首页 > 最新文献

2008 IEEE International Multitopic Conference最新文献

英文 中文
Per Packet Authentication for IEEE 802.11 wireless LAN IEEE 802.11无线局域网的逐包认证
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777737
Muhammad Junaid, M. Akbar, M. Mufti
Wireless Networks call for enhanced confidentiality, integrity and authenticaton services because of their inherent weakness of ubiquitous signals. Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP) has been recently employed to provide security to IEEE 802.11 Wireless LANs. It has been shown in our earlier published work that CCMP is vulnerable to Time Memory Trade off (TMTO) attack. To overcome the said vulnerability, this paper presents a design and description of strengthening the security of WLAN packets using Per-Packet security mechanism. The architecture of Per-Packet security mechanism involves introduction of Per-Packet Authentication and Secret Nonce. The proposed Per-Packet Authentication protocol is a continuous challenge response process operating throughout the session. The Per-Packet authentication promptly secures the connection against unauthorized access by immediately discarding the packet if Per-Packet Authentication fails. We have proposed to derive the Nonce from the session key and keep it secret. Since the nonce is unique and secret, it provides freshness and unpredictability. The freshness provides protection against replay attacks, the unpredictability of Nonce prevents pre-computation attack. Same Nonce is used as a challenge-text from authenticator to supplicant. Per packet Security mechanism strengthens the security of authentication mechanism and counter mode operation irrespective of the security of causal encryption algorithm.
无线网络要求增强保密性、完整性和认证服务,因为其固有的弱点无处不在的信号。计数器模式密码块链消息认证码协议(CCMP)最近被用于为IEEE 802.11无线局域网提供安全性。我们之前发表的研究表明,CCMP容易受到时间记忆交换(TMTO)攻击。为了克服上述漏洞,本文提出了一种利用逐包安全机制加强无线局域网数据包安全性的设计和描述。逐包安全机制的体系结构包括引入逐包认证和秘密密码。提出的逐包认证协议是一个在整个会话中持续运行的质询响应过程。如果Per-Packet authentication失败,则立即丢弃报文,以确保连接不被非法访问。我们建议从会话密钥派生Nonce并对其保密。由于nonce是独特而神秘的,它提供了新鲜感和不可预测性。新鲜度提供了对重放攻击的保护,Nonce的不可预测性防止了预计算攻击。相同的Nonce用作验证者向请求者发送的质询文本。单包安全机制不考虑因果加密算法的安全性,加强了认证机制和反模式操作的安全性。
{"title":"Per Packet Authentication for IEEE 802.11 wireless LAN","authors":"Muhammad Junaid, M. Akbar, M. Mufti","doi":"10.1109/INMIC.2008.4777737","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777737","url":null,"abstract":"Wireless Networks call for enhanced confidentiality, integrity and authenticaton services because of their inherent weakness of ubiquitous signals. Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP) has been recently employed to provide security to IEEE 802.11 Wireless LANs. It has been shown in our earlier published work that CCMP is vulnerable to Time Memory Trade off (TMTO) attack. To overcome the said vulnerability, this paper presents a design and description of strengthening the security of WLAN packets using Per-Packet security mechanism. The architecture of Per-Packet security mechanism involves introduction of Per-Packet Authentication and Secret Nonce. The proposed Per-Packet Authentication protocol is a continuous challenge response process operating throughout the session. The Per-Packet authentication promptly secures the connection against unauthorized access by immediately discarding the packet if Per-Packet Authentication fails. We have proposed to derive the Nonce from the session key and keep it secret. Since the nonce is unique and secret, it provides freshness and unpredictability. The freshness provides protection against replay attacks, the unpredictability of Nonce prevents pre-computation attack. Same Nonce is used as a challenge-text from authenticator to supplicant. Per packet Security mechanism strengthens the security of authentication mechanism and counter mode operation irrespective of the security of causal encryption algorithm.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"30 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114007692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Trust management and incentive mechanism for P2P networks: Survey to cope challenges P2P网络信任管理与激励机制:应对挑战的研究
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777753
A. Samreen, S. Hussain
Peer-to-Peer networks are very popular these days due to their use in data and resource sharing. Trust and reputation of a peer not only make it easy to take a decision to ask for resource from the trustworthy node but also provide a way to punish evil peers for malicious act. Incentive mechanism provokes a peer to share resource and discourage the well known free riding. In this paper we studied proposed schemes and discuss some open issues to cope as the future research work as well as we have provided solution of some problems such as to detect malicious peers, false rating problem and sudden change in the behavior of peers that can be helpful in designing a new novel and robust frame work for trust and reputation based incentive mechanism.
点对点网络由于其在数据和资源共享方面的应用而非常流行。对等体的信任和声誉不仅使向可信节点请求资源的决定变得容易,而且为惩罚恶意节点的恶意行为提供了一种方法。激励机制促使同行共享资源,抑制众所周知的搭便车行为。本文研究了基于信任和声誉的激励机制的方案,讨论了未来研究工作中需要解决的一些问题,并对恶意节点的检测、错误评级问题和节点行为突变等问题提供了解决方案,为基于信任和声誉的激励机制设计了一个新的、新颖的、鲁棒的框架。
{"title":"Trust management and incentive mechanism for P2P networks: Survey to cope challenges","authors":"A. Samreen, S. Hussain","doi":"10.1109/INMIC.2008.4777753","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777753","url":null,"abstract":"Peer-to-Peer networks are very popular these days due to their use in data and resource sharing. Trust and reputation of a peer not only make it easy to take a decision to ask for resource from the trustworthy node but also provide a way to punish evil peers for malicious act. Incentive mechanism provokes a peer to share resource and discourage the well known free riding. In this paper we studied proposed schemes and discuss some open issues to cope as the future research work as well as we have provided solution of some problems such as to detect malicious peers, false rating problem and sudden change in the behavior of peers that can be helpful in designing a new novel and robust frame work for trust and reputation based incentive mechanism.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124048788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Voice controlled automation system 语音控制自动化系统
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777791
M.S. Haleem
In this era of technology, rapid advancements are being made in the field of automation and signal processing. The developments made in digital signal processing are being applied in the field of automation, communication systems and biomedical engineering. Controlling through human speech is one of the fascinating applications of digital signal processing (DSP) and Automation Systems. This paper discusses the speech recognition and its application in control mechanism. Speech recognition can be used to automate many tasks that usually require hands-on human interaction, such as recognizing simple spoken commands to perform something like turning on lights or shutting a door or driving a motor. After speech recognition, a particular code related to spoken word is transferred through wireless communication system to 8051 microcontroller and it works accordingly. Many techniques have been used to compare the pattern of the speech signals and recent technological advancements have made recognition of more complex speech patterns possible. Despite these breakthroughs, however, current efforts are still far away from 100% recognition of natural human speech. Therefore, the project is considered involving processing of a speech signal in any form as a challenging and rewarding one.
在这个技术时代,自动化和信号处理领域正在取得快速发展。数字信号处理的发展正在自动化、通信系统和生物医学工程领域得到应用。语音控制是数字信号处理(DSP)和自动化系统的重要应用之一。本文讨论了语音识别及其在控制机制中的应用。语音识别可用于自动化许多通常需要人工操作的任务,例如识别简单的语音命令,以执行诸如开灯、关门或驱动电机之类的操作。语音识别完成后,通过无线通信系统将与语音相关的特定代码传输到8051单片机,8051单片机据此工作。许多技术已经被用来比较语音信号的模式,最近的技术进步使得识别更复杂的语音模式成为可能。然而,尽管取得了这些突破,目前的努力离100%识别自然人类语言还很远。因此,该项目被认为涉及处理任何形式的语音信号,这是一个具有挑战性和有益的项目。
{"title":"Voice controlled automation system","authors":"M.S. Haleem","doi":"10.1109/INMIC.2008.4777791","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777791","url":null,"abstract":"In this era of technology, rapid advancements are being made in the field of automation and signal processing. The developments made in digital signal processing are being applied in the field of automation, communication systems and biomedical engineering. Controlling through human speech is one of the fascinating applications of digital signal processing (DSP) and Automation Systems. This paper discusses the speech recognition and its application in control mechanism. Speech recognition can be used to automate many tasks that usually require hands-on human interaction, such as recognizing simple spoken commands to perform something like turning on lights or shutting a door or driving a motor. After speech recognition, a particular code related to spoken word is transferred through wireless communication system to 8051 microcontroller and it works accordingly. Many techniques have been used to compare the pattern of the speech signals and recent technological advancements have made recognition of more complex speech patterns possible. Despite these breakthroughs, however, current efforts are still far away from 100% recognition of natural human speech. Therefore, the project is considered involving processing of a speech signal in any form as a challenging and rewarding one.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115346643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Network anomaly detection based on MRMHC-SVM algorithm 基于MRMHC-SVM算法的网络异常检测
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777754
Wenfa Li, Miyi Duan, You Chen
Network anomaly detection is the major direction of research in intrusion detection. Aiming at some problems, which include high false alarm rate, difficulties in obtaining exactly clean data for the modeling of normal patterns and the deterioration of detection rate because of some ldquonoisyrdquo data(unclean data) in the training set, in current intrusion detection techniques, we propose a novel network anomaly detection method based on MRMHC-SVM machine learning algorithm. The experimental results show that our method can effectively detect anomalies with high true positive rate and low false positive rate than the state-of-the-art anomaly detection methods. Moreover, the proposed method retains good detection performance after employing feature selection aiming at avoiding the ldquocurse of dimensionalityrdquo. In addition, even interfered by ldquonoisyrdquo data, it is robust and effective.
网络异常检测是入侵检测研究的主要方向。针对当前入侵检测技术中存在的虚警率高、正常模式建模难以获得准确干净数据以及训练集中存在不干净数据导致检测率下降等问题,提出了一种基于MRMHC-SVM机器学习算法的网络异常检测方法。实验结果表明,与现有的异常检测方法相比,该方法可以有效地检测出高真阳性率和低假阳性率的异常。此外,该方法在采用特征选择的基础上,避免了维数变化带来的缺陷,保持了良好的检测性能。此外,即使受到低噪声数据的干扰,该方法也具有良好的鲁棒性和有效性。
{"title":"Network anomaly detection based on MRMHC-SVM algorithm","authors":"Wenfa Li, Miyi Duan, You Chen","doi":"10.1109/INMIC.2008.4777754","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777754","url":null,"abstract":"Network anomaly detection is the major direction of research in intrusion detection. Aiming at some problems, which include high false alarm rate, difficulties in obtaining exactly clean data for the modeling of normal patterns and the deterioration of detection rate because of some ldquonoisyrdquo data(unclean data) in the training set, in current intrusion detection techniques, we propose a novel network anomaly detection method based on MRMHC-SVM machine learning algorithm. The experimental results show that our method can effectively detect anomalies with high true positive rate and low false positive rate than the state-of-the-art anomaly detection methods. Moreover, the proposed method retains good detection performance after employing feature selection aiming at avoiding the ldquocurse of dimensionalityrdquo. In addition, even interfered by ldquonoisyrdquo data, it is robust and effective.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127681734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A battery recharge model for WSNs using Free-Space Optics (FSO) 基于自由空间光学(FSO)的无线传感器网络电池充电模型
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777748
Muhammd Imran Afzal, Waqar Mahmood, Ali Hammad Akbar, AI-Khawarizmi
One of the most critical limiting factor for a Wireless Sensor Network (WSN) is its battery life. Therefore, a very desirable feature of WSN would be its rechargability to remain operational over longer period of times. However, the nodes needing recharge may not be accessible. In this paper, we present a battery recharge model in WSNs for inaccessible or hard to access environments, at distances up to several hundred meters, using variable power Infrared (IR) laser. While bulk of the sensor network comprises of sensing nodes, the juncture nodes are the ones that relay data towards sink -resulting into faster battery depletion. We present a recharge mechanism for juncture nodes, that utilizes Free Space Optics (FSO) over RF-cliques using IR-laser, Corner Cube Retroreflectors (CCRs) and beam-steering lasers. A Thinfilm Corner Cube Retroreflector (TCCR) is also proposed as a variant to the standard CCR to realize selective recharging. The proposed mechanism provides recharge-ability both for on-demand recharging and scheduled recharging.
无线传感器网络(WSN)最关键的限制因素之一是其电池寿命。因此,无线传感器网络的一个非常理想的特性是它的可充电性,可以在更长的时间内保持运行。然而,需要充电的节点可能无法访问。在本文中,我们提出了一种基于可变功率红外(IR)激光的无线传感器网络电池充电模型,用于距离达数百米的不可接近或难以进入的环境。虽然大部分传感器网络由传感节点组成,但接合节点是将数据中继到接收器的节点,这导致电池消耗更快。我们提出了一种连接节点的充电机制,该机制利用自由空间光学(FSO)对使用红外激光器、角立方反射器(CCRs)和光束导向激光器的RF-cliques进行充电。本文还提出了一种薄膜角立方反射器(TCCR),作为标准反射器的一种改进,实现了选择性充电。所提出的机制为按需充电和计划充电提供了充电能力。
{"title":"A battery recharge model for WSNs using Free-Space Optics (FSO)","authors":"Muhammd Imran Afzal, Waqar Mahmood, Ali Hammad Akbar, AI-Khawarizmi","doi":"10.1109/INMIC.2008.4777748","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777748","url":null,"abstract":"One of the most critical limiting factor for a Wireless Sensor Network (WSN) is its battery life. Therefore, a very desirable feature of WSN would be its rechargability to remain operational over longer period of times. However, the nodes needing recharge may not be accessible. In this paper, we present a battery recharge model in WSNs for inaccessible or hard to access environments, at distances up to several hundred meters, using variable power Infrared (IR) laser. While bulk of the sensor network comprises of sensing nodes, the juncture nodes are the ones that relay data towards sink -resulting into faster battery depletion. We present a recharge mechanism for juncture nodes, that utilizes Free Space Optics (FSO) over RF-cliques using IR-laser, Corner Cube Retroreflectors (CCRs) and beam-steering lasers. A Thinfilm Corner Cube Retroreflector (TCCR) is also proposed as a variant to the standard CCR to realize selective recharging. The proposed mechanism provides recharge-ability both for on-demand recharging and scheduled recharging.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128359410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A systematic approach to the automated marking of short-answer questions 一种自动阅卷简答题的系统方法
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777758
R. Siddiqi, C. Harrison
A number of attempts have been made to automatically mark short-answer questions. The authors of this paper have developed and evaluated a prototype software system that provides a novel approach to automated marking. Capabilities of the recently developed Stanford Parser (such as the ability to produce phrase structure and typed dependency parses of the text of a student's answer) have been utilized in the prototype system. A new notation technique to represent the required syntactical structures has also been developed and is introduced in this paper. A number of real exam questions have been used to evaluate the prototype. The evaluation results are encouraging and the authors intend to extend the system so that it becomes capable of marking longer answers.
已经做了一些尝试来自动标记简答题。本文的作者已经开发和评估了一个原型软件系统,提供了一种新的方法来自动标记。最近开发的Stanford Parser的功能(例如生成短语结构和学生回答文本的类型依赖解析的能力)已在原型系统中得到利用。本文还介绍了一种新的表示所需语法结构的符号技术。一些真实的考试问题已经被用来评估原型。评估结果令人鼓舞,作者打算扩展该系统,使其能够标记较长的答案。
{"title":"A systematic approach to the automated marking of short-answer questions","authors":"R. Siddiqi, C. Harrison","doi":"10.1109/INMIC.2008.4777758","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777758","url":null,"abstract":"A number of attempts have been made to automatically mark short-answer questions. The authors of this paper have developed and evaluated a prototype software system that provides a novel approach to automated marking. Capabilities of the recently developed Stanford Parser (such as the ability to produce phrase structure and typed dependency parses of the text of a student's answer) have been utilized in the prototype system. A new notation technique to represent the required syntactical structures has also been developed and is introduced in this paper. A number of real exam questions have been used to evaluate the prototype. The evaluation results are encouraging and the authors intend to extend the system so that it becomes capable of marking longer answers.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121282617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Characterisation of dielectric properties of PECVD Silicon Nitride for RF MEMS applications 用于射频MEMS的PECVD氮化硅介电性能的表征
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777714
H. Ur Rahman, A. Gentle, E. Gauja, R. Ramer
Synthesis of Silicon Nitride thin films is important in the semiconductor industry. The properties of the films make them valuable for oxidation masks, protection and passivation barrier layers, etch stop layer and inter level insulators. In the present study, we prepared silicon nitride films with different refractive index. We used various conditions of PECVD atmosphere with the purpose of obtaining high quality near stoichiometric films. Different deposition routines were employed, including variable flow ratio of silane and ammonia on to a silicon substrate. The quality and stoichiometry of the film was investigated using reflectance measurements. Measured process parameters were the deposition rate, film thickness, refractive index, breakdown voltage, dielectric constant, surface morphology and film composition. The thickness of the film was measured using AFM, DEKTAK and ellipsometer measurements. Fitting of reflectance spectra with WVASE ellipsometric software provided the optical constants for silicon nitride and allowed analysis of the films. A Bruggeman effective medium approximation was utilized to model the refractive index of the films. Reflective measurements were carried out in the range 210 nm-2500 nm.
氮化硅薄膜的合成在半导体工业中具有重要意义。该薄膜的性能使其在氧化掩膜、保护和钝化阻挡层、蚀刻停止层和层间绝缘体中具有重要价值。在本研究中,我们制备了不同折射率的氮化硅薄膜。为了获得高质量的近化学计量膜,我们采用了不同的PECVD气氛条件。采用了不同的沉积程序,包括硅烷和氨在硅衬底上的可变流量比。利用反射率测量研究了膜的质量和化学计量学。测量的工艺参数包括沉积速率、薄膜厚度、折射率、击穿电压、介电常数、表面形貌和薄膜成分。采用原子力显微镜(AFM)、DEKTAK和椭偏仪测量薄膜厚度。利用WVASE椭偏软件拟合反射光谱,得到了氮化硅薄膜的光学常数,并对薄膜进行了分析。利用布鲁格曼有效介质近似法对薄膜的折射率进行了模拟。在210 nm-2500 nm范围内进行了反射测量。
{"title":"Characterisation of dielectric properties of PECVD Silicon Nitride for RF MEMS applications","authors":"H. Ur Rahman, A. Gentle, E. Gauja, R. Ramer","doi":"10.1109/INMIC.2008.4777714","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777714","url":null,"abstract":"Synthesis of Silicon Nitride thin films is important in the semiconductor industry. The properties of the films make them valuable for oxidation masks, protection and passivation barrier layers, etch stop layer and inter level insulators. In the present study, we prepared silicon nitride films with different refractive index. We used various conditions of PECVD atmosphere with the purpose of obtaining high quality near stoichiometric films. Different deposition routines were employed, including variable flow ratio of silane and ammonia on to a silicon substrate. The quality and stoichiometry of the film was investigated using reflectance measurements. Measured process parameters were the deposition rate, film thickness, refractive index, breakdown voltage, dielectric constant, surface morphology and film composition. The thickness of the film was measured using AFM, DEKTAK and ellipsometer measurements. Fitting of reflectance spectra with WVASE ellipsometric software provided the optical constants for silicon nitride and allowed analysis of the films. A Bruggeman effective medium approximation was utilized to model the refractive index of the films. Reflective measurements were carried out in the range 210 nm-2500 nm.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"364 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121383546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Correction to: maximum power point tracking for fuel cell in fuel cell/battery hybrid systems 修正:燃料电池/电池混合系统中燃料电池的最大功率点跟踪
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.5297256
M. Dargahi, M. Rezanezhad, H. Habibnezhad
Ability of fuel cell systems to produce power is limited. So it is necessary to force the system to operate in conditions which correspond to fuel cell maximum power point (MPP). Since fuel cell MIPP is a unique and fixed point of operation, load power requirements are not taken into account and output voltage will vary with variations of load resistance. In this paper, a new configuration for Fuel cell / Battery hybrid power system with required controller is proposed and analyzed. This system works in the way that, fuel cell operates in its MIPP and output voltage is kept constant. The proposed system is simulated and results show acceptable operation of the system under different conditions.
燃料电池系统发电的能力是有限的。因此,有必要强制系统在与燃料电池最大功率点(MPP)相对应的条件下运行。由于燃料电池MIPP是一个独特且固定的工作点,因此不考虑负载功率要求,输出电压会随着负载电阻的变化而变化。本文提出并分析了燃料电池/电池混合动力系统的一种新结构及其控制器。该系统的工作原理是燃料电池在MIPP状态下工作,输出电压保持恒定。仿真结果表明,该系统在不同工况下均能正常运行。
{"title":"Correction to: maximum power point tracking for fuel cell in fuel cell/battery hybrid systems","authors":"M. Dargahi, M. Rezanezhad, H. Habibnezhad","doi":"10.1109/INMIC.2008.5297256","DOIUrl":"https://doi.org/10.1109/INMIC.2008.5297256","url":null,"abstract":"Ability of fuel cell systems to produce power is limited. So it is necessary to force the system to operate in conditions which correspond to fuel cell maximum power point (MPP). Since fuel cell MIPP is a unique and fixed point of operation, load power requirements are not taken into account and output voltage will vary with variations of load resistance. In this paper, a new configuration for Fuel cell / Battery hybrid power system with required controller is proposed and analyzed. This system works in the way that, fuel cell operates in its MIPP and output voltage is kept constant. The proposed system is simulated and results show acceptable operation of the system under different conditions.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122787184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new Relative sort algorithm based on arithmetic mean value 一种新的基于算术平均值的相对排序算法
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777766
W.H. Butt, M.Y. Javed
In this article we propose a novel sorting algorithm based on comparing the arithmetic mean with each item in the list. Running cost analysis and results obtained after various implementations are also provided with the intention of comparing the efficiency of the proposed mechanism with other existing sorting methodologies.
在本文中,我们提出了一种新的基于比较算术平均值与列表中每个项目的排序算法。还提供了运行成本分析和各种实现后获得的结果,目的是将所建议的机制的效率与其他现有的排序方法进行比较。
{"title":"A new Relative sort algorithm based on arithmetic mean value","authors":"W.H. Butt, M.Y. Javed","doi":"10.1109/INMIC.2008.4777766","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777766","url":null,"abstract":"In this article we propose a novel sorting algorithm based on comparing the arithmetic mean with each item in the list. Running cost analysis and results obtained after various implementations are also provided with the intention of comparing the efficiency of the proposed mechanism with other existing sorting methodologies.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122936551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design implications for believable & engaging scenarios 设计可信和引人入胜的场景
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777806
S. Paracha, M.T.A. Khan, A. Mehmood, Y. Osamu
The recent researches in the realm of virtual learning environments have revealed how children can positively contribute in the design process. Comicboarding is a participatory designed method that involves the use of comic books and drawings to produce believable and engaging scenarios with children. Researchers can elicit ideas from children by leveraging known plot formats, interaction styles and characters in comics. The paper describes collaboration with children that enabled researchers to capture the stories and experiences children tell about persistently proliferating violent behaviour in the Japanese schools namely Ijime. This collaboration resulted in the design implications that helped in generating and appraising scenarios for a virtual edutainment environment populated by intelligent virtual agents for exploring the problem of Ijime. The objective was to generate comic-type summaries of these narratives for user-centered design that vocalizes children's voice in the technology process. The technique helped the investigators in examining story logs; gathering information related to personality and emotional characteristics of the characters; understanding their actions and importance in the narrative and selecting the key fabula for interactive narrative environment.
最近在虚拟学习环境领域的研究揭示了儿童如何在设计过程中做出积极的贡献。漫画板是一种参与式的设计方法,它涉及到使用漫画书和图画来为孩子们创造可信的、引人入胜的场景。研究人员可以通过利用漫画中已知的情节格式、互动风格和角色,从孩子们那里获得想法。这篇论文描述了与儿童的合作,使研究人员能够捕捉到儿童讲述的关于日本学校(即Ijime)持续扩散的暴力行为的故事和经历。这种合作产生的设计含义有助于生成和评估由智能虚拟代理填充的虚拟教育娱乐环境的场景,以探索Ijime问题。目标是为以用户为中心的设计生成这些叙述的漫画式摘要,在技术过程中发出儿童的声音。这项技术帮助调查人员检查故事日志;收集与人物性格和情感特征有关的信息;了解他们在叙事中的作用和重要性,选择互动叙事环境的关键寓言。
{"title":"Design implications for believable & engaging scenarios","authors":"S. Paracha, M.T.A. Khan, A. Mehmood, Y. Osamu","doi":"10.1109/INMIC.2008.4777806","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777806","url":null,"abstract":"The recent researches in the realm of virtual learning environments have revealed how children can positively contribute in the design process. Comicboarding is a participatory designed method that involves the use of comic books and drawings to produce believable and engaging scenarios with children. Researchers can elicit ideas from children by leveraging known plot formats, interaction styles and characters in comics. The paper describes collaboration with children that enabled researchers to capture the stories and experiences children tell about persistently proliferating violent behaviour in the Japanese schools namely Ijime. This collaboration resulted in the design implications that helped in generating and appraising scenarios for a virtual edutainment environment populated by intelligent virtual agents for exploring the problem of Ijime. The objective was to generate comic-type summaries of these narratives for user-centered design that vocalizes children's voice in the technology process. The technique helped the investigators in examining story logs; gathering information related to personality and emotional characteristics of the characters; understanding their actions and importance in the narrative and selecting the key fabula for interactive narrative environment.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115979853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2008 IEEE International Multitopic Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1