首页 > 最新文献

2009 Second International Conference on Computer and Electrical Engineering最新文献

英文 中文
Remote Usability Evaluation System (e-RUE) 远程可用性评估系统(e-RUE)
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.247
Rafidah Ramli, A. Jaafar, H. Mohamed
Usability evaluation is part of the software development cycle. Throughout the years, various methodologies have been used to evaluate software effectiveness, efficiency and satisfaction. The capabilities of Internet technologies has make possible to run usability evaluation remotely via online. The usability evaluation can be run from different geographical locations between the respondents, experts and researchers. This paper discusses the development of online remote usability evaluation (e-RUE) in a Web-based environment. The development of e-RUE is a possible solution for usability evaluation.
可用性评估是软件开发周期的一部分。多年来,各种方法被用于评估软件的有效性、效率和满意度。Internet技术的功能使得通过在线远程运行可用性评估成为可能。可用性评估可以在受访者、专家和研究人员之间的不同地理位置进行。本文讨论了基于web环境下在线远程可用性评估(e-RUE)的发展。开发e-RUE是可用性评估的一种可能的解决方案。
{"title":"Remote Usability Evaluation System (e-RUE)","authors":"Rafidah Ramli, A. Jaafar, H. Mohamed","doi":"10.1109/ICCEE.2009.247","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.247","url":null,"abstract":"Usability evaluation is part of the software development cycle. Throughout the years, various methodologies have been used to evaluate software effectiveness, efficiency and satisfaction. The capabilities of Internet technologies has make possible to run usability evaluation remotely via online. The usability evaluation can be run from different geographical locations between the respondents, experts and researchers. This paper discusses the development of online remote usability evaluation (e-RUE) in a Web-based environment. The development of e-RUE is a possible solution for usability evaluation.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116083046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Channel Spacing for Maximum Performance of 5 GHz WLAN Backhaul Links 实现5ghz WLAN回程链路最大性能的信道间隔
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.213
S. Abbasi, Quratulain Kalhoro, M. A. Kalhoro
This study deals to quantify the impact of Adjacent Channel Interference (ACI) in multi-radio 802.11a based wireless nodes designed for WLAN. The nodes are equipped with three 802.11a wireless interfaces, two for backhaul connectivity with directional antennas and one for Access Point (AP) functionality. Adjacent channels in 802.11a are considered to be non-overlapping and expected ACI would be almost negligible. Observed results are, 802.11a channels produces significant interference when adjacent channels are assigned in consecutive order to nodes or to the nodes which are placed in the beam of directional antennas, they are being known as directed nodes. Our work focuses mainly on backhaul of 802.11a, we propose a channel assignment technique where adjacent nodes and directed nodes are placed with spacing of one channel, Conflict graph and greedy algorithms for channel assignment to backhaul links have been used. We evaluate our technique by OPNET 14 simulations, where we quantify the effect of ACI in terms of throughput, observed results for our proposed technique have shown that the throughput of the network is doubled as compared to system where channels are assign to adjacent nodes with consecutive channels without spacing of channel.
本研究旨在量化设计用于WLAN的基于802.11a的多无线电无线节点中相邻信道干扰(ACI)的影响。这些节点配备了三个802.11a无线接口,其中两个用于带定向天线的回程连接,另一个用于接入点(AP)功能。在802.11a中,相邻信道被认为是不重叠的,预期的ACI几乎可以忽略不计。观察到的结果是,当相邻信道按连续顺序分配给节点或放置在定向天线波束中的节点时,802.11a信道产生显著的干扰,它们被称为定向节点。我们的工作主要集中在802.11a的回程上,我们提出了一种信道分配技术,其中相邻节点和有向节点以一个信道的间隔放置,并使用冲突图和贪婪算法对回程链路进行信道分配。我们通过OPNET 14模拟来评估我们的技术,我们在吞吐量方面量化了ACI的影响,我们提出的技术的观察结果表明,与将信道分配给具有连续信道的相邻节点而没有信道间隔的系统相比,网络的吞吐量增加了一倍。
{"title":"Channel Spacing for Maximum Performance of 5 GHz WLAN Backhaul Links","authors":"S. Abbasi, Quratulain Kalhoro, M. A. Kalhoro","doi":"10.1109/ICCEE.2009.213","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.213","url":null,"abstract":"This study deals to quantify the impact of Adjacent Channel Interference (ACI) in multi-radio 802.11a based wireless nodes designed for WLAN. The nodes are equipped with three 802.11a wireless interfaces, two for backhaul connectivity with directional antennas and one for Access Point (AP) functionality. Adjacent channels in 802.11a are considered to be non-overlapping and expected ACI would be almost negligible. Observed results are, 802.11a channels produces significant interference when adjacent channels are assigned in consecutive order to nodes or to the nodes which are placed in the beam of directional antennas, they are being known as directed nodes. Our work focuses mainly on backhaul of 802.11a, we propose a channel assignment technique where adjacent nodes and directed nodes are placed with spacing of one channel, Conflict graph and greedy algorithms for channel assignment to backhaul links have been used. We evaluate our technique by OPNET 14 simulations, where we quantify the effect of ACI in terms of throughput, observed results for our proposed technique have shown that the throughput of the network is doubled as compared to system where channels are assign to adjacent nodes with consecutive channels without spacing of channel.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125397398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Algorithm for Generating Prose to Poem in Persian Language 一种波斯语散文到诗歌的生成算法
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.111
H. Asadollahi, M. M. Teymoori, Morteza Saberi Kamarposhti
The most important part of poem in Persian language is rhythm. Normally, poem includes three parts, verse, rhythm and rhyme but if there are some sentences just with rhythm, we can call it poem. As result for making poem we focus on rhythm. In our method, we should make computer program by our proposed algorithm then for converting prose to poem, we should enter two fundamental parts. Firstly, the sentences that we want convert to poem. Secondly, pattern rhythm. The program make some suggestion verses and user, poet, can use of them. For making a program by our proposed algorithm we need a dictionary including, Persian words by translations to other synonym words also, syllable of each word.
波斯语诗歌中最重要的部分是韵律。通常,诗包括诗、节奏和押韵三部分,但如果有一些句子只有节奏,我们可以称之为诗。因此,我们在创作诗歌时注重节奏。在我们的方法中,我们应该用我们提出的算法来编写计算机程序,那么对于散文到诗歌的转换,我们应该分成两个基本部分。首先,我们要转换成诗歌的句子。第二,模式节奏。该程序提出了一些建议诗句和用户,诗人,可以使用它们。为了用我们提出的算法编写一个程序,我们需要一个字典,包括波斯语单词的同义词翻译,以及每个单词的音节。
{"title":"An Algorithm for Generating Prose to Poem in Persian Language","authors":"H. Asadollahi, M. M. Teymoori, Morteza Saberi Kamarposhti","doi":"10.1109/ICCEE.2009.111","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.111","url":null,"abstract":"The most important part of poem in Persian language is rhythm. Normally, poem includes three parts, verse, rhythm and rhyme but if there are some sentences just with rhythm, we can call it poem. As result for making poem we focus on rhythm. In our method, we should make computer program by our proposed algorithm then for converting prose to poem, we should enter two fundamental parts. Firstly, the sentences that we want convert to poem. Secondly, pattern rhythm. The program make some suggestion verses and user, poet, can use of them. For making a program by our proposed algorithm we need a dictionary including, Persian words by translations to other synonym words also, syllable of each word.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126990551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Edge Detection Using BP Neural Network Based on Threshold Binarization 基于阈值二值化的BP神经网络边缘检测
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.144
H. Mehrara, Mohammad Zahedinejad, A. Pourmohammad
One of the most fundamental features of digital image and the basic steps in image processing, analysis, pattern recognition and computer vision is the Edge of image where the preciseness and reliability of its results will affect directly the comprehension machine system made for objective world. Several edge detectors have been developed in the past decades, although no single edge detectors have been developed satisfactorily enough for all application. In this paper, a new edge detection technique is proposed basis on the BP neural network. Here, it is classified the edge patterns of binary images into 16 possible types of visual patterns. In the following, After training the pre-defined edge patterns, the BP neural network is applied to correspond any type of edges with its related visual pattern. The results demonstrated that the new proposed technique provides the better results compared with traditional edge detection techniques while improved the computations complexity.
图像边缘是数字图像最基本的特征之一,也是图像处理、分析、模式识别和计算机视觉的基本步骤,其结果的准确性和可靠性将直接影响到面向客观世界的理解机系统。在过去的几十年里,已经开发了几种边缘检测器,尽管没有一种边缘检测器被开发得足以满足所有应用。本文提出了一种基于BP神经网络的边缘检测方法。本文将二值图像的边缘模式分为16种可能的视觉模式。在训练了预定义的边缘模式后,应用BP神经网络将任意类型的边缘与其相关的视觉模式相对应。结果表明,与传统的边缘检测技术相比,该方法在提高计算复杂度的同时取得了更好的检测效果。
{"title":"Novel Edge Detection Using BP Neural Network Based on Threshold Binarization","authors":"H. Mehrara, Mohammad Zahedinejad, A. Pourmohammad","doi":"10.1109/ICCEE.2009.144","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.144","url":null,"abstract":"One of the most fundamental features of digital image and the basic steps in image processing, analysis, pattern recognition and computer vision is the Edge of image where the preciseness and reliability of its results will affect directly the comprehension machine system made for objective world. Several edge detectors have been developed in the past decades, although no single edge detectors have been developed satisfactorily enough for all application. In this paper, a new edge detection technique is proposed basis on the BP neural network. Here, it is classified the edge patterns of binary images into 16 possible types of visual patterns. In the following, After training the pre-defined edge patterns, the BP neural network is applied to correspond any type of edges with its related visual pattern. The results demonstrated that the new proposed technique provides the better results compared with traditional edge detection techniques while improved the computations complexity.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127833023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Botnet Command and Control Mechanisms 僵尸网络命令和控制机制
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.151
Hossein Rouhani Zeidanloo, A. Manaf
Botnet is most widespread and occurs commonly in today's cyber attacks, resulting in serious threats to our network assets and organization's properties. Botnets are collections of compromised computers (Bots) which are remotely controlled by its originator (BotMaster) under a common Commond-and-Control (C & C) infrastructure. They are used to distribute commands to the Bots for malicious activities such as distributed denial-of-service (DDoS) attacks, sending large amount of SPAM and other nefarious purposes. Understanding the Botnet C & C channels is a critical component to precisely identify, detect, and mitigate the Botnets threats. Therefore, in this paper we provide a classification of Botnets C & C channels and evaluate well-known protocols (e.g. IRC, HTTP, and P2P) which are being used in each of them.
僵尸网络是当今网络攻击中最广泛和最常见的,对我们的网络资产和组织财产造成严重威胁。僵尸网络是受感染的计算机(Bots)的集合,这些计算机由其发起者(BotMaster)在通用的通用与控制(c&c)基础设施下远程控制。它们被用来向bot分发命令,用于恶意活动,如分布式拒绝服务(DDoS)攻击,发送大量垃圾邮件和其他恶意目的。了解僵尸网络的控制和控制通道是精确识别、检测和减轻僵尸网络威胁的关键组成部分。因此,在本文中,我们提供了僵尸网络C & C通道的分类,并评估了在每个僵尸网络中使用的知名协议(例如IRC, HTTP和P2P)。
{"title":"Botnet Command and Control Mechanisms","authors":"Hossein Rouhani Zeidanloo, A. Manaf","doi":"10.1109/ICCEE.2009.151","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.151","url":null,"abstract":"Botnet is most widespread and occurs commonly in today's cyber attacks, resulting in serious threats to our network assets and organization's properties. Botnets are collections of compromised computers (Bots) which are remotely controlled by its originator (BotMaster) under a common Commond-and-Control (C & C) infrastructure. They are used to distribute commands to the Bots for malicious activities such as distributed denial-of-service (DDoS) attacks, sending large amount of SPAM and other nefarious purposes. Understanding the Botnet C & C channels is a critical component to precisely identify, detect, and mitigate the Botnets threats. Therefore, in this paper we provide a classification of Botnets C & C channels and evaluate well-known protocols (e.g. IRC, HTTP, and P2P) which are being used in each of them.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121549152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 81
Characterization of Software Projects by Restructuring Parameters for Usability Evaluation 通过重构可用性评估参数来描述软件项目的特征
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.216
K. Paithankar, D. M. Ingle
Every software project progresses through a development process with necessary involvement of developers and users both. For evaluation of the software to confirm its phase wise goals, objectives and quality, developers and customers must reach to a win-win condition. It has been observed that the user satisfaction is the most important factor that must be emphasized in software development and thus, usability is an indispensable feature of a software project. Inclusion of usability dictates determination of existence of usability at different stages of development for measurement of user performance and user satisfaction. Various criteria known as software parameters are employed to evaluate the software for realizing certain level of usability. These criteria may be applied for software estimations and are also involved in several assessments during software development process. Variety of well defined and well structured parameters such as size, duration, files used, external inputs, external outputs, external queries etc. are available to support development of desirable software. Further, based upon these parameters other important software estimations may be derived. Though there exist various dimensions of employing the parameters based on the requirements of a software project, these parameters must be redefined and restructured to evaluate usability of software to produce usable software. In this paper, we restructure the software project parameters for evaluation of software usability. It will lead to overall characterization of the projects in usability perspective. Also, it will be useful for ranking usability attributes and measuring usability subsequently.
每个软件项目都要经历开发过程,开发人员和用户都必须参与其中。为了对软件进行评估以确认其阶段性目标、目的和质量,开发人员和客户必须达到双赢的条件。用户满意度是软件开发中必须强调的最重要的因素,因此,可用性是软件项目不可或缺的特征。包含可用性要求在不同的开发阶段确定可用性的存在,以测量用户性能和用户满意度。各种被称为软件参数的标准被用来评估软件,以实现一定程度的可用性。这些标准可以应用于软件评估,并且在软件开发过程中也涉及到一些评估。各种定义良好、结构良好的参数,如大小、持续时间、使用的文件、外部输入、外部输出、外部查询等,可用于支持理想软件的开发。此外,基于这些参数,可以推导出其他重要的软件估计。尽管基于软件项目的需求存在着使用参数的不同维度,但是这些参数必须被重新定义和重构,以评估软件的可用性,从而产生可用的软件。本文对软件可用性评价的软件项目参数进行了重构。它将从可用性的角度对项目进行全面的描述。此外,它将有助于对可用性属性进行排序和随后的可用性度量。
{"title":"Characterization of Software Projects by Restructuring Parameters for Usability Evaluation","authors":"K. Paithankar, D. M. Ingle","doi":"10.1109/ICCEE.2009.216","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.216","url":null,"abstract":"Every software project progresses through a development process with necessary involvement of developers and users both. For evaluation of the software to confirm its phase wise goals, objectives and quality, developers and customers must reach to a win-win condition. It has been observed that the user satisfaction is the most important factor that must be emphasized in software development and thus, usability is an indispensable feature of a software project. Inclusion of usability dictates determination of existence of usability at different stages of development for measurement of user performance and user satisfaction. Various criteria known as software parameters are employed to evaluate the software for realizing certain level of usability. These criteria may be applied for software estimations and are also involved in several assessments during software development process. Variety of well defined and well structured parameters such as size, duration, files used, external inputs, external outputs, external queries etc. are available to support development of desirable software. Further, based upon these parameters other important software estimations may be derived. Though there exist various dimensions of employing the parameters based on the requirements of a software project, these parameters must be redefined and restructured to evaluate usability of software to produce usable software. In this paper, we restructure the software project parameters for evaluation of software usability. It will lead to overall characterization of the projects in usability perspective. Also, it will be useful for ranking usability attributes and measuring usability subsequently.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"113 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122056797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
P-ary Subdivision Generalizing B-splines 广义b样条的p - y细分
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.204
Hongchan Zheng, Meigui Hu, Guohua Peng
Based on the p-ary subdivision rules for B-splines, we show how to design more general subdivision schemes that preserve the B-spline smoothness exactly or almost. We illustrate the technique with new 4-point C5 binary, 4-point C3 ternary and C4 ternary subdivision schemes.
基于b样条的p元细分规则,我们展示了如何设计更一般的细分方案,以完全或几乎保持b样条的光滑性。我们用新的4点C5二进制,4点C3三进制和C4三进制细分方案来说明该技术。
{"title":"P-ary Subdivision Generalizing B-splines","authors":"Hongchan Zheng, Meigui Hu, Guohua Peng","doi":"10.1109/ICCEE.2009.204","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.204","url":null,"abstract":"Based on the p-ary subdivision rules for B-splines, we show how to design more general subdivision schemes that preserve the B-spline smoothness exactly or almost. We illustrate the technique with new 4-point C5 binary, 4-point C3 ternary and C4 ternary subdivision schemes.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126295654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Constrained Reactive Power Control Using Evolutionary Computation Technique for Static Security Enhancement 基于进化计算技术的约束无功控制静态安全增强
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.116
N. Abdullah, I. Musirin, Muhammad Murthada
This paper presents Evolutionary Computing technique for solving constrained reactive power control (CRPC) problem in the attempt to enhance voltage stability under contingencies, while minimizing transmission loss and maintaining voltage level at an acceptable level. In this study, evolutionary programming (EP) was chosen as the Evolutionary Computing (EC) technique for solving the CRPC; taking into consideration two separate objective functions. Static voltage stability enhancement and minimization of real power loss are implemented separately on a reliability test system. Comparative studies performed with respect to Artificial Immune System (AIS) have highlighted that EP outperformed AIS for both objective functions.
本文提出了一种求解约束无功控制(CRPC)问题的进化计算技术,以提高突发事件下的电压稳定性,同时最小化传输损耗并将电压水平维持在可接受的水平。本文选择进化规划(EP)作为求解CRPC问题的进化计算(EC)技术;考虑两个独立的目标函数。在可靠性测试系统中分别实现了增强静态电压稳定性和减小实际功率损耗。与人工免疫系统(AIS)进行的比较研究强调,EP在两个目标功能上都优于AIS。
{"title":"Constrained Reactive Power Control Using Evolutionary Computation Technique for Static Security Enhancement","authors":"N. Abdullah, I. Musirin, Muhammad Murthada","doi":"10.1109/ICCEE.2009.116","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.116","url":null,"abstract":"This paper presents Evolutionary Computing technique for solving constrained reactive power control (CRPC) problem in the attempt to enhance voltage stability under contingencies, while minimizing transmission loss and maintaining voltage level at an acceptable level. In this study, evolutionary programming (EP) was chosen as the Evolutionary Computing (EC) technique for solving the CRPC; taking into consideration two separate objective functions. Static voltage stability enhancement and minimization of real power loss are implemented separately on a reliability test system. Comparative studies performed with respect to Artificial Immune System (AIS) have highlighted that EP outperformed AIS for both objective functions.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128237939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Intruder Location Tracking 入侵者位置跟踪
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.53
Hossein Rouhani Zeidanloo, M. A. Ngadi
Since wireless networks provide flexibility, mobility and convenience in setup, they became more widespread today. However, due to the nature of wireless networks that use shared medium for communications it needs more security features as its wired counterpart. Attackers can use proper devices and techniques to pull signals from the air and gain access to the unprotected wireless networks from anywhere in range of wireless network which receive wireless signals. Therefore, it is very difficult to trace back to the attacker. The three current location tracking solution: Closest Access Point, Triangulation and Radio Frequency Fingerprinting have their own limitations in tracing wireless intruders. In this paper, in the beginning we consider discovering wireless networks techniques and then overview the three current solutions for location tracking and also propose an amendment for Triangulation method that aims to overcome the limitations of this method.
由于无线网络在设置上提供了灵活性、移动性和便利性,它们在今天变得更加普遍。然而,由于无线网络使用共享介质进行通信的特性,它需要比有线网络更多的安全特性。攻击者可以使用适当的设备和技术从空中提取信号,并从接收无线信号的无线网络范围内的任何地方进入未受保护的无线网络。因此,很难追踪到攻击者。目前的三种位置跟踪解决方案:最近接入点,三角测量和射频指纹在跟踪无线入侵者方面有其自身的局限性。在本文中,我们首先考虑发现无线网络技术,然后概述了目前三种位置跟踪解决方案,并提出了对三角测量方法的修正,旨在克服该方法的局限性。
{"title":"Intruder Location Tracking","authors":"Hossein Rouhani Zeidanloo, M. A. Ngadi","doi":"10.1109/ICCEE.2009.53","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.53","url":null,"abstract":"Since wireless networks provide flexibility, mobility and convenience in setup, they became more widespread today. However, due to the nature of wireless networks that use shared medium for communications it needs more security features as its wired counterpart. Attackers can use proper devices and techniques to pull signals from the air and gain access to the unprotected wireless networks from anywhere in range of wireless network which receive wireless signals. Therefore, it is very difficult to trace back to the attacker. The three current location tracking solution: Closest Access Point, Triangulation and Radio Frequency Fingerprinting have their own limitations in tracing wireless intruders. In this paper, in the beginning we consider discovering wireless networks techniques and then overview the three current solutions for location tracking and also propose an amendment for Triangulation method that aims to overcome the limitations of this method.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"56 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130586862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Predicting NDUM Student's Academic Performance Using Data Mining Techniques 利用数据挖掘技术预测新大学生的学习成绩
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.168
Muslihah Wook, Y. H. Yahaya, Norshahriah Wahab, M. Isa, N. Awang, Hoo Yann Seong
The ability to predict the students’ academic performance is very important in institution educational system. Recently some researchers have been proposed data mining techniques for higher education. In this paper, we compare two data mining techniques which are: Artificial Neural Network (ANN) and the combination of clustering and decision tree classification techniques for predicting and classifying students’ academic performance. The data set used in this research is the student data of Computer Science Department, Faculty of Science and Defence Technology, National Defence University of Malaysia (NDUM).
对学生学习成绩的预测能力在高校教育体系中是非常重要的。近年来,一些研究人员提出了高等教育数据挖掘技术。在本文中,我们比较了两种数据挖掘技术:人工神经网络(ANN)和聚类与决策树相结合的分类技术,用于预测和分类学生的学习成绩。本研究使用的数据集为马来西亚国防大学(NDUM)科学与国防技术学院计算机科学系学生数据。
{"title":"Predicting NDUM Student's Academic Performance Using Data Mining Techniques","authors":"Muslihah Wook, Y. H. Yahaya, Norshahriah Wahab, M. Isa, N. Awang, Hoo Yann Seong","doi":"10.1109/ICCEE.2009.168","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.168","url":null,"abstract":"The ability to predict the students’ academic performance is very important in institution educational system. Recently some researchers have been proposed data mining techniques for higher education. In this paper, we compare two data mining techniques which are: Artificial Neural Network (ANN) and the combination of clustering and decision tree classification techniques for predicting and classifying students’ academic performance. The data set used in this research is the student data of Computer Science Department, Faculty of Science and Defence Technology, National Defence University of Malaysia (NDUM).","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132767055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
期刊
2009 Second International Conference on Computer and Electrical Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1