Pub Date : 2009-12-01DOI: 10.1109/ICIINFS.2009.5429863
U. Premaratne, C. Ling, J. Samarabandu, T. Sidhu
This paper details the use of possibilistic decision trees for a lightweight Intrusion Detection System (IDS) to be used in Intelligent Electronic Devices (IEDs) of IEC61850 automated electric substations. Traffic data is captured by performing simulated attacks on IEDs. Data is obtained for two types of genuine user activity and two types of common malicious attacks on IEDs. The genuine user activity includes, casual browsing of IED data and downloading of IED data while a Ping flood Denial of Service (DoS) and password crack attack are performed for malicious attacks. Classification is done using possibilistic decision trees for the logarithmic histogram of the time difference between the arrival of two consecutive packets. The main contribution of this paper is the use of non-specificity for obtaining a continuous valued possibilistic decision tree and its cut points. It also includes the use of mean distance metrics to obtain the possibility distribution for the real attack data.
{"title":"Possibilistic decision trees for Intrusion Detection in IEC61850 automated substations","authors":"U. Premaratne, C. Ling, J. Samarabandu, T. Sidhu","doi":"10.1109/ICIINFS.2009.5429863","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429863","url":null,"abstract":"This paper details the use of possibilistic decision trees for a lightweight Intrusion Detection System (IDS) to be used in Intelligent Electronic Devices (IEDs) of IEC61850 automated electric substations. Traffic data is captured by performing simulated attacks on IEDs. Data is obtained for two types of genuine user activity and two types of common malicious attacks on IEDs. The genuine user activity includes, casual browsing of IED data and downloading of IED data while a Ping flood Denial of Service (DoS) and password crack attack are performed for malicious attacks. Classification is done using possibilistic decision trees for the logarithmic histogram of the time difference between the arrival of two consecutive packets. The main contribution of this paper is the use of non-specificity for obtaining a continuous valued possibilistic decision tree and its cut points. It also includes the use of mean distance metrics to obtain the possibility distribution for the real attack data.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128929234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICIINFS.2009.5429890
Kelum Vithana, S. Fernando, D. Dias
The development and expansion of broadband technologies has stimulated the multimedia streaming market for the delivery of live streaming services which can be used for a variety of applications. The design of a generic audio and video streaming platform that can be employed for a wide range of applications is presented in this paper. A key feature of the platform is the ‘subscription framework’ which enables the service users to subscribe to a set of live feeds with their application specific requirements. The platform is capable of adjusting its service functionalities and the extent to which the media streams are secured for a particular user based on the requirements given at the service subscription. The platform is designed based on a layered architecture and a prototype implementation is carried out within the University network.
{"title":"A service platform for subscription-based live video streaming","authors":"Kelum Vithana, S. Fernando, D. Dias","doi":"10.1109/ICIINFS.2009.5429890","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429890","url":null,"abstract":"The development and expansion of broadband technologies has stimulated the multimedia streaming market for the delivery of live streaming services which can be used for a variety of applications. The design of a generic audio and video streaming platform that can be employed for a wide range of applications is presented in this paper. A key feature of the platform is the ‘subscription framework’ which enables the service users to subscribe to a set of live feeds with their application specific requirements. The platform is capable of adjusting its service functionalities and the extent to which the media streams are secured for a particular user based on the requirements given at the service subscription. The platform is designed based on a layered architecture and a prototype implementation is carried out within the University network.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129354267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICIINFS.2009.5429837
N. Nanayakkara, B. Chiu, A. Fenster
In medical image registration, the quantification of registration errors is important in deciding the capabilities of a registration technique for a given problem, and/or for a given pair of images. The most common approach is the geometrical registration error called Target Registration Error (TRE) that measures the distance between corresponding landmarks in the target and registered images. However, finding sufficient number of corresponding landmarks is not always possible in medical images, and therefore, other measures such as, image similarity measures and surface-based error metrics have been used in quantification of registration errors. Surface-based error quantification is more appropriate than intensity-based methods, but the widely used surface-based Closest Point Registration Error (CPRE) is known for under-estimating registration errors. In this paper, we present a surface-based method for quantification of registration errors using Matched Points Registration Error (MPRE) by computing distances between “matched-points” on segmented object surfaces in target and registered images. We compared small rigid registration errors of tube-shaped and closed surface objects quantified using MPRE with TRE and CPRE, and showed that MPRE did not show a significant difference from TRE and that CPRE was significantly lower than both MPRE and TRE.
{"title":"A surface-based metric for registration error quantification","authors":"N. Nanayakkara, B. Chiu, A. Fenster","doi":"10.1109/ICIINFS.2009.5429837","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429837","url":null,"abstract":"In medical image registration, the quantification of registration errors is important in deciding the capabilities of a registration technique for a given problem, and/or for a given pair of images. The most common approach is the geometrical registration error called Target Registration Error (TRE) that measures the distance between corresponding landmarks in the target and registered images. However, finding sufficient number of corresponding landmarks is not always possible in medical images, and therefore, other measures such as, image similarity measures and surface-based error metrics have been used in quantification of registration errors. Surface-based error quantification is more appropriate than intensity-based methods, but the widely used surface-based Closest Point Registration Error (CPRE) is known for under-estimating registration errors. In this paper, we present a surface-based method for quantification of registration errors using Matched Points Registration Error (MPRE) by computing distances between “matched-points” on segmented object surfaces in target and registered images. We compared small rigid registration errors of tube-shaped and closed surface objects quantified using MPRE with TRE and CPRE, and showed that MPRE did not show a significant difference from TRE and that CPRE was significantly lower than both MPRE and TRE.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132613744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICIINFS.2009.5429888
S. Hoffmann, V. Herath, M. El-Darawy, T. Pfau, C. Wordehoff, R. Peveling, U. Ruckert, R. Noé
A multiplier-free phase estimation algorithm based on the barycentre approach for coherent QPSK detection is presented. A selectivity mechanism was developed that significantly improved its performance. In addition to recently published measurement results, theoretical background and new simulation results are presented.
{"title":"Multiplier-free realtime phase tracking in digital synchronous QPSK receiver for coherent optical detection","authors":"S. Hoffmann, V. Herath, M. El-Darawy, T. Pfau, C. Wordehoff, R. Peveling, U. Ruckert, R. Noé","doi":"10.1109/ICIINFS.2009.5429888","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429888","url":null,"abstract":"A multiplier-free phase estimation algorithm based on the barycentre approach for coherent QPSK detection is presented. A selectivity mechanism was developed that significantly improved its performance. In addition to recently published measurement results, theoretical background and new simulation results are presented.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127192554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICIINFS.2009.5429893
Mahendra Samarawickrama, Kasun D. Pathirage, Harshaka Samarasekara, Asanka Wickramasinghe, K. Samarasinghe
Designing a PABX system using the existing power line infrastructure as the transmission medium is an effective method of implementing a fast and easily installable communication solution. The scope of this research is to develop such a system for a small scale organizational environment to avoid the complexities and time consumption of cable installation. As the power line transmission technique, we used narrowband frequency shift keying to counter the noise disturbances in power line. In addition we used a novel communication protocol to further reduce the effects of noise and to achieve reliable transmission. We integrated the switching function into the central unit which is the central control element in the system. We were able to achieve voice communication at the rate of 2kbps and to switch between four extensions. Further improvements in the voice quality can be achieved by using advanced noise reduction algorithms.
{"title":"Power Line Intercom - narrowband voice communication over power line","authors":"Mahendra Samarawickrama, Kasun D. Pathirage, Harshaka Samarasekara, Asanka Wickramasinghe, K. Samarasinghe","doi":"10.1109/ICIINFS.2009.5429893","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429893","url":null,"abstract":"Designing a PABX system using the existing power line infrastructure as the transmission medium is an effective method of implementing a fast and easily installable communication solution. The scope of this research is to develop such a system for a small scale organizational environment to avoid the complexities and time consumption of cable installation. As the power line transmission technique, we used narrowband frequency shift keying to counter the noise disturbances in power line. In addition we used a novel communication protocol to further reduce the effects of noise and to achieve reliable transmission. We integrated the switching function into the central unit which is the central control element in the system. We were able to achieve voice communication at the rate of 2kbps and to switch between four extensions. Further improvements in the voice quality can be achieved by using advanced noise reduction algorithms.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115040532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICIINFS.2009.5429902
P. Rajkumar, Saswati Ghosh, P. Dasgupta
Usage control is a comprehensive access control model developed to cater the security needs of the wide range of application domains. Safety property of the usage control model ensures only the design level safety whereas the correctness of usage control in software application depends on the correctness of implementation as well. Most of the research in access control left the correctness of implementation as a general software verification problem. Software verification in general requires an extensive exploration of the complete state space, whereas access control of an application evolves over few repeated protection states. This paper presents a method to verify the correctness of usage control implementation by capturing and analyzing only the protection states. We use this method in the end to end correctness verification approach, which ensures the design as well as implementation correctness of usage control and we also provide an illustrative case study.
{"title":"An end to end correctness verification approach for application specific usage control","authors":"P. Rajkumar, Saswati Ghosh, P. Dasgupta","doi":"10.1109/ICIINFS.2009.5429902","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429902","url":null,"abstract":"Usage control is a comprehensive access control model developed to cater the security needs of the wide range of application domains. Safety property of the usage control model ensures only the design level safety whereas the correctness of usage control in software application depends on the correctness of implementation as well. Most of the research in access control left the correctness of implementation as a general software verification problem. Software verification in general requires an extensive exploration of the complete state space, whereas access control of an application evolves over few repeated protection states. This paper presents a method to verify the correctness of usage control implementation by capturing and analyzing only the protection states. We use this method in the end to end correctness verification approach, which ensures the design as well as implementation correctness of usage control and we also provide an illustrative case study.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114134052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICIINFS.2009.5429853
C. T. Wannige, D. Sonnadara
The performance of neuro-fuzzy traffic signal control at two independent traffic junctions is discussed. In this work, traffic conditions at two 4-way traffic junctions were simulated and flow of traffic on the road connecting the two junctions under varying traffic conditions was studied. For a given data set, the developed neuro-fuzzy system automatically draws membership functions and the rules by itself, thus making the designing process easier and reliable compared to conventional fuzzy logic controllers. The traffic inflows of roads are given as inputs to the fuzzy control system which generate the corresponding green light time as the output to control the signal timing. The control systems try to minimize the delay experienced by the drivers at the two traffic junctions. As expected, when compared with a fixed-time signal control system, the neuro-fuzzy system tends to minimize vehicle delays at both junctions. Simulation results show, under variable traffic conditions, neuro-fuzzy control system perform efficiently by making average delay per vehicle under the red light phase smaller and increasing the synchronization of green light phases between junctions. When the volume of traffic at one of the junction changed abruptly, the green light timing of both junctions changed, adapting to the new traffic condition on the road connecting the two junctions.
{"title":"Adaptive neuro-fuzzy traffic signal control for multiple junctions","authors":"C. T. Wannige, D. Sonnadara","doi":"10.1109/ICIINFS.2009.5429853","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429853","url":null,"abstract":"The performance of neuro-fuzzy traffic signal control at two independent traffic junctions is discussed. In this work, traffic conditions at two 4-way traffic junctions were simulated and flow of traffic on the road connecting the two junctions under varying traffic conditions was studied. For a given data set, the developed neuro-fuzzy system automatically draws membership functions and the rules by itself, thus making the designing process easier and reliable compared to conventional fuzzy logic controllers. The traffic inflows of roads are given as inputs to the fuzzy control system which generate the corresponding green light time as the output to control the signal timing. The control systems try to minimize the delay experienced by the drivers at the two traffic junctions. As expected, when compared with a fixed-time signal control system, the neuro-fuzzy system tends to minimize vehicle delays at both junctions. Simulation results show, under variable traffic conditions, neuro-fuzzy control system perform efficiently by making average delay per vehicle under the red light phase smaller and increasing the synchronization of green light phases between junctions. When the volume of traffic at one of the junction changed abruptly, the green light timing of both junctions changed, adapting to the new traffic condition on the road connecting the two junctions.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117025484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICIINFS.2009.5429841
Kini M. Ramesh, D. S. Sumam
Computational efficiency of Signal Processing Algorithm implemented in hardware depends on efficiency of datapath, memory speed, and generation of addresses for data access. In case of signal processing applications, pattern of data access is complex in comparison with other applications. If implemented in a general purpose processor, address generation for signal processing applications will require execution of a series of instructions and use of datapath elements like adders, shifters etc. In general, considerable processor resources and time are utilized. It is desirable to execute one loop of a kernel per clock. This demands generation of typically three addresses per clock: two addresses for data sample/coefficient and one for storage of processed data. A set of dedicated, efficient Address Generator Units (AGU) will definitely enhance the performance. This paper focuses on design and implementation of Address Generators for complex addressing modes required by Multimedia Signal Processing algorithms. Among other addressing modes, a novel algorithm is developed for accessing data in a Bit-Reversed order for Fast Fourier Transforms (FFT), and Zig-zag order for Discrete Cosine Transforms (DCT). When mapped to hardware, this scales linearly in gate complexity with increase in the size and uses less components.
{"title":"Comprehensive address generator for digital Signal Processing","authors":"Kini M. Ramesh, D. S. Sumam","doi":"10.1109/ICIINFS.2009.5429841","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429841","url":null,"abstract":"Computational efficiency of Signal Processing Algorithm implemented in hardware depends on efficiency of datapath, memory speed, and generation of addresses for data access. In case of signal processing applications, pattern of data access is complex in comparison with other applications. If implemented in a general purpose processor, address generation for signal processing applications will require execution of a series of instructions and use of datapath elements like adders, shifters etc. In general, considerable processor resources and time are utilized. It is desirable to execute one loop of a kernel per clock. This demands generation of typically three addresses per clock: two addresses for data sample/coefficient and one for storage of processed data. A set of dedicated, efficient Address Generator Units (AGU) will definitely enhance the performance. This paper focuses on design and implementation of Address Generators for complex addressing modes required by Multimedia Signal Processing algorithms. Among other addressing modes, a novel algorithm is developed for accessing data in a Bit-Reversed order for Fast Fourier Transforms (FFT), and Zig-zag order for Discrete Cosine Transforms (DCT). When mapped to hardware, this scales linearly in gate complexity with increase in the size and uses less components.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"657 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121985709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICIINFS.2009.5429856
I. Mukherjee, S.K. Ghosh
The geospatial information is becoming an integral part of many decision making processes, specially related to socio-economic development. Geospatial data are often collected and maintained by different organizations and become a major bottleneck for spatial integration. Further, the spatial relationships between various spatial objects and the influence on each other are often not defined crisply. There exists a spatial or thematic relation between the data of different themes. In real world situations, inferring accurate relationship between the data of different themes is not possible. In order to address this inaccuracy and uncertainty, a fuzzy logic concept has to be used. In this paper, a framework has been proposed to integrate these diverse data using fuzzy spatial web services. The framework uses fuzzy geospatial data model to integrate the data across various organization. Such data model is developed based on base feature set, domain knowledge and fuzzy logic. The association between data of different themes derived from domain knowledge and fuzzy logic is used to map the uncertainties between the relationships of these diverse data. A database has been designed and populated using the fuzzy geospatial data model. The data are integrated and accessed through Enterprise GIS Framework geospatial web service that conforms to OGC (Open Geospatial Consortium) geospatial web services. For analysis and decision support a fuzzy decision system has been used implemented using fuzzy logic concepts.
{"title":"Integrating heterogeneous geospatial data for decision support system using fuzzy logic","authors":"I. Mukherjee, S.K. Ghosh","doi":"10.1109/ICIINFS.2009.5429856","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429856","url":null,"abstract":"The geospatial information is becoming an integral part of many decision making processes, specially related to socio-economic development. Geospatial data are often collected and maintained by different organizations and become a major bottleneck for spatial integration. Further, the spatial relationships between various spatial objects and the influence on each other are often not defined crisply. There exists a spatial or thematic relation between the data of different themes. In real world situations, inferring accurate relationship between the data of different themes is not possible. In order to address this inaccuracy and uncertainty, a fuzzy logic concept has to be used. In this paper, a framework has been proposed to integrate these diverse data using fuzzy spatial web services. The framework uses fuzzy geospatial data model to integrate the data across various organization. Such data model is developed based on base feature set, domain knowledge and fuzzy logic. The association between data of different themes derived from domain knowledge and fuzzy logic is used to map the uncertainties between the relationships of these diverse data. A database has been designed and populated using the fuzzy geospatial data model. The data are integrated and accessed through Enterprise GIS Framework geospatial web service that conforms to OGC (Open Geospatial Consortium) geospatial web services. For analysis and decision support a fuzzy decision system has been used implemented using fuzzy logic concepts.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"85 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133160502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICIINFS.2009.5429884
P. Hoole, S. Hoole
This paper traces the discipline of electromagnetic field computation from the early days of network models to finite differences, integral equation solutions and now the all encompassing finite element method. The discipline enjoyed phenomenal growth under the sponsorship of the IEEE Magnetics Society. The pioneers took a broad view of this subspecialty of electrical engineering as a discipline intersecting with mathematical physics, numerical mathematics and computer science. This liberal non-confining view has spawned further sub-disciplines leading to CAD techniques, and inverse problems, matrix solution methods and parallel processing. The paper then focuses on what is currently the most active area of research, inverse problem solution and optimization where much of the new work lies.
{"title":"Electromagnetic field computation: The beginnings and current directions in optimization","authors":"P. Hoole, S. Hoole","doi":"10.1109/ICIINFS.2009.5429884","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429884","url":null,"abstract":"This paper traces the discipline of electromagnetic field computation from the early days of network models to finite differences, integral equation solutions and now the all encompassing finite element method. The discipline enjoyed phenomenal growth under the sponsorship of the IEEE Magnetics Society. The pioneers took a broad view of this subspecialty of electrical engineering as a discipline intersecting with mathematical physics, numerical mathematics and computer science. This liberal non-confining view has spawned further sub-disciplines leading to CAD techniques, and inverse problems, matrix solution methods and parallel processing. The paper then focuses on what is currently the most active area of research, inverse problem solution and optimization where much of the new work lies.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130243744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}