首页 > 最新文献

2013 5th International Conference on Computational Intelligence and Communication Networks最新文献

英文 中文
Mobile Ticketing System for Automatic Fare Collection Model for Public Transport 公共交通自动收费模型移动售票系统
D. G. Chandra, R. Prakash, S. Lamdharia
The ticketing system of public transport system is mainly manual and in some areas semi-automatic which is tedious, stressful and involves a lot of time, effort & manpower. Besides, this is highly inadequate to handle the humongous commuter volume. The traveler has to spend lots of time in queue for buying tickets, tokens and smart cards as well as recharging the smart card specifically during picks hours. To get rid of this hurdle we are proposing a Mobile ticketing model for public transport system. In this paper we are using the Cell phone (Mobile) of a commuter. The Mobile Ticketing model comprises of a registered mobile subscription either Prepaid or postpaid for the traveler's identity by scanning mobile phone number at the entrance/exit of the vehicle or stations and deducting the fare from the Mobile number immediately in case of prepaid connection and sending the information to the service provider of the Mobile connection in case of post paid mobile connection.
公共交通系统的票务系统主要是手动的,在某些地区是半自动的,这是繁琐的,压力大,涉及大量的时间,精力和人力。此外,这远远不足以处理巨大的通勤量。旅客必须花费大量时间排队购买车票、代币和智能卡,并在取票时间为智能卡充值。为了摆脱这个障碍,我们正在为公共交通系统提出一个移动票务模型。在本文中,我们使用的是通勤者的手机。移动票务模式包括在车辆或车站出入口扫描移动电话号码,以预付费或后付费方式注册移动电话订阅旅客的身份,如果是预付费连接,则立即从移动电话号码中扣除票价,如果是后付费移动连接,则将信息发送给移动连接的服务提供商。
{"title":"Mobile Ticketing System for Automatic Fare Collection Model for Public Transport","authors":"D. G. Chandra, R. Prakash, S. Lamdharia","doi":"10.1109/CICN.2013.131","DOIUrl":"https://doi.org/10.1109/CICN.2013.131","url":null,"abstract":"The ticketing system of public transport system is mainly manual and in some areas semi-automatic which is tedious, stressful and involves a lot of time, effort & manpower. Besides, this is highly inadequate to handle the humongous commuter volume. The traveler has to spend lots of time in queue for buying tickets, tokens and smart cards as well as recharging the smart card specifically during picks hours. To get rid of this hurdle we are proposing a Mobile ticketing model for public transport system. In this paper we are using the Cell phone (Mobile) of a commuter. The Mobile Ticketing model comprises of a registered mobile subscription either Prepaid or postpaid for the traveler's identity by scanning mobile phone number at the entrance/exit of the vehicle or stations and deducting the fare from the Mobile number immediately in case of prepaid connection and sending the information to the service provider of the Mobile connection in case of post paid mobile connection.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123810212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Evaluation of Wireless Sensor Network Routing Protocols with Respect to Power Efficiency 基于功率效率的无线传感器网络路由协议评估
Shounak Chakraborty, Ajoy Kumar Khan
Recent advances in the trend of development of small and powerful battery backed sensor node. These sensor nodes are deployed for various surveillance activities and thus forming a network. There has been numerous amount of research work for the development of power efficient routing protocols for the network of these limited power sensor nodes. This paper provides a survey of these routing protocols on basis and concludes with grading each protocol on energy saving.
最近的进展趋势是发展小而强大的电池背侧传感器节点。这些传感器节点用于各种监视活动,从而形成一个网络。针对这些有限功率传感器节点的网络,已经有大量的研究工作在开发节能路由协议。本文在此基础上对这些路由协议进行了综述,并对每种路由协议的节能程度进行了分级。
{"title":"Evaluation of Wireless Sensor Network Routing Protocols with Respect to Power Efficiency","authors":"Shounak Chakraborty, Ajoy Kumar Khan","doi":"10.1109/CICN.2013.36","DOIUrl":"https://doi.org/10.1109/CICN.2013.36","url":null,"abstract":"Recent advances in the trend of development of small and powerful battery backed sensor node. These sensor nodes are deployed for various surveillance activities and thus forming a network. There has been numerous amount of research work for the development of power efficient routing protocols for the network of these limited power sensor nodes. This paper provides a survey of these routing protocols on basis and concludes with grading each protocol on energy saving.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122278847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of Facebook Social Network Facebook社交网络分析
N. Akhtar, Hira Javed, Geetanjali Sengar
Social Network Analysis (SNA) is a technique for modeling the communication patterns between individuals in a way that illuminates the structure of the network and the importance of individuals within the network. SNA has gained a recent importance due to the appearance of various web 2.0 platforms like blogs, wikis, content and media sharing sites which consists of a huge collection of data. These data are vast, noisy, unstructured and dynamic in nature, so mining is performed on such data by various SNA methods and tools in order to extract actionable patterns which are useful for business, consumers, and users. This study is a part of the growing body of research on Social Network Analysis and uncovers hidden relationships in a facebook network. It gives a prospective view of the hidden attributes of the high degree nodes (users having greater number of friends) in the Facebook network. Results show that there is little association among high degree nodes.
社会网络分析(Social Network Analysis, SNA)是一种对个体之间的通信模式进行建模的技术,通过这种方式可以阐明网络的结构和个体在网络中的重要性。由于博客、维基、内容和媒体分享网站等各种web 2.0平台的出现,SNA最近变得越来越重要,这些网站包含了大量的数据。这些数据本质上是巨大的、嘈杂的、非结构化的和动态的,因此通过各种SNA方法和工具对这些数据进行挖掘,以提取对业务、消费者和用户有用的可操作模式。这项研究是不断增长的社会网络分析研究的一部分,揭示了facebook网络中隐藏的关系。它给出了Facebook网络中高节点(拥有更多朋友的用户)隐藏属性的前瞻性视图。结果表明,高节点间关联度较小。
{"title":"Analysis of Facebook Social Network","authors":"N. Akhtar, Hira Javed, Geetanjali Sengar","doi":"10.1109/CICN.2013.99","DOIUrl":"https://doi.org/10.1109/CICN.2013.99","url":null,"abstract":"Social Network Analysis (SNA) is a technique for modeling the communication patterns between individuals in a way that illuminates the structure of the network and the importance of individuals within the network. SNA has gained a recent importance due to the appearance of various web 2.0 platforms like blogs, wikis, content and media sharing sites which consists of a huge collection of data. These data are vast, noisy, unstructured and dynamic in nature, so mining is performed on such data by various SNA methods and tools in order to extract actionable patterns which are useful for business, consumers, and users. This study is a part of the growing body of research on Social Network Analysis and uncovers hidden relationships in a facebook network. It gives a prospective view of the hidden attributes of the high degree nodes (users having greater number of friends) in the Facebook network. Results show that there is little association among high degree nodes.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121113243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Security Breaches in an Organization and Their Countermeasures 组织中的安全漏洞及其对策
Pavitra Chauhan, Nikita Singh, N. Chandra
Today's business rely completely on IT network and their connections with the global Internet as the backbone of their sales, sourcing, operating and financial systems. In a similar way many aspects of our lives rely on internet and computers including communications (email, cell phones, texting), transportation (traffic control signals, car engine systems, airplane navigation), government (birth/death records, Social Security, licensing, tax records), finance (bank accounts, loans, electronic paychecks), medicine (equipment, medical records), and education (virtual classrooms, online report cards, research). In this 21st century no government, business, nongovernmental organizations are purely invulnerable to the cyber attacks. Password based attacks are more popular kinds of attacks that can harm the firm/organization. So, here we present the prevention of a password based attacks. Our main focus was to know about the security breaches in an organization and how are they handled by them. Inspired by such facts, the project revolves around security breaches in the organization and their respective counter measures.
今天的企业完全依赖IT网络及其与全球互联网的连接,作为其销售、采购、运营和财务系统的支柱。同样,我们生活的许多方面都依赖于互联网和计算机,包括通信(电子邮件、手机、短信)、交通(交通控制信号、汽车发动机系统、飞机导航)、政府(出生/死亡记录、社会保障、许可、税务记录)、金融(银行账户、贷款、电子工资)、医药(设备、医疗记录)和教育(虚拟教室、在线成绩单、研究)。在21世纪,没有任何政府、企业、非政府组织能够完全免受网络攻击。基于密码的攻击是更常见的攻击类型,可以损害公司/组织。因此,在这里我们提出了基于密码的攻击的预防。我们的主要重点是了解组织中的安全漏洞以及他们如何处理这些漏洞。受这些事实的启发,该项目围绕组织中的安全漏洞及其相应的应对措施展开。
{"title":"Security Breaches in an Organization and Their Countermeasures","authors":"Pavitra Chauhan, Nikita Singh, N. Chandra","doi":"10.1109/CICN.2013.79","DOIUrl":"https://doi.org/10.1109/CICN.2013.79","url":null,"abstract":"Today's business rely completely on IT network and their connections with the global Internet as the backbone of their sales, sourcing, operating and financial systems. In a similar way many aspects of our lives rely on internet and computers including communications (email, cell phones, texting), transportation (traffic control signals, car engine systems, airplane navigation), government (birth/death records, Social Security, licensing, tax records), finance (bank accounts, loans, electronic paychecks), medicine (equipment, medical records), and education (virtual classrooms, online report cards, research). In this 21st century no government, business, nongovernmental organizations are purely invulnerable to the cyber attacks. Password based attacks are more popular kinds of attacks that can harm the firm/organization. So, here we present the prevention of a password based attacks. Our main focus was to know about the security breaches in an organization and how are they handled by them. Inspired by such facts, the project revolves around security breaches in the organization and their respective counter measures.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114994290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impact of Cloud on E-Learning 云计算对电子学习的影响
Kritika Verma, M. A. Rizvi
The Cloud computing environment is rising as a natural platform to provide support to online systems. Therefore, there is a need to redefine and redesign the whole educational system which meets the current educational need in the light of cloud. The advent of computers with sophisticated software has made it possible to solve many complex problems very fast and at a lower cost. This paper introduces the characteristics of the current E-Learning and then analyses the concept of cloud computing and describes the architecture of cloud computing platform by combining the features of E-Learning. The authors have tried to introduce cloud computing to e-learning, build an e-learning cloud, and make an active research and exploration in this area. The present scenario of e-learning has certain limitations to it, in order to overcome those limitations there is a paradigm shift in internet based e-learning to the cloud environment.
云计算环境作为一个为在线系统提供支持的天然平台正在崛起。因此,有必要重新定义和重新设计整个教育系统,以满足当前的教育需求。装有复杂软件的计算机的出现使得以极快的速度和较低的成本解决许多复杂问题成为可能。本文首先介绍了当前E-Learning的特点,然后分析了云计算的概念,结合E-Learning的特点描述了云计算平台的体系结构。笔者尝试将云计算引入电子学习,构建电子学习云,并在这方面进行了积极的研究和探索。目前的电子学习有一定的局限性,为了克服这些局限性,基于互联网的电子学习有一个范式转移到云环境。
{"title":"Impact of Cloud on E-Learning","authors":"Kritika Verma, M. A. Rizvi","doi":"10.1109/CICN.2013.105","DOIUrl":"https://doi.org/10.1109/CICN.2013.105","url":null,"abstract":"The Cloud computing environment is rising as a natural platform to provide support to online systems. Therefore, there is a need to redefine and redesign the whole educational system which meets the current educational need in the light of cloud. The advent of computers with sophisticated software has made it possible to solve many complex problems very fast and at a lower cost. This paper introduces the characteristics of the current E-Learning and then analyses the concept of cloud computing and describes the architecture of cloud computing platform by combining the features of E-Learning. The authors have tried to introduce cloud computing to e-learning, build an e-learning cloud, and make an active research and exploration in this area. The present scenario of e-learning has certain limitations to it, in order to overcome those limitations there is a paradigm shift in internet based e-learning to the cloud environment.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128222748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Hybrid Optical Wireless Access Networks 混合光无线接入网
A. Katara, A. Bapat, A. Selokar, R. Chalse
This paper describes a dynamic reconfiguration algorithm for a hybrid fiber wireless network, which takes advantage of dynamic reconfiguration in WDM based optical networks to provide bandwidth on the fly. The WDM technique for optical networks allows network operators to extend the existing capacity of passive optical networks manifolds. However presently, WDM networks were used mostly in long haul backbone networks and recently have been put to use in metropolitan networks (MAN). But till now not much work has been done on use of WDM networks in MAN. We use wireless technology to solve the Last mile problem of WDM networks. Wireless networks on the other hand are always constrained by need of bandwidth and we use WDM based optical networks to provide that. So both network technologies complement each other. Our proposed approach allows providing bandwidth on demand. It also allows for service differentiation by service providers, and sharing of infrastructure by several service providers.
本文提出了一种混合光纤无线网络的动态重构算法,该算法利用了基于波分复用的光网络的动态重构特性来实时提供带宽。光网络的波分复用技术允许网络运营商扩展无源光网络流形的现有容量。目前,WDM网络主要应用于长途骨干网,近年来在城域网(MAN)中得到了应用。但是目前关于WDM网络在城域网中的应用的研究还不多。我们利用无线技术来解决WDM网络的最后一公里问题。另一方面,无线网络总是受到带宽需求的限制,我们使用基于WDM的光网络来提供带宽需求。所以两种网络技术是相辅相成的。我们提出的方法允许按需提供带宽。它还允许服务提供商区分服务,并允许多个服务提供商共享基础设施。
{"title":"Hybrid Optical Wireless Access Networks","authors":"A. Katara, A. Bapat, A. Selokar, R. Chalse","doi":"10.1109/CICN.2013.41","DOIUrl":"https://doi.org/10.1109/CICN.2013.41","url":null,"abstract":"This paper describes a dynamic reconfiguration algorithm for a hybrid fiber wireless network, which takes advantage of dynamic reconfiguration in WDM based optical networks to provide bandwidth on the fly. The WDM technique for optical networks allows network operators to extend the existing capacity of passive optical networks manifolds. However presently, WDM networks were used mostly in long haul backbone networks and recently have been put to use in metropolitan networks (MAN). But till now not much work has been done on use of WDM networks in MAN. We use wireless technology to solve the Last mile problem of WDM networks. Wireless networks on the other hand are always constrained by need of bandwidth and we use WDM based optical networks to provide that. So both network technologies complement each other. Our proposed approach allows providing bandwidth on demand. It also allows for service differentiation by service providers, and sharing of infrastructure by several service providers.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133680010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
An Efficient Approach to Set Up High Performance Network Center in Academia 建立学术界高性能网络中心的有效途径
J. Kumar, M. Bhattacharya, B. Pandey
Performance is a critical issue in setup of network center in any academia. In a research institute, a moment of time is precious for analysis, design, research and development. In this work, an efficient approach, which based on firewall, complaint handling system, LDAP server and spanning tree protocol, is used to set up a network center in ABV-IIITM to provide network facility to researcher, student and faculty in cost-effective and fast-processing way. Here, the Spanning-Tree Protocol is applied in switched networks for a loop free network which open a path for fault tolerant network. That increases 60-70 percent performance in compare to traditional approach used in setup of Network Center. Complaint handling system is a unique characteristic of this network, which ensure transparency and make this network more users friendly.
在网络中心的建设中,性能是一个重要的问题。在一个研究机构里,一分一秒的时间对于分析、设计、研究和开发都是非常宝贵的。本文提出了一种基于防火墙、投诉处理系统、LDAP服务器和生成树协议的高效方法,在ABV-IIITM建立网络中心,为研究人员、学生和教师提供经济高效、快速处理的网络设施。在交换网络中应用生成树协议,实现无环路网络,为容错网络开辟了一条路径。与在网络中心设置中使用的传统方法相比,这提高了60- 70%的性能。投诉处理系统是该网络的一个独特的特点,它保证了透明度,使该网络更加用户友好。
{"title":"An Efficient Approach to Set Up High Performance Network Center in Academia","authors":"J. Kumar, M. Bhattacharya, B. Pandey","doi":"10.1109/CICN.2013.28","DOIUrl":"https://doi.org/10.1109/CICN.2013.28","url":null,"abstract":"Performance is a critical issue in setup of network center in any academia. In a research institute, a moment of time is precious for analysis, design, research and development. In this work, an efficient approach, which based on firewall, complaint handling system, LDAP server and spanning tree protocol, is used to set up a network center in ABV-IIITM to provide network facility to researcher, student and faculty in cost-effective and fast-processing way. Here, the Spanning-Tree Protocol is applied in switched networks for a loop free network which open a path for fault tolerant network. That increases 60-70 percent performance in compare to traditional approach used in setup of Network Center. Complaint handling system is a unique characteristic of this network, which ensure transparency and make this network more users friendly.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116436655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AHP Based Trust Model in VANETs 基于AHP的VANETs信任模型
Deepika Saraswat, B. Chaurasia
In this work, we present a analytical hierarchy process (AHP) for computing trust in the vehicular ad hoc networks (VANETs). AHP based trust management provides a lightweight security alternative to existing security techniques. Trust Management in VANETs is required to broadcast of selfish or malicious messages and also enable other vehicles to filter out such messages. A trust management system has ability to cope with sparsity of direct interactions. To evaluate the trust, we introduce the AHP based technique constitutes the combination of direct, reputation and indirect trust technique. The AHP is also used to coalesce various recommendation opinions from neighbour vehicles through exchanges of messages. Result shows that the scheme is lightweight and completes in order of milliseconds.
在这项工作中,我们提出了一种分析层次分析法(AHP)来计算车辆自组织网络(vanet)中的信任。基于AHP的信任管理为现有的安全技术提供了一种轻量级的安全替代方案。在VANETs中的信任管理需要广播自私或恶意的消息,并使其他车辆能够过滤掉这些消息。信任管理系统具有处理直接交互稀疏性的能力。为了评估信任,我们引入了基于层次分析法的直接信任、声誉信任和间接信任相结合的技术。AHP也被用来通过交换信息来整合来自相邻车辆的各种推荐意见。结果表明,该方案是轻量级的,可以在毫秒级内完成。
{"title":"AHP Based Trust Model in VANETs","authors":"Deepika Saraswat, B. Chaurasia","doi":"10.1109/CICN.2013.86","DOIUrl":"https://doi.org/10.1109/CICN.2013.86","url":null,"abstract":"In this work, we present a analytical hierarchy process (AHP) for computing trust in the vehicular ad hoc networks (VANETs). AHP based trust management provides a lightweight security alternative to existing security techniques. Trust Management in VANETs is required to broadcast of selfish or malicious messages and also enable other vehicles to filter out such messages. A trust management system has ability to cope with sparsity of direct interactions. To evaluate the trust, we introduce the AHP based technique constitutes the combination of direct, reputation and indirect trust technique. The AHP is also used to coalesce various recommendation opinions from neighbour vehicles through exchanges of messages. Result shows that the scheme is lightweight and completes in order of milliseconds.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134457479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A Simulation Parameter Correction System Design Based on the Measured Data 基于实测数据的仿真参数校正系统设计
Kan Yunqi, Meng Fanqi
Electric power simulation system can carry on the simulation of power system, it can help managers to make decisions in the event of a disturbance, but the accuracy of the simulation system depends on the simulation parameters. Diversity and variability of the Simulation environment led the parameters must to be correct at any time, correct process depends on the power system operating data. In order to ensure the simulation result closer to actual results to a great extent, using measured data of monitoring platforms is the best choice. In this paper, according to the simulation system parameter correction problem, we designed parameter correction algorithm based on the WAMS's monitor flow data, and developed relevant system, which have been verified by experiments.
电力仿真系统可以对电力系统进行仿真,它可以帮助管理者在发生扰动时做出决策,但仿真系统的准确性取决于仿真参数。仿真环境的多样性和可变性导致参数必须在任何时候都是正确的,正确的过程取决于电力系统的运行数据。为了保证仿真结果在很大程度上接近实际结果,使用监测平台的实测数据是最好的选择。本文针对仿真系统参数校正问题,设计了基于WAMS监测流量数据的参数校正算法,并开发了相关系统,并通过实验进行了验证。
{"title":"A Simulation Parameter Correction System Design Based on the Measured Data","authors":"Kan Yunqi, Meng Fanqi","doi":"10.1109/CICN.2013.111","DOIUrl":"https://doi.org/10.1109/CICN.2013.111","url":null,"abstract":"Electric power simulation system can carry on the simulation of power system, it can help managers to make decisions in the event of a disturbance, but the accuracy of the simulation system depends on the simulation parameters. Diversity and variability of the Simulation environment led the parameters must to be correct at any time, correct process depends on the power system operating data. In order to ensure the simulation result closer to actual results to a great extent, using measured data of monitoring platforms is the best choice. In this paper, according to the simulation system parameter correction problem, we designed parameter correction algorithm based on the WAMS's monitor flow data, and developed relevant system, which have been verified by experiments.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134539022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Simulation of Traction and Braking Performance for High-Speed Railway Virtual Reality System 高速铁路虚拟现实系统牵引与制动性能仿真
Cong Guan, Long Chang, Huaiyu Xu
A high-speed railway virtual reality system can vividly show the train running process, traction and braking control performance using 3D computer graphics technology. As a major part of virtual reality system, the traction and braking performance have great significance to the effect of the rain running. This paper researches the basic theory of train traction and braking calculation, which can be used to simulate the train running in the virtual reality system. It also introduces the realization process of the virtual simulation based on Direct3D.
高速铁路虚拟现实系统利用三维计算机图形技术,可以生动地展示列车运行过程、牵引和制动控制性能。作为虚拟现实系统的重要组成部分,车辆的牵引和制动性能对雨天行驶的效果有着重要的影响。本文研究了列车牵引与制动计算的基本理论,可用于在虚拟现实系统中模拟列车运行。介绍了基于Direct3D的虚拟仿真的实现过程。
{"title":"The Simulation of Traction and Braking Performance for High-Speed Railway Virtual Reality System","authors":"Cong Guan, Long Chang, Huaiyu Xu","doi":"10.1109/CICN.2013.138","DOIUrl":"https://doi.org/10.1109/CICN.2013.138","url":null,"abstract":"A high-speed railway virtual reality system can vividly show the train running process, traction and braking control performance using 3D computer graphics technology. As a major part of virtual reality system, the traction and braking performance have great significance to the effect of the rain running. This paper researches the basic theory of train traction and braking calculation, which can be used to simulate the train running in the virtual reality system. It also introduces the realization process of the virtual simulation based on Direct3D.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130598088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2013 5th International Conference on Computational Intelligence and Communication Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1