首页 > 最新文献

2008 International Conference on Computer and Electrical Engineering最新文献

英文 中文
Analysis of DC Connection for Capacitor Energy Storage in Wind Power Generation System 风力发电系统中电容储能直流连接分析
Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.143
V. J. Yeshwenth, R. Udhayaprakash, N. Krishna
This work presents the analysis and performance of connecting two wind power generation systems with the energy storage at the dc side. Energy storage is desirable to be installed to keep constant output from the wind power generation system. The DC connection of two wind power generation system helps to exchange power between the two systems and can suppress the disturbance of the output power to the utility systems longer than the stand alone system. The performance of connecting two wind generation systems with the energy storage at the dc side has been investigated by using the simulation. The wind power generation system is modeled and simulated by MATLAB/Simulink and the effectiveness of the dc connection of two systems is presented. This effect is easily achieved and implemented without any additional control. The controller measures only the common dc side capacitor voltage of the local system. MATLAB/Simulink simulation verifies the better performance in a certain situation.
本文介绍了两个风力发电系统与直流侧储能系统连接的分析和性能。为了保持风力发电系统的稳定输出,需要安装储能系统。两个风力发电系统的直流连接有助于两个系统之间的电力交换,并且比独立系统更能抑制输出功率对公用系统的干扰。通过仿真研究了在直流侧安装储能系统的两个风力发电系统的连接性能。利用MATLAB/Simulink对风力发电系统进行了建模和仿真,验证了两系统直流连接的有效性。这种效果很容易实现,不需要任何额外的控制。控制器只测量本地系统的直流侧电容电压。MATLAB/Simulink仿真验证了在一定情况下较好的性能。
{"title":"Analysis of DC Connection for Capacitor Energy Storage in Wind Power Generation System","authors":"V. J. Yeshwenth, R. Udhayaprakash, N. Krishna","doi":"10.1109/ICCEE.2008.143","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.143","url":null,"abstract":"This work presents the analysis and performance of connecting two wind power generation systems with the energy storage at the dc side. Energy storage is desirable to be installed to keep constant output from the wind power generation system. The DC connection of two wind power generation system helps to exchange power between the two systems and can suppress the disturbance of the output power to the utility systems longer than the stand alone system. The performance of connecting two wind generation systems with the energy storage at the dc side has been investigated by using the simulation. The wind power generation system is modeled and simulated by MATLAB/Simulink and the effectiveness of the dc connection of two systems is presented. This effect is easily achieved and implemented without any additional control. The controller measures only the common dc side capacitor voltage of the local system. MATLAB/Simulink simulation verifies the better performance in a certain situation.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129296386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ODDC: A Novel Clustering Algorithm Based on One-Dimensional Distance Calculation 一种新的基于一维距离计算的聚类算法
Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.52
Xue-gang Wang, Zhongzhi Li
The scale of spatial data is usually very large. Clustering algorithm needs very high performance, good scalability, and able to deal with noise data and high-dimensional data. Proposed a quickly clustering algorithm based on one-dimensional distance calculation. The algorithm first partitions space-sets by one-dimensional distance, then clusters space-sets by set-distance and set-density. Next, uses the same approach to the next dimension, until all dimensions have been processed. Experimental results show ODDC algorithm has high-efficient features and is not sensitive to noise data.
空间数据的尺度通常非常大。聚类算法需要非常高的性能,良好的可扩展性,并且能够处理噪声数据和高维数据。提出了一种基于一维距离计算的快速聚类算法。该算法首先按一维距离划分空间集,然后按集距和集密度对空间集进行聚类。接下来,对下一个维度使用相同的方法,直到处理完所有维度。实验结果表明,ODDC算法具有高效、对噪声数据不敏感的特点。
{"title":"ODDC: A Novel Clustering Algorithm Based on One-Dimensional Distance Calculation","authors":"Xue-gang Wang, Zhongzhi Li","doi":"10.1109/ICCEE.2008.52","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.52","url":null,"abstract":"The scale of spatial data is usually very large. Clustering algorithm needs very high performance, good scalability, and able to deal with noise data and high-dimensional data. Proposed a quickly clustering algorithm based on one-dimensional distance calculation. The algorithm first partitions space-sets by one-dimensional distance, then clusters space-sets by set-distance and set-density. Next, uses the same approach to the next dimension, until all dimensions have been processed. Experimental results show ODDC algorithm has high-efficient features and is not sensitive to noise data.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"613 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117081854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Calculation of Electrical Parameters for Studies on Propagation Characteristic of PD along Transformer Winding 局部放电沿变压器绕组传播特性研究的电气参数计算
Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.115
Z. Du, Ling Ruan, Chun Zhao, J. Ruan, Yun-fei Wu, Tao Wang
In order to investigate the propagation of partial discharge pulses in transformer winding, the simulation model of a 180 turns continuous disc type transformer winding based on multi-conductor transmission line (MTL) theory is constructed. According to the symmetry of windings, a 2D equivalent finite element model is set up under ANSYS environment. A modified method is proposed to calculate the K matrix that decrease distinctly calculation cost without loss of accuracy. For the evaluation of L and R parameter of transformer with iron core in MHz frequency area, the skin effect of conductors and iron area is taken into consideration. The frequency-dependent parameters are calculated first by time harmonic magnetic field analysis. The proposed methods of calculating parameters are helpful to research on propagation characteristic of partial discharge (PD) pulses in electric equipments.
为了研究局部放电脉冲在变压器绕组中的传播,基于多导体传输线理论,建立了180匝连续盘式变压器绕组的仿真模型。根据绕组的对称性,在ANSYS环境下建立了二维等效有限元模型。提出了一种改进的K矩阵计算方法,在不损失精度的前提下显著降低了计算成本。在MHz频段铁芯变压器的L和R参数的评定中,考虑了导体和铁芯面积的集肤效应。首先通过时谐磁场分析计算频率相关参数。所提出的参数计算方法有助于研究局部放电脉冲在电气设备中的传播特性。
{"title":"Calculation of Electrical Parameters for Studies on Propagation Characteristic of PD along Transformer Winding","authors":"Z. Du, Ling Ruan, Chun Zhao, J. Ruan, Yun-fei Wu, Tao Wang","doi":"10.1109/ICCEE.2008.115","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.115","url":null,"abstract":"In order to investigate the propagation of partial discharge pulses in transformer winding, the simulation model of a 180 turns continuous disc type transformer winding based on multi-conductor transmission line (MTL) theory is constructed. According to the symmetry of windings, a 2D equivalent finite element model is set up under ANSYS environment. A modified method is proposed to calculate the K matrix that decrease distinctly calculation cost without loss of accuracy. For the evaluation of L and R parameter of transformer with iron core in MHz frequency area, the skin effect of conductors and iron area is taken into consideration. The frequency-dependent parameters are calculated first by time harmonic magnetic field analysis. The proposed methods of calculating parameters are helpful to research on propagation characteristic of partial discharge (PD) pulses in electric equipments.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114408457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Register Caching as a Way of Mitigating Intercluster Communication Penalties in Clustered Microarchitectures 寄存器缓存作为一种减轻集群微架构中集群间通信损失的方法
Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.169
W.M. Tan, L. Alarilla, A. Álvarez
Two important factors in any clustered microarchitecture are the intercluster communication penalties (involved when importing operands from another cluster) and workload balance (involves the balanced utilization of each cluster's computing resources). The goal in any design undertaking is to minimize the former and maximize the latter, failure in any of which would degrade the microarchitecture's performance. A novel technique that could mitigate intercluster communication penalties, called register caching, is explored in this paper. Register caching involves buffering or caching a very small number of register or operand values imported from another cluster (and thus having incurred intercluster communication penalty) with the hopes that they'd be referenced again without being modified. Should the said referencing happen, the cluster would no longer have to import the values again, and intercluster communication penalty savings are incurred. Effectiveness of replacement algorithms, necessary since the register cache would be full most of the time, would be explored in this paper, along with the technique's performance as a function of register cache size and intercluster communication latency values.
任何集群微体系结构中的两个重要因素是集群间通信损失(涉及从另一个集群导入操作数时)和工作负载平衡(涉及每个集群计算资源的平衡利用)。任何设计任务的目标都是最小化前者,最大化后者,其中任何一个失败都会降低微架构的性能。本文探讨了一种可以减轻集群间通信损失的新技术——寄存器缓存。寄存器缓存涉及缓冲或缓存从另一个集群导入的非常少量的寄存器或操作数值(从而导致集群间通信损失),希望它们可以在不被修改的情况下再次被引用。如果发生上述引用,集群将不再需要再次导入这些值,并且节省了集群间的通信开销。替换算法的有效性是必要的,因为寄存器缓存大部分时间都是满的,本文将探讨替换算法的有效性,以及该技术的性能作为寄存器缓存大小和集群间通信延迟值的函数。
{"title":"Register Caching as a Way of Mitigating Intercluster Communication Penalties in Clustered Microarchitectures","authors":"W.M. Tan, L. Alarilla, A. Álvarez","doi":"10.1109/ICCEE.2008.169","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.169","url":null,"abstract":"Two important factors in any clustered microarchitecture are the intercluster communication penalties (involved when importing operands from another cluster) and workload balance (involves the balanced utilization of each cluster's computing resources). The goal in any design undertaking is to minimize the former and maximize the latter, failure in any of which would degrade the microarchitecture's performance. A novel technique that could mitigate intercluster communication penalties, called register caching, is explored in this paper. Register caching involves buffering or caching a very small number of register or operand values imported from another cluster (and thus having incurred intercluster communication penalty) with the hopes that they'd be referenced again without being modified. Should the said referencing happen, the cluster would no longer have to import the values again, and intercluster communication penalty savings are incurred. Effectiveness of replacement algorithms, necessary since the register cache would be full most of the time, would be explored in this paper, along with the technique's performance as a function of register cache size and intercluster communication latency values.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114775250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault Tolerance Issues in Non-Traditional Grids Implemented with Intelligent Agents 智能代理实现的非传统网格容错问题
Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.39
R. Bogdan, V. Ancușa, M. Vladutiu
The scope of this paper is to present the necessity to improve the existent ambient intelligence model with respect to data security. The security of such a model poses a great challenge due to the fact that different networks are mixing in order to provide such an environment. In addition, these networks are generally deployed and then left unattended. All these aspects joined together make it unfeasible to directly apply the traditional security mechanisms. Therefore, there is a need to analyze and better understand the security requirements of these networks. This paper provides the specific security attacks to such a model and supplies a solution for these attacks.
本文的范围是提出在数据安全方面改进现有环境智能模型的必要性。由于不同的网络为了提供这样的环境而混合在一起,因此这种模型的安全性提出了巨大的挑战。此外,这些网络通常部署后就无人值守。这些因素综合在一起,使得传统的安全机制无法直接应用。因此,有必要分析和更好地了解这些网络的安全需求。本文给出了针对该模型的具体安全攻击,并给出了针对这些攻击的解决方案。
{"title":"Fault Tolerance Issues in Non-Traditional Grids Implemented with Intelligent Agents","authors":"R. Bogdan, V. Ancușa, M. Vladutiu","doi":"10.1109/ICCEE.2008.39","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.39","url":null,"abstract":"The scope of this paper is to present the necessity to improve the existent ambient intelligence model with respect to data security. The security of such a model poses a great challenge due to the fact that different networks are mixing in order to provide such an environment. In addition, these networks are generally deployed and then left unattended. All these aspects joined together make it unfeasible to directly apply the traditional security mechanisms. Therefore, there is a need to analyze and better understand the security requirements of these networks. This paper provides the specific security attacks to such a model and supplies a solution for these attacks.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125337374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Measurement of Aero-Engine BLISK Using Industry Robot 用工业机器人测量航空发动机叶片
Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.45
Jin Huang, Zi Ma, Ying Hu, Yang Wang, Shuanghe Yu
The BLISK (blade integrated disk) is a new structural component of the modern aero-engine and plays an important role in improving its performance. However, it's very difficult to measure the BLISK because of its complicated shape. A novel method for measuring BLISK online is introduced in this paper. An industry robot, an electronic lever indicator and a revolving table are used to measure the BLISK via coordinate transformations in the measurement system. Some key points such as the kinematics model of the system, the calibration of the system and measuring method are discussed. Experimental results demonstrate the effectiveness of the proposed method.
叶片集成盘(BLISK)是现代航空发动机的一种新型结构部件,在提高发动机性能方面起着重要作用。然而,由于BLISK形状复杂,测量起来非常困难。本文介绍了一种在线测量BLISK的新方法。利用工业机器人、电子杠杆指示器和转台在测量系统中进行坐标变换,对BLISK进行测量。讨论了系统的运动学模型、系统标定和测量方法等关键问题。实验结果证明了该方法的有效性。
{"title":"Measurement of Aero-Engine BLISK Using Industry Robot","authors":"Jin Huang, Zi Ma, Ying Hu, Yang Wang, Shuanghe Yu","doi":"10.1109/ICCEE.2008.45","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.45","url":null,"abstract":"The BLISK (blade integrated disk) is a new structural component of the modern aero-engine and plays an important role in improving its performance. However, it's very difficult to measure the BLISK because of its complicated shape. A novel method for measuring BLISK online is introduced in this paper. An industry robot, an electronic lever indicator and a revolving table are used to measure the BLISK via coordinate transformations in the measurement system. Some key points such as the kinematics model of the system, the calibration of the system and measuring method are discussed. Experimental results demonstrate the effectiveness of the proposed method.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127125255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Penalty Factor Approach of Minimizing Spill in Finding Operating Policy for Reservoir of a Hydropower Plant: A Case of Japan 水电厂水库运行政策中泄漏最小化的惩罚因子法——以日本为例
Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.102
D. K. Jha, N. Yorino, Y. Zoka, Y. Sasaki, Y. Hayashi, K. Iwata, R. Oe
This paper considers a penalty factor incorporated energy maximization type objective function, in order to reduce the amount of spill during the operation of the reservoir of a hydropower plant. Stochastic dynamic programming (SDP) model with independent inflow process assumption is developed for a hydropower plant located in Japan. SDP models can incorporate the inherent uncertainty associated with the stream inflows better than the deterministic models. Reservoir storage guide curves for typical water years (dry, average and wet years) are identified based on the operating policy. Operating policies with various values of constant of penalty function are obtained and, simulated storage guide curve for an average year is identified. Energy generation versus spill reduction curve may be plotted for various cases as such; a break-even point can be identified based on the cost functions associated with the energy and spill.
为了减少水电站水库运行过程中的溢出量,本文考虑了一种包含能量最大化型目标函数的惩罚因子。以日本某水电站为研究对象,建立了独立入流过程假设的随机动态规划模型。与确定性模型相比,SDP模型能更好地考虑与入流有关的固有不确定性。根据运行策略,确定了典型水年(干旱年、平均年和丰水年)的库容引导曲线。得到了不同惩罚函数常数值下的运行策略,并确定了平均年的模拟存储引导曲线。能源产生与泄漏减少曲线可以绘制为各种情况;盈亏平衡点可以根据与能源和泄漏相关的成本函数来确定。
{"title":"Penalty Factor Approach of Minimizing Spill in Finding Operating Policy for Reservoir of a Hydropower Plant: A Case of Japan","authors":"D. K. Jha, N. Yorino, Y. Zoka, Y. Sasaki, Y. Hayashi, K. Iwata, R. Oe","doi":"10.1109/ICCEE.2008.102","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.102","url":null,"abstract":"This paper considers a penalty factor incorporated energy maximization type objective function, in order to reduce the amount of spill during the operation of the reservoir of a hydropower plant. Stochastic dynamic programming (SDP) model with independent inflow process assumption is developed for a hydropower plant located in Japan. SDP models can incorporate the inherent uncertainty associated with the stream inflows better than the deterministic models. Reservoir storage guide curves for typical water years (dry, average and wet years) are identified based on the operating policy. Operating policies with various values of constant of penalty function are obtained and, simulated storage guide curve for an average year is identified. Energy generation versus spill reduction curve may be plotted for various cases as such; a break-even point can be identified based on the cost functions associated with the energy and spill.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122186280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Fast Method of Signature Generation for Polymorphic Worms 一种多态蠕虫签名快速生成方法
Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.33
Jia Zhang, Haixin Duan, Lanjia Wang, Yuntao Guan, Jianping Wu
With the development of polymorphic worms, worms do greater harm to networks. The content-based signature generation of polymorphic worms has been a challenge for network security. This paper presents a fast signature generation method for polymorphic worms. The main feature of this method is clustering network normal traffic to create a white list before carrying out a comprehensive analysis of malicious traffic. Compared with other methods, this approach avoids the large number of comparisons with normal network traffic pool because of the white list. It is proved by experiments that our approach has a good noise-tolerant capability and high efficiency, and signatures generated by our method have a high accuracy.
随着多态蠕虫的发展,蠕虫对网络的危害越来越大。基于内容的多态蠕虫签名生成一直是网络安全的一大挑战。提出了一种快速生成多态蠕虫签名的方法。该方法的主要特点是对网络正常流量进行聚类,形成白名单,然后对恶意流量进行综合分析。与其他方法相比,该方法避免了由于白名单而与正常网络流量池进行大量比较。实验证明,该方法具有良好的抗噪能力和高效率,生成的特征具有较高的精度。
{"title":"A Fast Method of Signature Generation for Polymorphic Worms","authors":"Jia Zhang, Haixin Duan, Lanjia Wang, Yuntao Guan, Jianping Wu","doi":"10.1109/ICCEE.2008.33","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.33","url":null,"abstract":"With the development of polymorphic worms, worms do greater harm to networks. The content-based signature generation of polymorphic worms has been a challenge for network security. This paper presents a fast signature generation method for polymorphic worms. The main feature of this method is clustering network normal traffic to create a white list before carrying out a comprehensive analysis of malicious traffic. Compared with other methods, this approach avoids the large number of comparisons with normal network traffic pool because of the white list. It is proved by experiments that our approach has a good noise-tolerant capability and high efficiency, and signatures generated by our method have a high accuracy.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130414619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Device Common Resource Description and Management with CIM in Industry 基于CIM的工业设备公共资源描述与管理
Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.161
Quan Li, Yuanzhong Shu, Chenggong Tao, Lingsheng Wang
Embedded devices are more and more widely used in industrial workshop. In order to improve enterprise's market adaptability, meet the changing requirement of new production manufacturing, and construct common and agile manufacturing systems, the device and management system should be integrated seamlessly. In this paper, we analyze the service-oriented three-layer structure of industry system and propose a kind of resource management architecture of embedded device. The common resource description and management model is constructed for the embedded device based on DPWS through common information model(CIM). The model is implemented by an example using the XML technology. From the performance analysis of experimental implementation, the common resource description and management model not only makes vendors easily describe resource description files of different devices, but makes information system can effectively maintain and manage lots of devices in the unified method. It can effectively meet the more flexible adjusting of manufacturing systems.
嵌入式设备在工业厂房中的应用越来越广泛。为了提高企业的市场适应能力,适应新型生产制造不断变化的需求,构建通用、敏捷的制造系统,需要实现设备与管理系统的无缝集成。本文分析了面向服务的工业系统三层结构,提出了一种嵌入式设备资源管理体系结构。通过公共信息模型(CIM),构建了基于DPWS的嵌入式设备公共资源描述和管理模型。通过一个使用XML技术的实例实现了该模型。从实验实现的性能分析来看,通用的资源描述和管理模型不仅使供应商能够方便地描述不同设备的资源描述文件,而且使信息系统能够以统一的方法有效地维护和管理大量设备。它能有效地满足制造系统更灵活的调整。
{"title":"Device Common Resource Description and Management with CIM in Industry","authors":"Quan Li, Yuanzhong Shu, Chenggong Tao, Lingsheng Wang","doi":"10.1109/ICCEE.2008.161","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.161","url":null,"abstract":"Embedded devices are more and more widely used in industrial workshop. In order to improve enterprise's market adaptability, meet the changing requirement of new production manufacturing, and construct common and agile manufacturing systems, the device and management system should be integrated seamlessly. In this paper, we analyze the service-oriented three-layer structure of industry system and propose a kind of resource management architecture of embedded device. The common resource description and management model is constructed for the embedded device based on DPWS through common information model(CIM). The model is implemented by an example using the XML technology. From the performance analysis of experimental implementation, the common resource description and management model not only makes vendors easily describe resource description files of different devices, but makes information system can effectively maintain and manage lots of devices in the unified method. It can effectively meet the more flexible adjusting of manufacturing systems.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"49 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129983447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved Mutual Authentication Scheme in Multi-Hop WiMax Network 一种改进的多跳WiMax网络相互认证方案
Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.155
Huixia Jin, Li Tu, Gelan Yang, Yatao Yang
The mutual authentication mechanism in the IEEE802.16e can avoid the man-in-middle attack, and can protect the multi-hop WiMax security in efficiency. An improved X.509 certificate based on ECC algorithm is designed, then an enhanced mutual authentication flow was proposed in this paper, which enhances the security and working efficiency of the mutual authentication in multi-hop WiMax system. The proposed scheme heightens the security and practicability of WiMax system, which has better referenced value to the improvement of IEEE 802.16e standards.
IEEE802.16e中的互认证机制可以有效地避免中间人攻击,有效地保护多跳WiMax的安全性。设计了一种改进的基于ECC算法的X.509证书,并提出了一种增强的互认证流程,提高了多跳WiMax系统中互认证的安全性和工作效率。该方案提高了WiMax系统的安全性和实用性,对IEEE 802.16e标准的改进具有较好的参考价值。
{"title":"An Improved Mutual Authentication Scheme in Multi-Hop WiMax Network","authors":"Huixia Jin, Li Tu, Gelan Yang, Yatao Yang","doi":"10.1109/ICCEE.2008.155","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.155","url":null,"abstract":"The mutual authentication mechanism in the IEEE802.16e can avoid the man-in-middle attack, and can protect the multi-hop WiMax security in efficiency. An improved X.509 certificate based on ECC algorithm is designed, then an enhanced mutual authentication flow was proposed in this paper, which enhances the security and working efficiency of the mutual authentication in multi-hop WiMax system. The proposed scheme heightens the security and practicability of WiMax system, which has better referenced value to the improvement of IEEE 802.16e standards.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132437061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
期刊
2008 International Conference on Computer and Electrical Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1