首页 > 最新文献

2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications最新文献

英文 中文
Hunter: An Anti spyware for windows Operating System Hunter: windows操作系统的反间谍软件
N. Arastouie, M. Razzazi
Internet is growing with a great speed and this new human phenomenon is attracting the attention of all kind of people and organizations attractions with positive or negative purposes. Spywares, with different purposes are collecting people's personal information without making them aware of it and having their permission to do it. Such software often install themselves on PC's and start to collect information including list of websites visited by users and are able to monitor and detect information typed via keyboard, email addresses and other sensitive or secret information that user dose not intend to propagate or more secret information like ID's and passwords. Afterward, they send this information to their main spy data base. Spywares are causing security and political risks and problems for organizations. In this article we present the specification and architecture of the Hunter, an anti spyware, which we developed to make the systems safe against such intruer spywares. Implementation of such software will be described in two separate phases. First phase is data acquisition. We obtain a huge Database of whole system's process information. This is done by considering characteristics and operations performed by different kind of spywares. Whole process's information is kept in a database so that we can reach the best possible trust gauge by observing all aspect of the subject. The second phase is spy ware detection that is done by use of the data base which we developed in the previous phase. The spyware detection is done with three degree of accuracy: high, medium and low.
互联网正以极快的速度发展,这一新的人类现象正吸引着各种各样的人和组织的注意,吸引着积极或消极的目的。间谍软件,有不同的目的,收集人们的个人信息,而不让他们意识到这一点,并得到他们的许可。此类软件通常安装在个人电脑上,并开始收集信息,包括用户访问过的网站列表,并能够监控和检测通过键盘输入的信息,电子邮件地址和其他用户不打算传播的敏感或机密信息或更多机密信息,如ID和密码。之后,他们将这些信息发送到他们的主要间谍数据库。间谍软件正在给组织带来安全和政治风险和问题。在本文中,我们介绍了猎人的规范和体系结构,这是一个反间谍软件,我们开发的,使系统安全,以防止此类入侵间谍软件。这种软件的实现将分两个阶段进行描述。第一阶段是数据采集。我们获得了一个庞大的整个系统的过程信息数据库。这是通过考虑不同类型间谍软件的特征和操作来完成的。整个过程的信息都保存在数据库中,这样我们就可以通过观察主体的各个方面来达到最好的信任衡量标准。第二阶段是利用前一阶段开发的数据库进行间谍软件检测。间谍软件检测是完成三个程度的准确性:高,中,低。
{"title":"Hunter: An Anti spyware for windows Operating System","authors":"N. Arastouie, M. Razzazi","doi":"10.1109/ICTTA.2008.4530281","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530281","url":null,"abstract":"Internet is growing with a great speed and this new human phenomenon is attracting the attention of all kind of people and organizations attractions with positive or negative purposes. Spywares, with different purposes are collecting people's personal information without making them aware of it and having their permission to do it. Such software often install themselves on PC's and start to collect information including list of websites visited by users and are able to monitor and detect information typed via keyboard, email addresses and other sensitive or secret information that user dose not intend to propagate or more secret information like ID's and passwords. Afterward, they send this information to their main spy data base. Spywares are causing security and political risks and problems for organizations. In this article we present the specification and architecture of the Hunter, an anti spyware, which we developed to make the systems safe against such intruer spywares. Implementation of such software will be described in two separate phases. First phase is data acquisition. We obtain a huge Database of whole system's process information. This is done by considering characteristics and operations performed by different kind of spywares. Whole process's information is kept in a database so that we can reach the best possible trust gauge by observing all aspect of the subject. The second phase is spy ware detection that is done by use of the data base which we developed in the previous phase. The spyware detection is done with three degree of accuracy: high, medium and low.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127394414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
XMAN; A Framework for Rapid Development of Business Applications 变种特工;快速开发业务应用程序的框架
B.F. Saab, M. S. Hajji
This paper describes a framework for the rapid development of business applications. The framework XMAN differs from similar commercially available packages and provides some advantages over them. XMAN utilizes XML in a specified way in order to achieve the goals of making business applications development rapid, easy, flexible and, in the same time, open to necessary interventions. Change management is also considered. XMAN is multi-tier based. It provides the business application under development with representations for data model, business logic, privileges, component interfaces and user interfaces. The paper describes the layers, techniques and components of XMAN and explores possible future extensions.
本文描述了一个用于快速开发业务应用程序的框架。框架XMAN不同于类似的商用软件包,并提供了一些优于它们的优点。XMAN以特定的方式利用XML,以实现使业务应用程序开发快速、简单、灵活,同时对必要的干预开放的目标。变更管理也被考虑在内。XMAN是多层的。它为正在开发的业务应用程序提供数据模型、业务逻辑、特权、组件接口和用户接口的表示。本文描述了XMAN的层、技术和组件,并探讨了未来可能的扩展。
{"title":"XMAN; A Framework for Rapid Development of Business Applications","authors":"B.F. Saab, M. S. Hajji","doi":"10.1109/ICTTA.2008.4530344","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530344","url":null,"abstract":"This paper describes a framework for the rapid development of business applications. The framework XMAN differs from similar commercially available packages and provides some advantages over them. XMAN utilizes XML in a specified way in order to achieve the goals of making business applications development rapid, easy, flexible and, in the same time, open to necessary interventions. Change management is also considered. XMAN is multi-tier based. It provides the business application under development with representations for data model, business logic, privileges, component interfaces and user interfaces. The paper describes the layers, techniques and components of XMAN and explores possible future extensions.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130099677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Learners Experiences Reuse to Improve Personalized E-Learning 学习者体验重用提高个性化电子学习
R. H. M'tir, L. Jéribi, B. Rumpler
The aim of our research is to build a cooperative e- Learning system adapted to different learners' profiles (knowledge levels, pedagogical preferences, goals, etc.). In order to improve e-Learning systems, we propose to capitalize and reuse learning experiences. The capitalization consists in modeling the learning situation of a given learner. The learning situation model includes the learner profile as well as the learning process features.The reuse consists in exploiting previous experiences in order to offer to the current learner the best suited experience to his needs. This experience should be already validated and evaluated by other learners having similar learning profiles. Our experiences reuse approach is based on the case- based reasoning. The case-based reasoning defines a reasoning approach based on the reuse concept.
我们研究的目的是建立一个适合不同学习者的合作电子学习系统(知识水平、教学偏好、目标等)。为了改进电子学习系统,我们建议利用和重用学习经验。资本化包括对给定学习者的学习情况进行建模。学习情境模型包括学习者概况和学习过程特征。重用包括利用以前的经验,以便为当前的学习者提供最适合他需要的经验。这种经验应该已经被具有类似学习概况的其他学习者验证和评估。我们的经验重用方法是基于案例推理的。基于案例的推理定义了一种基于重用概念的推理方法。
{"title":"Learners Experiences Reuse to Improve Personalized E-Learning","authors":"R. H. M'tir, L. Jéribi, B. Rumpler","doi":"10.1109/ICTTA.2008.4529971","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4529971","url":null,"abstract":"The aim of our research is to build a cooperative e- Learning system adapted to different learners' profiles (knowledge levels, pedagogical preferences, goals, etc.). In order to improve e-Learning systems, we propose to capitalize and reuse learning experiences. The capitalization consists in modeling the learning situation of a given learner. The learning situation model includes the learner profile as well as the learning process features.The reuse consists in exploiting previous experiences in order to offer to the current learner the best suited experience to his needs. This experience should be already validated and evaluated by other learners having similar learning profiles. Our experiences reuse approach is based on the case- based reasoning. The case-based reasoning defines a reasoning approach based on the reuse concept.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130596148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Scintigraphic images restoration using jointly Fourier and Wavelet domains 基于傅里叶和小波联合域的闪烁图像恢复
N. Gribaa, N. Khlifa, K. Hamrouni
The paper focus on the problem of scintigraphic images restoration. These images are often disturbed by the bad detection equipment quality. The aim is to improve regions of interest perception, to help useful information extraction and so to allow good understanding of the pathological phenomenon. The restoration is an ill-posed problem. So, inverting the the distortion model in presence of additive noise is often numerically unstable. We propose, then, a new framework based on the Fourier and the Wavelet domain, in order to benefit from the advantages of each one. The Fourier regularized deconvolution exploits the Fourier representation efficiency of the colored noise. Whereas the wavelet packets denoising exploits the wavelet representation efficiency and the good localization of inherent noise in this domain. We noticed the performance of the proposed method in terms of edges preservation, contrast and uniformity in the images.
本文主要研究了科学图像的恢复问题。这些图像经常受到检测设备质量差的干扰。目的是改善感兴趣区域的感知,帮助提取有用的信息,从而更好地理解病理现象。修复是一个不适定式的问题。因此,在加性噪声存在的情况下,反演失真模型在数值上往往是不稳定的。然后,我们提出了一个基于傅里叶和小波域的新框架,以利用它们各自的优点。傅里叶正则化反卷积利用了彩色噪声的傅里叶表示效率。而小波包去噪则利用了小波的表示效率和对固有噪声的良好定位。我们注意到该方法在图像边缘保持、对比度和均匀性方面的性能。
{"title":"Scintigraphic images restoration using jointly Fourier and Wavelet domains","authors":"N. Gribaa, N. Khlifa, K. Hamrouni","doi":"10.1109/ICTTA.2008.4530103","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530103","url":null,"abstract":"The paper focus on the problem of scintigraphic images restoration. These images are often disturbed by the bad detection equipment quality. The aim is to improve regions of interest perception, to help useful information extraction and so to allow good understanding of the pathological phenomenon. The restoration is an ill-posed problem. So, inverting the the distortion model in presence of additive noise is often numerically unstable. We propose, then, a new framework based on the Fourier and the Wavelet domain, in order to benefit from the advantages of each one. The Fourier regularized deconvolution exploits the Fourier representation efficiency of the colored noise. Whereas the wavelet packets denoising exploits the wavelet representation efficiency and the good localization of inherent noise in this domain. We noticed the performance of the proposed method in terms of edges preservation, contrast and uniformity in the images.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130650971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Comparison and Investigation of Hopping Rate Estimation Processes 跳频估计方法的比较与研究
Y. A. Siddeeq, Dean, Ammar A. Khuder, N. Muhammed, Abdullah
The estimation of hopping rate for frequency hoping signal has been done by using two simulation models based on, multiple-hop autocorrelation (MHAC) and multiple stages frequency hopping hop rate detector (MS-FH-HRD) processors.
采用基于多跳自相关(MHAC)和多级跳频跳率检测器(MS-FH-HRD)处理器的两种仿真模型对期望频率信号的跳率进行了估计。
{"title":"Comparison and Investigation of Hopping Rate Estimation Processes","authors":"Y. A. Siddeeq, Dean, Ammar A. Khuder, N. Muhammed, Abdullah","doi":"10.1109/ICTTA.2008.4530244","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530244","url":null,"abstract":"The estimation of hopping rate for frequency hoping signal has been done by using two simulation models based on, multiple-hop autocorrelation (MHAC) and multiple stages frequency hopping hop rate detector (MS-FH-HRD) processors.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132093553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Evaluation of IEEE802.16 Using a Modified Reservation Scheme Under Different Loading Conditions 基于改进保留方案的IEEE802.16在不同负载条件下的性能评估
K. shalghum, H. Sigiuk, K.A. Khalfalla, Y.S. Kshedan
WiMAX is currently one of the hottest technologies for broadband wireless access (BWA) systems which propose a wireless high-speed and high performance access system, with service differentiation for distinct classes of traffic and QoS requirements. IEEE802.16 standard specifies the PHY and MAC layers for BWA system and provides the flexibility of TDD and FDD allocation schemes. However, in spite of including the possibility of QoS support, the standard does not define how to schedule different types of traffic. In this paper, we present a modified scheme which is based on a reservation priority access control (RPAC) using FDD allocation approach, and we the behavior of this reservation scheme is analyzed and evaluated under balanced and unbalanced traffic conditions with the inclusion of variable priorities between stations.
WiMAX是目前宽带无线接入(BWA)系统中最热门的技术之一,它提出了一种无线高速、高性能的接入系统,针对不同的业务类别和QoS要求提供不同的服务。IEEE802.16标准规定了BWA系统的物理层和MAC层,提供了TDD和FDD分配方案的灵活性。然而,尽管包含了QoS支持的可能性,该标准并没有定义如何调度不同类型的流量。本文提出了一种基于FDD分配方法的预留优先访问控制(RPAC)改进方案,并分析了该方案在均衡和不均衡交通条件下的行为,其中包含了站点间可变优先级。
{"title":"Performance Evaluation of IEEE802.16 Using a Modified Reservation Scheme Under Different Loading Conditions","authors":"K. shalghum, H. Sigiuk, K.A. Khalfalla, Y.S. Kshedan","doi":"10.1109/ICTTA.2008.4530195","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530195","url":null,"abstract":"WiMAX is currently one of the hottest technologies for broadband wireless access (BWA) systems which propose a wireless high-speed and high performance access system, with service differentiation for distinct classes of traffic and QoS requirements. IEEE802.16 standard specifies the PHY and MAC layers for BWA system and provides the flexibility of TDD and FDD allocation schemes. However, in spite of including the possibility of QoS support, the standard does not define how to schedule different types of traffic. In this paper, we present a modified scheme which is based on a reservation priority access control (RPAC) using FDD allocation approach, and we the behavior of this reservation scheme is analyzed and evaluated under balanced and unbalanced traffic conditions with the inclusion of variable priorities between stations.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130805015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Moving object Segmentation; using optical flow with active contour model 运动目标分割;采用具有活动轮廓的光流模型
Youssef Zinbi, Youssef Chahir, Abder Elmoataz
The paper presents an object segmentation approach that combines optical flow and active contour model to characterize objects and follow them in video sequences. Our aims is to discriminate moving objects from a static background. The approach is based on a minimization of a functional of energy (E) which uses perceptual information in regions of interest (ROI) in an image, in conjunction with a mixture of Gaussian to model voxels of the background image and those of the visual objects. In this work, we compute the optical flow then we use the result of the optical flow as an input in an active contour model. Experiments with a number of test sequences are promising and extend the numerous works on this subject.
本文提出了一种结合光流和活动轮廓模型的目标分割方法,对视频序列中的目标进行表征和跟踪。我们的目标是从静态背景中分辨出移动的物体。该方法基于能量函数(E)的最小化,该函数使用图像中感兴趣区域(ROI)的感知信息,并结合高斯混合模型来模拟背景图像和视觉对象的体素。在这项工作中,我们计算光流,然后将光流的结果作为活动轮廓模型的输入。许多测试序列的实验是有希望的,并扩展了这一主题的众多工作。
{"title":"Moving object Segmentation; using optical flow with active contour model","authors":"Youssef Zinbi, Youssef Chahir, Abder Elmoataz","doi":"10.1109/ICTTA.2008.4530112","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530112","url":null,"abstract":"The paper presents an object segmentation approach that combines optical flow and active contour model to characterize objects and follow them in video sequences. Our aims is to discriminate moving objects from a static background. The approach is based on a minimization of a functional of energy (E) which uses perceptual information in regions of interest (ROI) in an image, in conjunction with a mixture of Gaussian to model voxels of the background image and those of the visual objects. In this work, we compute the optical flow then we use the result of the optical flow as an input in an active contour model. Experiments with a number of test sequences are promising and extend the numerous works on this subject.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130828740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Personalizing Results of Information Retrieval Systems Using Extended Fuzzy Concept Networks 基于扩展模糊概念网络的信息检索系统个性化结果
P. Moradi, M. Ebrahim, M. Ebadzadeh
The increasing of the electronic documents and users has led to the creation of new paradigms of personalizing results of information retrieval systems and its goal is to better service to users based on their profiles. Personalized content retrieval aims at improving the retrieval process by taking into account the particular interests of individual users. The goal of information retrieval systems is to personalize ranking documents based on user profiles. In this paper we proposed new method for personalizing results of information retrieval systems based on extended fuzzy concept networks. In this method both pages and user profiles will be showed as extended fuzzy concept networks. In an extended fuzzy concept network, there are four kinds of fuzzy relationships between concepts (1) fuzzy positive association (2) fuzzy negative association (3) fuzzy generalization (4) fuzzy specialization. An extended fuzzy concept network can be modeled by a relation matrix and a relevance matrix, where the elements in a relation matrix represent the fuzzy relationships between concepts, and the elements in a relevance matrix indicate the degrees of relevance between concepts Advantage of this method is to find the most documents with respect to the user's query and more flexible and better showing user.
随着电子文档和用户的增加,信息检索系统的个性化结果产生了新的范例,其目标是根据用户的个人资料更好地为用户提供服务。个性化内容检索的目的是通过考虑个人用户的特殊兴趣来改进检索过程。信息检索系统的目标是基于用户档案对文档进行个性化排序。本文提出了一种基于扩展模糊概念网络的信息检索系统个性化结果的新方法。在这种方法中,页面和用户档案将被表示为扩展模糊概念网络。在一个扩展模糊概念网络中,概念之间存在四种模糊关系(1)模糊正关联(2)模糊负关联(3)模糊泛化(4)模糊专门化。一个扩展的模糊概念网络可以通过关系矩阵和关联矩阵来建模,其中关系矩阵中的元素表示概念之间的模糊关系,关联矩阵中的元素表示概念之间的关联程度。该方法的优点是相对于用户的查询找到最多的文档,并且更灵活、更好地显示用户。
{"title":"Personalizing Results of Information Retrieval Systems Using Extended Fuzzy Concept Networks","authors":"P. Moradi, M. Ebrahim, M. Ebadzadeh","doi":"10.1109/ICTTA.2008.4530007","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530007","url":null,"abstract":"The increasing of the electronic documents and users has led to the creation of new paradigms of personalizing results of information retrieval systems and its goal is to better service to users based on their profiles. Personalized content retrieval aims at improving the retrieval process by taking into account the particular interests of individual users. The goal of information retrieval systems is to personalize ranking documents based on user profiles. In this paper we proposed new method for personalizing results of information retrieval systems based on extended fuzzy concept networks. In this method both pages and user profiles will be showed as extended fuzzy concept networks. In an extended fuzzy concept network, there are four kinds of fuzzy relationships between concepts (1) fuzzy positive association (2) fuzzy negative association (3) fuzzy generalization (4) fuzzy specialization. An extended fuzzy concept network can be modeled by a relation matrix and a relevance matrix, where the elements in a relation matrix represent the fuzzy relationships between concepts, and the elements in a relevance matrix indicate the degrees of relevance between concepts Advantage of this method is to find the most documents with respect to the user's query and more flexible and better showing user.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131303881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Three-Dimensional Transmission Line Matrix Method (TLM) In Curvilinear Coordinates 曲线坐标下的三维传输线矩阵法
H. Youssef, H. Elmokdad, F. Ndagijimana, J. Jomaah
The transmission line matrix TLM method is a numerical time-domain technique that has been widely used for solving a great variety of electromagnetic wave propagation problems. The space to be modeled is divided into discrete meshes. A good description of arbitrary geometry and boundaries remains a significant challenge in electromagnetic modeling concerning the computer resources and simulation time. A Cartesian mesh can be used in TLM to describe a regular boundary. Curved walls are represented by piecewise straight boundaries which induce spurious modes that are not acceptable in some problems. For the study of the propagation of electromagnetic waves in volumes having curvilinear boundaries, we propose and investigate new curvilinear discrete mesh. A TLM algorithm is developed directly from integral Maxwell's equations. The formulation and the scattering matrices for curvilinear node are presented. The accuracy of a particular curvilinear node (cylindrical node) will be proved.
传输线矩阵TLM方法是一种时域数值技术,已广泛应用于求解各种电磁波传播问题。将待建模的空间划分为离散网格。由于计算机资源和仿真时间的限制,如何很好地描述任意几何和边界仍然是电磁建模中的一个重大挑战。在TLM中,笛卡尔网格可以用来描述规则边界。弯曲的壁面用分段的直线边界表示,这会导致在某些问题中不能接受的伪模态。为了研究电磁波在具有曲线边界的体中的传播,我们提出并研究了新的曲线离散网格。从麦克斯韦方程组的积分出发,提出了一种TLM算法。给出了曲线节点散射矩阵的表达式和散射矩阵。将证明特定曲线节点(圆柱节点)的准确性。
{"title":"A Three-Dimensional Transmission Line Matrix Method (TLM) In Curvilinear Coordinates","authors":"H. Youssef, H. Elmokdad, F. Ndagijimana, J. Jomaah","doi":"10.1109/ICTTA.2008.4530142","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530142","url":null,"abstract":"The transmission line matrix TLM method is a numerical time-domain technique that has been widely used for solving a great variety of electromagnetic wave propagation problems. The space to be modeled is divided into discrete meshes. A good description of arbitrary geometry and boundaries remains a significant challenge in electromagnetic modeling concerning the computer resources and simulation time. A Cartesian mesh can be used in TLM to describe a regular boundary. Curved walls are represented by piecewise straight boundaries which induce spurious modes that are not acceptable in some problems. For the study of the propagation of electromagnetic waves in volumes having curvilinear boundaries, we propose and investigate new curvilinear discrete mesh. A TLM algorithm is developed directly from integral Maxwell's equations. The formulation and the scattering matrices for curvilinear node are presented. The accuracy of a particular curvilinear node (cylindrical node) will be proved.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125468340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A knowledge based system for post seismic evaluations 基于知识的地震后评价系统
H. Abed
After an earthquake, immediate damage inspections are needed to identify which buildings are safe and which will not resist to aftershocks following the main event. Inspections of damaged buildings are essential to avoid secondary disaster. It permits to identify buildings that can be entered and those that should be kept from entering or using. In Algeria, many disastrous earthquakes occurred these last years. The number of structural engineers is important but in such events, this number may be insufficient. In addition, the strain, the stress, the emotion generated by such situations affects the capacities of the experts. In this research, a case-based reasoning (CBR) system has been developed to assist the experts in the post-seismic damages diagnostics and in formulating recommendations. These recommendations concern the urgency measures (reparations and restorations of the structures) in the aim to provide security and to protect humans' lives.
地震发生后,需要立即进行损坏检查,以确定哪些建筑物是安全的,哪些建筑物无法抵抗主震后的余震。对受损建筑物的检查对于避免二次灾害至关重要。它允许识别可以进入的建筑物和不应该进入或使用的建筑物。在阿尔及利亚,最近几年发生了许多灾难性的地震。结构工程师的数量很重要,但在这种情况下,这个数量可能是不够的。此外,这种情况下产生的紧张、压力和情绪会影响专家的能力。在本研究中,开发了一个基于案例的推理系统,以协助专家进行震后损伤诊断和制定建议。这些建议涉及紧急措施(建筑物的赔偿和修复),目的是提供安全和保护人的生命。
{"title":"A knowledge based system for post seismic evaluations","authors":"H. Abed","doi":"10.1109/ICTTA.2008.4530306","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530306","url":null,"abstract":"After an earthquake, immediate damage inspections are needed to identify which buildings are safe and which will not resist to aftershocks following the main event. Inspections of damaged buildings are essential to avoid secondary disaster. It permits to identify buildings that can be entered and those that should be kept from entering or using. In Algeria, many disastrous earthquakes occurred these last years. The number of structural engineers is important but in such events, this number may be insufficient. In addition, the strain, the stress, the emotion generated by such situations affects the capacities of the experts. In this research, a case-based reasoning (CBR) system has been developed to assist the experts in the post-seismic damages diagnostics and in formulating recommendations. These recommendations concern the urgency measures (reparations and restorations of the structures) in the aim to provide security and to protect humans' lives.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126598229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1