This work presents the analysis and performance of connecting two wind power generation systems with the energy storage at the dc side. Energy storage is desirable to be installed to keep constant output from the wind power generation system. The DC connection of two wind power generation system helps to exchange power between the two systems and can suppress the disturbance of the output power to the utility systems longer than the stand alone system. The performance of connecting two wind generation systems with the energy storage at the dc side has been investigated by using the simulation. The wind power generation system is modeled and simulated by MATLAB/Simulink and the effectiveness of the dc connection of two systems is presented. This effect is easily achieved and implemented without any additional control. The controller measures only the common dc side capacitor voltage of the local system. MATLAB/Simulink simulation verifies the better performance in a certain situation.
{"title":"Analysis of DC Connection for Capacitor Energy Storage in Wind Power Generation System","authors":"V. J. Yeshwenth, R. Udhayaprakash, N. Krishna","doi":"10.1109/ICCEE.2008.143","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.143","url":null,"abstract":"This work presents the analysis and performance of connecting two wind power generation systems with the energy storage at the dc side. Energy storage is desirable to be installed to keep constant output from the wind power generation system. The DC connection of two wind power generation system helps to exchange power between the two systems and can suppress the disturbance of the output power to the utility systems longer than the stand alone system. The performance of connecting two wind generation systems with the energy storage at the dc side has been investigated by using the simulation. The wind power generation system is modeled and simulated by MATLAB/Simulink and the effectiveness of the dc connection of two systems is presented. This effect is easily achieved and implemented without any additional control. The controller measures only the common dc side capacitor voltage of the local system. MATLAB/Simulink simulation verifies the better performance in a certain situation.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129296386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The scale of spatial data is usually very large. Clustering algorithm needs very high performance, good scalability, and able to deal with noise data and high-dimensional data. Proposed a quickly clustering algorithm based on one-dimensional distance calculation. The algorithm first partitions space-sets by one-dimensional distance, then clusters space-sets by set-distance and set-density. Next, uses the same approach to the next dimension, until all dimensions have been processed. Experimental results show ODDC algorithm has high-efficient features and is not sensitive to noise data.
{"title":"ODDC: A Novel Clustering Algorithm Based on One-Dimensional Distance Calculation","authors":"Xue-gang Wang, Zhongzhi Li","doi":"10.1109/ICCEE.2008.52","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.52","url":null,"abstract":"The scale of spatial data is usually very large. Clustering algorithm needs very high performance, good scalability, and able to deal with noise data and high-dimensional data. Proposed a quickly clustering algorithm based on one-dimensional distance calculation. The algorithm first partitions space-sets by one-dimensional distance, then clusters space-sets by set-distance and set-density. Next, uses the same approach to the next dimension, until all dimensions have been processed. Experimental results show ODDC algorithm has high-efficient features and is not sensitive to noise data.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"613 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117081854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Du, Ling Ruan, Chun Zhao, J. Ruan, Yun-fei Wu, Tao Wang
In order to investigate the propagation of partial discharge pulses in transformer winding, the simulation model of a 180 turns continuous disc type transformer winding based on multi-conductor transmission line (MTL) theory is constructed. According to the symmetry of windings, a 2D equivalent finite element model is set up under ANSYS environment. A modified method is proposed to calculate the K matrix that decrease distinctly calculation cost without loss of accuracy. For the evaluation of L and R parameter of transformer with iron core in MHz frequency area, the skin effect of conductors and iron area is taken into consideration. The frequency-dependent parameters are calculated first by time harmonic magnetic field analysis. The proposed methods of calculating parameters are helpful to research on propagation characteristic of partial discharge (PD) pulses in electric equipments.
{"title":"Calculation of Electrical Parameters for Studies on Propagation Characteristic of PD along Transformer Winding","authors":"Z. Du, Ling Ruan, Chun Zhao, J. Ruan, Yun-fei Wu, Tao Wang","doi":"10.1109/ICCEE.2008.115","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.115","url":null,"abstract":"In order to investigate the propagation of partial discharge pulses in transformer winding, the simulation model of a 180 turns continuous disc type transformer winding based on multi-conductor transmission line (MTL) theory is constructed. According to the symmetry of windings, a 2D equivalent finite element model is set up under ANSYS environment. A modified method is proposed to calculate the K matrix that decrease distinctly calculation cost without loss of accuracy. For the evaluation of L and R parameter of transformer with iron core in MHz frequency area, the skin effect of conductors and iron area is taken into consideration. The frequency-dependent parameters are calculated first by time harmonic magnetic field analysis. The proposed methods of calculating parameters are helpful to research on propagation characteristic of partial discharge (PD) pulses in electric equipments.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114408457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Two important factors in any clustered microarchitecture are the intercluster communication penalties (involved when importing operands from another cluster) and workload balance (involves the balanced utilization of each cluster's computing resources). The goal in any design undertaking is to minimize the former and maximize the latter, failure in any of which would degrade the microarchitecture's performance. A novel technique that could mitigate intercluster communication penalties, called register caching, is explored in this paper. Register caching involves buffering or caching a very small number of register or operand values imported from another cluster (and thus having incurred intercluster communication penalty) with the hopes that they'd be referenced again without being modified. Should the said referencing happen, the cluster would no longer have to import the values again, and intercluster communication penalty savings are incurred. Effectiveness of replacement algorithms, necessary since the register cache would be full most of the time, would be explored in this paper, along with the technique's performance as a function of register cache size and intercluster communication latency values.
{"title":"Register Caching as a Way of Mitigating Intercluster Communication Penalties in Clustered Microarchitectures","authors":"W.M. Tan, L. Alarilla, A. Álvarez","doi":"10.1109/ICCEE.2008.169","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.169","url":null,"abstract":"Two important factors in any clustered microarchitecture are the intercluster communication penalties (involved when importing operands from another cluster) and workload balance (involves the balanced utilization of each cluster's computing resources). The goal in any design undertaking is to minimize the former and maximize the latter, failure in any of which would degrade the microarchitecture's performance. A novel technique that could mitigate intercluster communication penalties, called register caching, is explored in this paper. Register caching involves buffering or caching a very small number of register or operand values imported from another cluster (and thus having incurred intercluster communication penalty) with the hopes that they'd be referenced again without being modified. Should the said referencing happen, the cluster would no longer have to import the values again, and intercluster communication penalty savings are incurred. Effectiveness of replacement algorithms, necessary since the register cache would be full most of the time, would be explored in this paper, along with the technique's performance as a function of register cache size and intercluster communication latency values.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114775250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The scope of this paper is to present the necessity to improve the existent ambient intelligence model with respect to data security. The security of such a model poses a great challenge due to the fact that different networks are mixing in order to provide such an environment. In addition, these networks are generally deployed and then left unattended. All these aspects joined together make it unfeasible to directly apply the traditional security mechanisms. Therefore, there is a need to analyze and better understand the security requirements of these networks. This paper provides the specific security attacks to such a model and supplies a solution for these attacks.
{"title":"Fault Tolerance Issues in Non-Traditional Grids Implemented with Intelligent Agents","authors":"R. Bogdan, V. Ancușa, M. Vladutiu","doi":"10.1109/ICCEE.2008.39","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.39","url":null,"abstract":"The scope of this paper is to present the necessity to improve the existent ambient intelligence model with respect to data security. The security of such a model poses a great challenge due to the fact that different networks are mixing in order to provide such an environment. In addition, these networks are generally deployed and then left unattended. All these aspects joined together make it unfeasible to directly apply the traditional security mechanisms. Therefore, there is a need to analyze and better understand the security requirements of these networks. This paper provides the specific security attacks to such a model and supplies a solution for these attacks.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125337374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The BLISK (blade integrated disk) is a new structural component of the modern aero-engine and plays an important role in improving its performance. However, it's very difficult to measure the BLISK because of its complicated shape. A novel method for measuring BLISK online is introduced in this paper. An industry robot, an electronic lever indicator and a revolving table are used to measure the BLISK via coordinate transformations in the measurement system. Some key points such as the kinematics model of the system, the calibration of the system and measuring method are discussed. Experimental results demonstrate the effectiveness of the proposed method.
{"title":"Measurement of Aero-Engine BLISK Using Industry Robot","authors":"Jin Huang, Zi Ma, Ying Hu, Yang Wang, Shuanghe Yu","doi":"10.1109/ICCEE.2008.45","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.45","url":null,"abstract":"The BLISK (blade integrated disk) is a new structural component of the modern aero-engine and plays an important role in improving its performance. However, it's very difficult to measure the BLISK because of its complicated shape. A novel method for measuring BLISK online is introduced in this paper. An industry robot, an electronic lever indicator and a revolving table are used to measure the BLISK via coordinate transformations in the measurement system. Some key points such as the kinematics model of the system, the calibration of the system and measuring method are discussed. Experimental results demonstrate the effectiveness of the proposed method.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127125255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. K. Jha, N. Yorino, Y. Zoka, Y. Sasaki, Y. Hayashi, K. Iwata, R. Oe
This paper considers a penalty factor incorporated energy maximization type objective function, in order to reduce the amount of spill during the operation of the reservoir of a hydropower plant. Stochastic dynamic programming (SDP) model with independent inflow process assumption is developed for a hydropower plant located in Japan. SDP models can incorporate the inherent uncertainty associated with the stream inflows better than the deterministic models. Reservoir storage guide curves for typical water years (dry, average and wet years) are identified based on the operating policy. Operating policies with various values of constant of penalty function are obtained and, simulated storage guide curve for an average year is identified. Energy generation versus spill reduction curve may be plotted for various cases as such; a break-even point can be identified based on the cost functions associated with the energy and spill.
{"title":"Penalty Factor Approach of Minimizing Spill in Finding Operating Policy for Reservoir of a Hydropower Plant: A Case of Japan","authors":"D. K. Jha, N. Yorino, Y. Zoka, Y. Sasaki, Y. Hayashi, K. Iwata, R. Oe","doi":"10.1109/ICCEE.2008.102","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.102","url":null,"abstract":"This paper considers a penalty factor incorporated energy maximization type objective function, in order to reduce the amount of spill during the operation of the reservoir of a hydropower plant. Stochastic dynamic programming (SDP) model with independent inflow process assumption is developed for a hydropower plant located in Japan. SDP models can incorporate the inherent uncertainty associated with the stream inflows better than the deterministic models. Reservoir storage guide curves for typical water years (dry, average and wet years) are identified based on the operating policy. Operating policies with various values of constant of penalty function are obtained and, simulated storage guide curve for an average year is identified. Energy generation versus spill reduction curve may be plotted for various cases as such; a break-even point can be identified based on the cost functions associated with the energy and spill.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122186280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the development of polymorphic worms, worms do greater harm to networks. The content-based signature generation of polymorphic worms has been a challenge for network security. This paper presents a fast signature generation method for polymorphic worms. The main feature of this method is clustering network normal traffic to create a white list before carrying out a comprehensive analysis of malicious traffic. Compared with other methods, this approach avoids the large number of comparisons with normal network traffic pool because of the white list. It is proved by experiments that our approach has a good noise-tolerant capability and high efficiency, and signatures generated by our method have a high accuracy.
{"title":"A Fast Method of Signature Generation for Polymorphic Worms","authors":"Jia Zhang, Haixin Duan, Lanjia Wang, Yuntao Guan, Jianping Wu","doi":"10.1109/ICCEE.2008.33","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.33","url":null,"abstract":"With the development of polymorphic worms, worms do greater harm to networks. The content-based signature generation of polymorphic worms has been a challenge for network security. This paper presents a fast signature generation method for polymorphic worms. The main feature of this method is clustering network normal traffic to create a white list before carrying out a comprehensive analysis of malicious traffic. Compared with other methods, this approach avoids the large number of comparisons with normal network traffic pool because of the white list. It is proved by experiments that our approach has a good noise-tolerant capability and high efficiency, and signatures generated by our method have a high accuracy.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130414619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Quan Li, Yuanzhong Shu, Chenggong Tao, Lingsheng Wang
Embedded devices are more and more widely used in industrial workshop. In order to improve enterprise's market adaptability, meet the changing requirement of new production manufacturing, and construct common and agile manufacturing systems, the device and management system should be integrated seamlessly. In this paper, we analyze the service-oriented three-layer structure of industry system and propose a kind of resource management architecture of embedded device. The common resource description and management model is constructed for the embedded device based on DPWS through common information model(CIM). The model is implemented by an example using the XML technology. From the performance analysis of experimental implementation, the common resource description and management model not only makes vendors easily describe resource description files of different devices, but makes information system can effectively maintain and manage lots of devices in the unified method. It can effectively meet the more flexible adjusting of manufacturing systems.
{"title":"Device Common Resource Description and Management with CIM in Industry","authors":"Quan Li, Yuanzhong Shu, Chenggong Tao, Lingsheng Wang","doi":"10.1109/ICCEE.2008.161","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.161","url":null,"abstract":"Embedded devices are more and more widely used in industrial workshop. In order to improve enterprise's market adaptability, meet the changing requirement of new production manufacturing, and construct common and agile manufacturing systems, the device and management system should be integrated seamlessly. In this paper, we analyze the service-oriented three-layer structure of industry system and propose a kind of resource management architecture of embedded device. The common resource description and management model is constructed for the embedded device based on DPWS through common information model(CIM). The model is implemented by an example using the XML technology. From the performance analysis of experimental implementation, the common resource description and management model not only makes vendors easily describe resource description files of different devices, but makes information system can effectively maintain and manage lots of devices in the unified method. It can effectively meet the more flexible adjusting of manufacturing systems.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"49 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129983447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The mutual authentication mechanism in the IEEE802.16e can avoid the man-in-middle attack, and can protect the multi-hop WiMax security in efficiency. An improved X.509 certificate based on ECC algorithm is designed, then an enhanced mutual authentication flow was proposed in this paper, which enhances the security and working efficiency of the mutual authentication in multi-hop WiMax system. The proposed scheme heightens the security and practicability of WiMax system, which has better referenced value to the improvement of IEEE 802.16e standards.
{"title":"An Improved Mutual Authentication Scheme in Multi-Hop WiMax Network","authors":"Huixia Jin, Li Tu, Gelan Yang, Yatao Yang","doi":"10.1109/ICCEE.2008.155","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.155","url":null,"abstract":"The mutual authentication mechanism in the IEEE802.16e can avoid the man-in-middle attack, and can protect the multi-hop WiMax security in efficiency. An improved X.509 certificate based on ECC algorithm is designed, then an enhanced mutual authentication flow was proposed in this paper, which enhances the security and working efficiency of the mutual authentication in multi-hop WiMax system. The proposed scheme heightens the security and practicability of WiMax system, which has better referenced value to the improvement of IEEE 802.16e standards.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132437061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}