In VANET, the researches based on the wireless LAN are conducting and the method based on 802.11a is being adapted in IEEE 802.11p WAVE (Wireless Access in Vehicular Environments). However, wireless LAN which uses a single channel in a competition can cause transmission delays because of a frequent collision and a use of CSMA/CA(Carrier Sense Multiple Access/Collision Avoidance) VANET(Vehicle Ad hoc Network) requiring a fast access. In this paper, we designed Clustering-based Multi-channel MAC(Media Access Control) protocol adequate to VANET and then confirmed the appropriate channel conditions in a V2V(Vehicle to Vehicle) communication on the basis of this protocol. The simulation results showed that a packet collision and a transmission delay by the use of an existing single channel based on the contention decreased more than 60% by making cluster head assign and manage each channel.
{"title":"CMMP: Clustering-Based Multi-channel MAC Protocol in VANET","authors":"Tae-Oh Kim, SungDae Jung, Sangsun Lee","doi":"10.1109/ICCEE.2009.196","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.196","url":null,"abstract":"In VANET, the researches based on the wireless LAN are conducting and the method based on 802.11a is being adapted in IEEE 802.11p WAVE (Wireless Access in Vehicular Environments). However, wireless LAN which uses a single channel in a competition can cause transmission delays because of a frequent collision and a use of CSMA/CA(Carrier Sense Multiple Access/Collision Avoidance) VANET(Vehicle Ad hoc Network) requiring a fast access. In this paper, we designed Clustering-based Multi-channel MAC(Media Access Control) protocol adequate to VANET and then confirmed the appropriate channel conditions in a V2V(Vehicle to Vehicle) communication on the basis of this protocol. The simulation results showed that a packet collision and a transmission delay by the use of an existing single channel based on the contention decreased more than 60% by making cluster head assign and manage each channel.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114060901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mahshid Zoyousefein, Saeedeh Hashemniaye Torshizi, A. Ghorbani
As a key component of personal computer, CRT monitor is the major source of compromising emanation. In this paper we design an emission-security standard which determines the allowable range of unwanted radiation emission from an electronic equipment to prevent eavesdropping of information. We assume a model for radiated emission from CRT and the results show that these emissions are approximately 25 decibel upper than proposed standard in VHF/UHF band. Nevertheless they are acceptable in published EMC standards.
{"title":"Security Limits for Electromagnetic Radiation from CRT Displays","authors":"Mahshid Zoyousefein, Saeedeh Hashemniaye Torshizi, A. Ghorbani","doi":"10.1109/ICCEE.2009.191","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.191","url":null,"abstract":"As a key component of personal computer, CRT monitor is the major source of compromising emanation. In this paper we design an emission-security standard which determines the allowable range of unwanted radiation emission from an electronic equipment to prevent eavesdropping of information. We assume a model for radiated emission from CRT and the results show that these emissions are approximately 25 decibel upper than proposed standard in VHF/UHF band. Nevertheless they are acceptable in published EMC standards.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122964171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Automatic building extraction is a bottleneck of automatic surveying and mapping of big scale urban image. For the single aerial gray-scale image, the automatic buildings extraction, an algorithm based on the principle of confrontation and using the priori knowledge of building is presented here. A two-dimension OTSU segmentation will be used to do the rough segmentation because of the characteristics of high-brightness which the roof of the building has; then we use mathematical morphology, image segmentation, edge detection and other measures to detect the non-building, so using the principle of confrontation and removing the non-buildings, the buildings can be extracted. At last the extraction result will be verified using the information of the building shadow, the area of building roof, altitude information and other prior knowledge, in order to improve the accuracy of building extraction in the aerial image. Moreover, the method proposed is test in our experiment using the true-color aerial image. Theoretical analysis and experimental results show building can be extracted effectively by means of the algorithm proposed and it is necessary to research deeply.
{"title":"Building Extraction from Aerial Imagery Based on the Principle of Confrontation and Priori Knowledge","authors":"Gang Xu, Liang. Gao, Xue Yuan","doi":"10.1109/ICCEE.2009.176","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.176","url":null,"abstract":"Automatic building extraction is a bottleneck of automatic surveying and mapping of big scale urban image. For the single aerial gray-scale image, the automatic buildings extraction, an algorithm based on the principle of confrontation and using the priori knowledge of building is presented here. A two-dimension OTSU segmentation will be used to do the rough segmentation because of the characteristics of high-brightness which the roof of the building has; then we use mathematical morphology, image segmentation, edge detection and other measures to detect the non-building, so using the principle of confrontation and removing the non-buildings, the buildings can be extracted. At last the extraction result will be verified using the information of the building shadow, the area of building roof, altitude information and other prior knowledge, in order to improve the accuracy of building extraction in the aerial image. Moreover, the method proposed is test in our experiment using the true-color aerial image. Theoretical analysis and experimental results show building can be extracted effectively by means of the algorithm proposed and it is necessary to research deeply.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127953355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The extensive dynamic capabilities of browsers allow for platforms of infinite extensibility and omni-functional power to be delivered via the internet. This paper considers the advantages of converting web pages into intelligent immersive omni–functional documents. Such standards-compliant documents can be intermingled with web structures to create powerful models for the next generation of internet usability. The paper documents the advantages of converting every webpage into a calculation platform (named CALCI Websheets) that demonstrate more power than the most advanced spreadsheet tools, and the interesting presentation possibilities associated with it. By providing multi-layered calculation elements, this medium provides powerful paradigms in the ability to calculate, to think and to present. Manipulation of complex data types in such spaces is specifically considered.
{"title":"Omni-functional Websheets: Advantages of Deeply Calculation Enabled Web","authors":"Joseph Pally, S. Yurttas","doi":"10.1109/ICCEE.2009.248","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.248","url":null,"abstract":"The extensive dynamic capabilities of browsers allow for platforms of infinite extensibility and omni-functional power to be delivered via the internet. This paper considers the advantages of converting web pages into intelligent immersive omni–functional documents. Such standards-compliant documents can be intermingled with web structures to create powerful models for the next generation of internet usability. The paper documents the advantages of converting every webpage into a calculation platform (named CALCI Websheets) that demonstrate more power than the most advanced spreadsheet tools, and the interesting presentation possibilities associated with it. By providing multi-layered calculation elements, this medium provides powerful paradigms in the ability to calculate, to think and to present. Manipulation of complex data types in such spaces is specifically considered.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121283970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Intrusion Detection Systems (IDS) for Mobile Ad hoc NETworks (MANETs) are necessary when they are deployed in reality. In This paper, we have presented a combined method of selecting IDS agent nodes in mobile ad hoc networks. Since, the IDS agents in MANET due to more activities need to more battery power. In our method, first, compromised nodes are detected and then the nodes with the highest energy power from among valid nodes as IDS agent nodes are considered. So, with this method, some valid nodes contribute in intrusion detection activities and costs of the network monitoring will be reduced and the network lifetime will be increased.
{"title":"An Efficient Method for Identifying IDS Agent Nodes by Discovering Compromised Nodes in MANET","authors":"M. Rafsanjani, A. Khavasi, A. Movaghar","doi":"10.1109/ICCEE.2009.74","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.74","url":null,"abstract":"Intrusion Detection Systems (IDS) for Mobile Ad hoc NETworks (MANETs) are necessary when they are deployed in reality. In This paper, we have presented a combined method of selecting IDS agent nodes in mobile ad hoc networks. Since, the IDS agents in MANET due to more activities need to more battery power. In our method, first, compromised nodes are detected and then the nodes with the highest energy power from among valid nodes as IDS agent nodes are considered. So, with this method, some valid nodes contribute in intrusion detection activities and costs of the network monitoring will be reduced and the network lifetime will be increased.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116707113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A cheap guidance system based on AT89C52 microcontroller is developed for facilitating visually impaired people. Ultrasonic sensors are used to calculate distance of the obstacles around the blind person to guide the user towards the available path. Output is in the form of voice which the blind person can hear e.g., right, left etc. In its advance mode, the system will be able to recognize objects using image processing algorithms. Results are presented to show the validity and performance of the system.
{"title":"A Low Cost Artificial Vision System for Visually Impaired People","authors":"Asim Iqbal, U. Farooq, Hassan Mahmood, M. Asad","doi":"10.1109/ICCEE.2009.187","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.187","url":null,"abstract":"A cheap guidance system based on AT89C52 microcontroller is developed for facilitating visually impaired people. Ultrasonic sensors are used to calculate distance of the obstacles around the blind person to guide the user towards the available path. Output is in the form of voice which the blind person can hear e.g., right, left etc. In its advance mode, the system will be able to recognize objects using image processing algorithms. Results are presented to show the validity and performance of the system.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116937881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Focus measures are an integral part for the passive 3D shape recovery methods. This paper presents an analysis of various well established focus measures with varying texture reflectance and source illumination. Five focus measures are selected from the literature. Three different microscopic objects are selected for testing the texture reflectance. Three different levels are opted for source illumination. Among the passive methods, Shape From Focus (SFF) is selected to test the focus measures for accuracy and precision of depth estimation.
焦点测量是被动三维形状恢复方法的重要组成部分。本文分析了不同纹理反射率和光源照度下各种已建立的焦点测量方法。从文献中选择了五个重点指标。选取三种不同的微观物体进行纹理反射率测试。光源照明选择了三个不同的层次。在被动方法中,选取焦点形状法(Shape From Focus, SFF)对焦点测量方法进行深度估计的准确性和精密度测试。
{"title":"Analysis of Effects of Texture Reflectance and Source Illumination on Focus Measures for Microscopic Images","authors":"A. Malik, T. Choi","doi":"10.1109/ICCEE.2009.148","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.148","url":null,"abstract":"Focus measures are an integral part for the passive 3D shape recovery methods. This paper presents an analysis of various well established focus measures with varying texture reflectance and source illumination. Five focus measures are selected from the literature. Three different microscopic objects are selected for testing the texture reflectance. Three different levels are opted for source illumination. Among the passive methods, Shape From Focus (SFF) is selected to test the focus measures for accuracy and precision of depth estimation.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117142927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Electrical Safety as a result of induced voltage is gaining more attention in the area of HV utilities. This paper discusses the Electrical safety in a pipeline running parallel to a HV transmission line, and the methods of calculating the mutual impedance between the HV and pipeline. In addition, it also introduces a method of calculating the induced voltage in the pipeline and its mitigation process
{"title":"AC Interference Study on Pipeline: The Impact of the OHEW under Full Load and Fault Current","authors":"M. Nassereddine, A. Hellany","doi":"10.1109/ICCEE.2009.139","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.139","url":null,"abstract":"Electrical Safety as a result of induced voltage is gaining more attention in the area of HV utilities. This paper discusses the Electrical safety in a pipeline running parallel to a HV transmission line, and the methods of calculating the mutual impedance between the HV and pipeline. In addition, it also introduces a method of calculating the induced voltage in the pipeline and its mitigation process","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117184311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Informational of the Construction Market Management has a great effort in helping to improve the order of Construction Market and strengthen the supervision of Construction Market. The Article has analyzed the management measures and guarantee methods in practicing the informational process in the Chinese Construction Market Management, includes major aims, system design principles, internet design proposal, major guarantee contains and system design requirements of the Construction Market Management Information System.
{"title":"The Analyzing and Design of China Construction Market Management Information System","authors":"Jian Luo, Wenzhou Zhu, Q. Cheng","doi":"10.1109/ICCEE.2009.115","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.115","url":null,"abstract":"The Informational of the Construction Market Management has a great effort in helping to improve the order of Construction Market and strengthen the supervision of Construction Market. The Article has analyzed the management measures and guarantee methods in practicing the informational process in the Chinese Construction Market Management, includes major aims, system design principles, internet design proposal, major guarantee contains and system design requirements of the Construction Market Management Information System.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114150372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The boiler thermal control system is well known with the characteristic of slow time-varying, large lag and large inertia. Adopting generalized Jordan block and algebra equivalence transform method, all of the transfer functions at different load points is transformed to state-space description with time variable. According to engineering practice of control strategy based on incremental function observer and combined PID, the stability robustness is studied and present some corresponding infers. The simulation and engineering have testified the correctness of theoretical analysis and steady robustness of the system.
{"title":"Transform and Stability Analysis of Nonlinear Time-Varying Control System","authors":"Z. Han, Cui-hui Yan, Zhi Zhang","doi":"10.1109/ICCEE.2009.67","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.67","url":null,"abstract":"The boiler thermal control system is well known with the characteristic of slow time-varying, large lag and large inertia. Adopting generalized Jordan block and algebra equivalence transform method, all of the transfer functions at different load points is transformed to state-space description with time variable. According to engineering practice of control strategy based on incremental function observer and combined PID, the stability robustness is studied and present some corresponding infers. The simulation and engineering have testified the correctness of theoretical analysis and steady robustness of the system.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114494730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}