nodes by injecting false reports through compromised nodes. One of countermeasures to the attacks is the commutative cipher based en-route filtering (CCEF). In CCEF, if a cluster header (CH) is compromised, false reports injected through it always reach the base station (BS).To solve the problem, we propose the key management scheme for query based routing in sensor networks. In the proposed scheme, a CH can not derive the session key without help of its neighbor nodes and let false reports reach the BS. We confirmed the effectiveness of the proposed scheme in terms of en-route filtering capability.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127317426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling of Ballistic Carbon Nanotube Transistors by Neural Space Mapping","authors":"R. Yousefi, K. Saghafi","doi":"10.1109/ICCEE.2008.123","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.123","url":null,"abstract":"In this paper we present a neural space mapping (NSM) SPICE-compatible modeling technique for carbon nanotubes in their ballistic limit. We modified conventional MOSFET equations and used NSM concept in order to correct these equations in the manner that to be usable to carbon nanotube transistors. We used Fettoy model (which is applicable to MOSCNT structures) to compare accuracy. We have shown that our model has reasonable accuracy at different biases and physical parameters.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130490288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Low Complexity Fast Inter Prediction Algorithm for H.264/AVC","authors":"K. Bharanitharan, Bin-Da Liu, J.-F. Yang","doi":"10.1109/ICCEE.2008.165","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.165","url":null,"abstract":"The MPEG-4 H.264/AVC video coding standard adopts variable block sizes for inter frame coding to increase compression efficiency. However, to achieve this, the H.264 encoder employs a complex mode decision technique based on rate-distortion optimization (RDO) that requires high computational complexity, which significantly increases the encoder complexity. This paper proposes a fast hierarchal cross differences (HCD) algorithm that analyzes the spatial and temporal homogeneity of the block by using cross differences to reduces the number of modes that are required for RDO calculation in inter mode decision. The experimental results show that the proposed method is able to reduce complexity by up to 45% on average with negligible degradation in subjective and objective quality.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"523 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124488023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User Authentication Using Combination of Behavioral Biometrics over the Touchpad Acting Like Touch Screen of Mobile Device","authors":"H. Saevanee, Pattarasinee Bhatarakosol","doi":"10.1109/ICCEE.2008.157","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.157","url":null,"abstract":"Now mobile devices are developed to serve various functions, storing the sensitive information. In order to protect those information and mobile systems from unauthorized users, the authentication system must be installed unavoidably. Additionally, the development of the mobile system is moving forward to the touch screen system for user friendly and quick access mechanism. In this paper, we proposed behavioral manners of users over the touchpad acting like touch screen that is able to detect the finger pressure. These behaviors are keystroke dynamics and the finger pressure. The finding has shown that, the finger pressure gives the discriminative information more than keystroke dynamics with the k-NN analytical method. Moreover, using only the finger pressure produces high accuracy rate of 99%.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124570302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}