TCBAC: An Access Control Model for Remote Calibration System

Size: px
Start display at page:

Download "TCBAC: An Access Control Model for Remote Calibration System"

Transcription

1 JOURNAL OF SOFTWARE, VOL. 8, NO., DECEMBER TCBAC: An Access Contol Model fo Remote Calibation System Zhuokui Wu School of Mechanical & Automotive Engineeing, South China Univesity of Technology, Guangzhou, China College of Automation, Zhongkai Univesity of Agicultue and Engineeing, Guangzhou, China Guixiong Liu School of Mechanical & Automotive Engineeing, South China Univesity of Technology, Guangzhou, China Abstact In ode to impove the eliability of emote calibation system, a task-constaint-based access contol model named TCBAC is pesented accoding to the chaacteistic of emote calibation system. TCBAC conducts access contol accoding to task. It defines authoization constaints and execution constaints by the chaacteistics of task and the elation among tasks. Uses can obtain a task authoization only when the authoization constaint is satisfied, and can execute a task only when the execution constaint is satisfied. The pefomance of TCBAC is analyzed by applying it to a emote calibation system and compaing it with DAC, MAC and RBAC which ae commonly used access contol models at pesent. The esults show that TCBAC has the advantages of consideing context and dynamics, it moe fully satisfies the pinciple of least pivilege and the pinciple of sepaation of duty and has good expansibility. Index Tems access contol, emote calibation, metology, instument, task I. INTRODUCTION Calibation is a kind of behavio which ensues the nomal opeation of measuing instument []. It concens industial and agicultual poduction, national defense constuction, scientific expeiments, domestic and foeign tade and the health and safety of the people. With the development of measuement, compute and netwok technologies, emote calibation technology ises gadually and has become a eseach hotspot []. Remote calibation technology stongly extends measuement assuance pogam, geatly shotens calibation time, and ealizes the high efficiency and low cost of calibation wok. Some kinds of emote calibation system have been pesented at pesent, such as emote calibation system of esisto [3][4], emote calibation system of pessue senso [5], emote calibation system of tempeatue senso [6], geneal emote calibation platfom based on Intenet [7], etc. These emote calibation systems solve the technical poblems of ealizing emote calibation opeation, but don t fully conside the eliable poblems of emote calibation opeation. Reliability diectly affects the pacticability, populaization and application of emote calibation system. It s a key poblem must be solved in the development of emote calibation system. Access contol technology is used to divide the pemission of opeato and pevent fom abusing pemission. It ensues calibation opeation can be completed safely and eliably. It s an impotant pat of eliable technology fo emote calibation system. Taditional access contol technology mainly includes DAC, MAC and RBAC at pesent [8][9][0]. But emote calibation system is a kind of multiple task system which is used to complete calibation opeation and elated auxiliay opeation, these taditional access contol technologies can t closely connect with the task opeation of emote calibation system because of thei static authoization mechanism, then the fine ganulaity access contol can t be conducted and some safety poblems ae caused. So it s vey impotant to build the dynamic access contol mechanism which can closely connect with the task of emote calibation system and conduct fine ganulaity access contol accoding to calibation task. Aiming at these poblems, a task-constaint-based access contol model named TCBAC fo emote calibation system is pesented. TCBAC closely connects with the task of emote calibation system, conducts fine ganulaity access contol accoding to calibation task and consides the dynamic change of task. So it has good safety and can impove the eliability of emote calibation system. II. BASIC STRUCTURE AND ACCESS CONTROL ANALYSIS OF REMOTE CALIBRATION SYSTEM A. Basic Stuctue The basic stuctue of emote calibation system is shown in Fig.. The calibation method by the stuctue is descibed as follows: The use of metology institution caies out the opeations of sending command and eceiving esult though the Intenet, and the use of calibation site caies out coesponding opeations by eceiving contol commands and feeds back esults to the use of metology institution. doi:0.4304/jsw

2 340 JOURNAL OF SOFTWARE, VOL. 8, NO., DECEMBER 03 Figue. The basic stuctue of emote calibation system B. Access Contol Analysis Remote calibation system has the chaacteistic of multiple tasks. The main tasks of emote calibation system include infomation egistation, infomation audit, instument infomation management, calibation application management, calibation pocess management and calibation esult management, etc. Some lage tasks also contain multiple child tasks. The access contol mechanism of emote calibation system is vey impotant to the eliability of calibation opeation in open netwok envionment. Fo the emote calibation system which has the chaacteistic of multiple tasks, the access contol mechanism needs to guaantee that a use can do which tasks and can t do which tasks and evey task opeation has a coesponding use, achieves the taceability of the unning of emote calibation system, then impoves the eliability of emote calibation system. So it needs to build a dynamic access contol model based on task. The model needs to meet the following equiements: () The pinciple of least pivilege. The pinciple of least pivilege means that the pemissions which a use has can t exceed the pemissions which the use uses to execute the task. In a emote calibation system, it means esticting the pemission of a use extemely to ensue the safety of emote calibation system unde the pecondition that calibation task can be completed successfully. () The pinciple of sepaation of duty. The pinciple of sepaation of duty means achieving the goal of supevising each othe by assigning tasks easonably. In emote calibation system, the fist use of the pinciple is to ensue the coectness of emote calibation opeation, the second use of it is to ensue no uses can t do faudulent activities in the system, so the eliability of emote calibation system is impoved. III. TASK-CONSTRAINT-BASED ACCESS CONTROL MODEL NAMED TCBAC The TCBAC model is descibed in detail fom task, task-constaint-based access contol and TCBAC model below. A. Task Task is the access unit of TCBAC. Task is defined as Definition fom the access contol pespective. Definition. Task: It means a specific wok assigned to a use. It includes multiple pemissive opeations to multiple objects fom the access contol pespective. All the tasks of a system ae expessed as a set of TASK = { taski i =,,3,...}. If all the opeation pemissions of a system ae expessed as a set of PERM = { pemi i =,,3,...} and all the objects of a system ae expessed as a set of OBJ = { obji i =,,3,...}, then an instance of task named task can be shown as Fig.. The task contains some opeation pemissions to thee objects named obj, obj and obj 3 which ae the opeation pemissions named pem, pem and pem 3 to obj, the opeation pemission named pem to obj and the opeation pemission named pem to obj 3. pem pem pem pem pem 3 task obj obj obj 3 Figue. Task instance Fo example, in a emote calibation system, a task named ceating and editing calibation tansaction file contains the view pemission to an object named instument infomation stoing data and the view and edit pemissions to an object named calibation tansaction infomation stoing data. B. Task-constaint-based Access Contol The task-constaint-based access contol mode is expessed as (). TASK USER ROLE GC EC. () In (), USER = { usei i =,,3,...}, ROLE = { olei i =,,3,...}, GC = { gci i =,,3,...} and EC = { eci i =,,3,...} epesents use set, ole set, authoization constaint set and execution constaint set, espectively. Equation () means: A use coesponds to a task set named TASK accoding to the ole named the use acts as; when authoizing a task named tsk to a use named u, if the use u satisfies the authoization constaint set named GC u,, then the authoization is tsk successful, othewise the authoization is fail; uses can t abusing pemission, they can use a pemission only when the execution constaint set is satisfied, fo example, the use u can execute the task tsk only when the execution constaint set named EC u, is satisfied. In tsk above, TASK TASK, the value of it is elated to the

3 JOURNAL OF SOFTWARE, VOL. 8, NO., DECEMBER ole ; GC u tsk, GC, EC u, tsk EC, the value of them is elated to the use u and the task tsk. Task, authoization constaint and execution constaint ae the main chaacteistics which the task-constaintbased access contol mode diffes fom othe access contol modes. The task-constaint-based access contol defines authoization constaints and execution constains by the chaacteistics of task and the elation among tasks. Authoization constaints ensue the pinciple of least pivilege and the pinciple of sepaation of duty, and execution constaints ensue the pinciple of least pivilege. Authoization constaints include authoization esponsibility constaint, authoization sepaation constaint, authoization count constaint and authoization time constaint. They ae defined espectively as follows. Definition. Authoization esponsibility constaint, ARC fo shot: It means a use coesponds to a task set named TASK accoding to the ole named the use acts as, the task not in TASK can t be authoized to the use. ARC is expessed as (). GC : TASK USER. () Equation () epesents the use acts as the ole only can be authoized the task in TASK. ARC is an authoization constaint based on task, and is contolled by the specific task in access contol. It eflects the pinciple of least pivilege. Definition 3. Authoization sepaation constaint, ASC fo shot: It means the use who is authoized the task tsk can t be authoized eithe task in TASK i. ASC is expessed as (3). GC : tsk TASK i. (3) GC task [ t min, t ]. (5) : max In (5), [ t min, tmax ] epesents a time inteval, it consists of lowe limit t min and uppe limit t max, and tmin t max. Equation (5) epesents a task can be authoized to a use only when the authoization time t satisfies the condition. ATC is an t min t t max authoization constaint based on task, and is contolled by the specific task in access contol. It pevents a use fom obtaining a pemission at any time which expands the pemission of the use and eflects the pinciple of least pivilege. Execution constaints include execution lifetime constaint, execution sequence constaint and execution time constaint. They ae defined espectively as follows. Definition 6. Execution lifetime constaint, ELC fo shot: It means a use can execute a task only when the task is in unning state. The lifetime of task includes fou states: domant state, blocking state, unning state and complete state, shown as Fig. 3. Each state is descibed as follows: () Domant state: It means the task has been ceated, but the task hasn t been assigned to a use. () Blocking state: It means the task has been assigned to a use, but the use can t execute the task because the execution constaint set isn t satisfied. (3) Running state: It means the task can be executed, the use who is authoized the task can execute it. (4) Complete state: It means the task has been completed, no uses can execute a completed task. Equation (3) epesents the task tsk and eithe task in TASK can t both be executed by the same use. ARC is i an authoization constaint based on task too, and is contolled by the specific task in access contol. It eflects the pinciple of sepaation of duty. Definition 4. Authoization count constaint, ACC fo shot: It means the numbe of tasks which a use has can t be infinite. ACC is expessed as (4). GC : use n. (4) Equation (4) epesents the numbe of tasks which a use can be authoized is n which doesn t include the numbe of completed tasks. ACC is an authoization constaint based on use, and is contolled by the specific use in access contol. It pevents fom expanding the pemission of use infinitely and eflects the pinciple of least pivilege. Definition 5. Authoization time constaint, ATC fo shot: It means a task can be authoized to a use only at a time between a time inteval. ATC is expessed as (5). Satisfying EC Not satisfying EC Figue 3. The lifetime of task As shown in Fig. 3, the state tansition of task is descibed as follows: The initial state when the task is ceated is domant state; the state tuns into unning state if satisfying the execution constaint set afte authoizing the task to a use, othewise the state tuns into blocking state; the state tuns into blocking state if the task in unning state doesn t satisfy the execution constaint set; if the use who is authoized the task can t complete the task fo vaious easons, the state of the task is einitialized to the domant state; the state tuns into complete state if the task is completed.

4 34 JOURNAL OF SOFTWARE, VOL. 8, NO., DECEMBER 03 ELC is a basic execution constaint, and is contolled by the system accoding to the state of task. ELC means a task can be executed only when it s in unning state. It eflects the pinciple of least pivilege. Definition 7. Execution sequence constaint, ESC fo shot: It means a task task j can be executed only afte anothe task task i has been completed. ESC is expessed as (6). UR USER ROLE TASK N EC TASK A EC : task i task j. (6) ESC is used to ensue the use execute the task in an odeed sequence. It limits the scope of use pemission and eflects the pinciple of least pivilege. Definition 8. Execution time constaint, ETC fo shot: It means a task can be executed only at a time between a time inteval. ETC is expessed as (7). EC task [ t min, t ]. (7) Figue 4. : max Equation (7) epesents a task can be executed only when the execution time t satisfies the condition tmin t t max. ETC is an execution constaint based on task, and is contolled by the specific task in access contol. ETC pevents the use fom abusing pemission at any time which expands the pemission of the use and eflects the pinciple of least pivilege. C. TCBAC model Definition 9. TCBAC model: TCBAC = { USER, ROLE, TASK, GC, EC, TU}. In the model, USER, ROLE, TASK, GC, EC, UR, TU epesents use set, ole set, task set, authoization constaint set, execution constaint set, use and ole assignment elation, task authoization mechanism. Fig. 4 is the TCBAC model schematic diagam, whee TASK N is the task set which hasn t been assigned and TASK is A the task set which has been assigned. GC TCBAC model TU The unning of TCBAC is based on thee elations and one mechanism. () Use and ole assignment elation UR : It means the elation between use and ole, the use coesponds to a task set accoding to the ole the use acts as in the system. UR is expessed as (8). UR : ROLE USER. (8) () Use and task authoization constaint elation GC : It means a use can t obtaining task pemission abitaily and the use can obtain task pemission only when the GC is satisfied, eflects the pinciple of least pivilege and the pinciple of sepaation of duty. GC mainly includes ARC, ASC, ACC and ATC, is expessed as (9). GC = { ARC, ASC, ACC, ATC}. (9) (3) Use and task execution constaint elation EC : It means a use can t abusing task pemission and the use can execute a task only when the EC is satisfied, eflects the pinciple of least pivilege. EC mainly includes ELC, ESC and ETC, is expessed as (0). EC = { ELC, ESC, ETC}. (0) (4) Task authoization mechanism TU : It ealizes to build the one to one elation between task and use, is expessed as (). TU : TASK USER. () The implementation algoithm fo TCBAC model is expessed as Algoithm. Algoithm : The pseudo-code of implementation algoithm fo TCBAC model DefiningRole(); // Defining ole DefiningUse(); // Defining use 3 DefiningUR (); // Use and ole assignment 4 DefiningTask(); // Defining task 5 DefiningGCofUse(use[i]); // Defining authoization constaints based on use, such as ACC 6 DefiningGCofTask(task[i]); // Defining authoization constaints based on task, such as ACC, ATC 7 DefiningECofTask(task[i]); // Defining execution constaints based on task, such as ESC, ETC 8 TU(); // Task authoization 9 ExecutingTask(task[i]); // Executing a task if the execution constaint set is satisfied IV. APPLICATION AND ANALYSIS OF TCBAC IN REMOTE CALIBRATION SYSTEM TCBAC is applied in a emote calibation system in this section. The application method of TCBAC in the emote calibation system is descibed in detail, and the pefomance of TCBAC is analyzed. A. Role, Use and UR Relation Definition Combining with the stuctue of emote calibation system, fou oles which ae administato of metology institution, odinay staff of metology institution, administato of calibation custome and odinay staff of calibation custome ae set in emote calibation system. The distibution of the fou oles in emote calibation system is shown as Fig. 5. In metology institution, one administato and some Figue 5. The oles of emote calibation system

5 JOURNAL OF SOFTWARE, VOL. 8, NO., DECEMBER odinay staffs ae set. Fo each calibation custome, one administato and some odinay staffs ae set too. The administato account of metology institution is configued diectly by the system, and the odinay staff account of metology institution can be configued by the administato of metology institution o be geneated by egisteing independently. The administato account and odinay staff account of calibation custome ae geneated by the mechanism of egisteing independently and auditing by the odinay staff of metology institution. The use and ole assignment elation is configued automatically by the system when a use egistes. A use only can act as one ole. B. Definition of Task, GC and EC GC based on use is shown in Table I, including ARC and ACC. The task definition of the system is shown in ARC in detail. application is confimed, the tasks which the calibation application includes ae boadcasted to the odinay staffs of metology institution and the odinay staffs of calibation custome unde the constaint of ARC. (3) The odinay staffs of metology institution and the odinay staffs of calibation custome can obtain the tasks which ae boadcasted to them unde the constaints of ASC and ATC. (4) The odinay staffs of metology institution and the odinay staffs of calibation custome can execute the tasks which they have obtained unde the constaints of ELC, ESC and ETC. D. Pefomance Analysis of TCBAC The effects of using TCBAC in emote calibation system ae summaized. Then TCBAC is compaed with DAC, MAC and RBAC which ae commonly used access contol models at pesent. The compaison esults ae TABLE I. GC BASED ON USER Role ARC ACC Administato of metology institution ()Odinay staff egiste ()Modifying use infomation (3)Viewing use infomation (4)Viewing issued cetificate (5)Confiming calibation application (6)Issuing calibation cetificate (7)Viewing the detailed infomation of calibation ode in pogess metology institution ()Auditing egiste infomation ()Viewing use infomation (3)Viewing instument infomation (4)Adding standad instument infomation (5)Viewing standad instument (6)Adding command file of standad instument (7)Adding calibation tansaction file (8)Viewing calibation tansaction file (9)Calibation opeations: It s set accoding to specific Viewing calibation custome Viewing calibated instument Selecting standad situation, such as 0. instument 4Confiming standad instument 4Ceating and editing calibation tansaction file 6Confiming calibation tansaction file 6 Auditing calibation pocess fo the fist time 8Auditing calibation pocess fo the second time 9 Dawing conclusion Administato of calibation custome ()Company egiste ()Odinay staff egiste (3)Modifying staff infomation (4)Viewing staff infomation (5)Viewing instument infomation (6)Making calibation application (7)Viewing calibation esult (8)Pinting calibation cetificate calibation custome ()Modifying pesonal infomation ()Adding instument infomation (3)Viewing instument infomation (4)Adding instument command file (5)Calibation opeations: It s set accoding to specific Viewing calibated instument infomation Executing calibation tansaction file situation, such as 5. Confiming calibation opeation GC and EC based on task ae shown in Table II. Only the tasks have GC and EC ae shown, and the tasks which aen t shown have no authoization constaints and execution constaints. The constaint based on task includes ASC, ATC, ELC, ESC and ETC. C. Access Contol Implementation Pocess of TCBAC Fo a emote calibation opeation in the emote calibation system, the access contol implementation pocess of TCBAC is descibed as follows: () The administato of calibation custome executes the task of making calibation application which submits a calibation application to the metology institution. () The administato of metology institution eceives the calibation application and executes the task of confiming calibation application. When the calibation shown in Table III. The compaison esult shown in Table III is explained as follows: () TCBAC conducts the fine ganulaity access contol accoding to calibation task fom task pespective, and consides the dynamic change of task and context, so it has good safety, satisfies the pinciple of least pivilege and the pinciple of sepaation of duty and has good expansibility. () DAC, MAC and RBAC ae static access contol models, don t conside context and haven t dynamics. (3) Use can delegate pemissions independently in DAC, so DAC has good authoization flexibility. But it s easy to make safety out of contol, can t satisfy the pinciple of least pivilege.

6 344 JOURNAL OF SOFTWARE, VOL. 8, NO., DECEMBER 03 TABLE II. GC AND EC BASED ON TASK Role Numbe Task ASC ATC ELC ESC ETC metology institution calibation custome Viewing calibation custome infomation Viewing calibated instument infomation 3 Selecting standad instument 4 Confiming standad instument Ceating and editing calibation tansaction file Confiming calibation tansaction file Auditing calibation pocess fo the fist time Auditing calibation pocess fo the second time 9 Dawing conclusion 0 Viewing calibated instument infomation Executing calibation tansaction file Confiming calibation opeation Automation Automation Task 8 Task 7 Task 7 and Task 8 Task Task Automation Automation Task 3 Automation Task 4 Automation Task 5 Automation Task Automation Task 7 Automation Task 8 Automation Automation Task 6 Automation Task TABLE III. THE COMPARISON RESULT AMONG TCBAC, DAC, MAC AND RBAC Access contol model Secuity Least pivilege Sepaation of duty Dynamics Context Expansibility TCBAC DAC MAC RBAC (4) MAC takes the method of mandatoy access contol, has good safety. But its authoization isn t flexible and its expansibility is poo. (5) RBAC has good safety, good authoization flexibility and good expansibility. But it doesn t conside context and dynamics, can t satisfy the pinciple of least pivilege. V. CONCLUSION A task-constaint-based access contol model named TCBAC fo emote calibation is pesented in this pape. The model has the chaacteistics and advantages as follows: () TCBAC conducts the fine ganulaity access contol accoding to calibation task, defines authoization constaints and execution constaints by the chaacteistics of task and the elation among tasks. Use can obtain a task pemission only when the authoization constaint is satisfied and execute a task only when the execution constaint is satisfied. Authoization constaints and execution constaints ensue the pinciple of least pivilege and the pinciple of sepaation of duty togethe. () Compaing with DAC, MAC and RBAC which ae commonly used access contol models at pesent, TCBAC has the advantages of consideing context and dynamics, it moe fully satisfies the pinciple of least pivilege and the pinciple of sepaation of duty and has good expansibility. The authoization mechanism of TCBAC model will be futhe eseached in the futue in ode to impove the pacticability of TCBAC model. ACKNOWLEDGMENT This wok was patially suppoted by the New Centuy Excellent Reseache Awad Pogam fom Ministy of Education of China (NCET-08-0).

7 JOURNAL OF SOFTWARE, VOL. 8, NO., DECEMBER REFERENCES [] Yu Zhang, Jing Zu, and Dongxing Pei, The miniatue intenal electonic pessue gauge and dynamic calibation method, Jounal of Computes, vol. 7, no., pp , 0. [] Xiaobin Hong, Guixiong Liu, Zhuokui Wu, and Xipeng Du, Remote calibation system fo fequency based on inplace benchmak, Fonties of Mechanical Engineeing, vol. 5, no. 3, pp. 36-3, 00. [3] M. Helmy A. Raouf, Rasha S. M. Ali, and M. S. Gadelab, Constuction and emote calibation of an automated esistance measuing system, MAPAN, vol. 6, no., pp. 5-3, 0. [4] S. Matsuzawa, T. Shimodaia, K. Hanaoka, A. Shimoyama, S. Sakagami, A. Domae, et al., Feasibility study on emote calibation of impedance standad fo industial use,, 008 Confeence on Pecision Electomagnetic Measuements Digest, pp , 008. [5] Tokihiko Kobata, Momoko Kojima, and Hioaki Kajikawa, Development of emote calibation system fo pessue standad, Measuement, vol. 45, no. 0, pp , 0. [6] Yue Qi and Heng Wang, Themocouple themomete emote calibation system design, Metology & Measuement Technique, vol. 39, no., pp. 4-5, 0. [7] Jingtao Guo and Zhigang Jin, Geneal tele-calibation platfom based on Intenet, Chinese Jounal of Scientific Instument, vol. 3, no. 4, pp [8] Guoyuan Lin, Yuyu Bie, and Min Lei, Tust based access contol policy in multi-domain of cloud computing, Jounal of Computes, vol. 8, no. 5, pp , 03. [9] Fenghua Li, Mang Su, Guozhen Shi, and Jianfeng Ma, Reseach status and development tends of access contol model, ACTA Electonica Sinica, vol. 40, no. 4, pp , 0. [0] Zan Yang, Lin Yang, Xiangyang Luo, Linu Ma, Baosheng Kou, and Kun Zhang, Model of domain based RBAC and suppoting technologies, Jounal of Computes, vol. 8, no. 5, pp. 0-9, 03. Zhuokui Wu was bon in 980, is cuently a lectue in Zhongkai Univesity of Agicultue and Engineeing, Guangzhou, China. He eceived maste degee fom South China Univesity of Technology, Guangzhou, China, in 006. He is cuently pusuing docto degee at School of Mechanical & Automotive Engineeing in South China Univesity of Technology. His eseach inteests include infomation system, instument, measuement and contol technology. Guixiong Liu was bon in 968, is cuently a pofesso and doctoal supeviso in South China Univesity of Technology, Guangzhou, China. He eceived docto degee fom Chongqing Univesity, Chongqing, China, in 995. His eseach inteests include moden detection technology and netwoked contol, intelligent sensing theoy and method, infomation system modeling theoy and application.

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

Signal integrity analysis and physically based circuit extraction of a mounted

Signal integrity analysis and physically based circuit extraction of a mounted emc design & softwae Signal integity analysis and physically based cicuit extaction of a mounted SMA connecto A poposed geneal appoach is given fo the definition of an equivalent cicuit with SMAs mounted

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology, (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

High performance CUDA based CNN image processor

High performance CUDA based CNN image processor High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu

More information

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation A Minutiae-based Fingepint Matching Algoithm Using Phase Coelation Autho Chen, Weiping, Gao, Yongsheng Published 2007 Confeence Title Digital Image Computing: Techniques and Applications DOI https://doi.og/10.1109/dicta.2007.4426801

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute

More information

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Access Control Mechanisms for Inter-organizational Workflow

Access Control Mechanisms for Inter-organizational Workflow Access Contol Mechanisms fo Inte-oganizational Wokflo Myong H. Kang, Joon S. Pak and Judith N. Fosche Naval Reseach Laboatoy Infomation Technology Division 4555 Ovelook Ave. Washington, DC 20375 {mkang,

More information

Automatically Testing Interacting Software Components

Automatically Testing Interacting Software Components Automatically Testing Inteacting Softwae Components Leonad Gallaghe Infomation Technology Laboatoy National Institute of Standads and Technology Gaithesbug, MD 20899, USA lgallaghe@nist.gov Jeff Offutt

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Desired Attitude Angles Design Based on Optimization for Side Window Detection of Kinetic Interceptor *

Desired Attitude Angles Design Based on Optimization for Side Window Detection of Kinetic Interceptor * Poceedings of the 7 th Chinese Contol Confeence July 6-8, 008, Kunming,Yunnan, China Desied Attitude Angles Design Based on Optimization fo Side Window Detection of Kinetic Intecepto * Zhu Bo, Quan Quan,

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

Clustering Interval-valued Data Using an Overlapped Interval Divergence

Clustering Interval-valued Data Using an Overlapped Interval Divergence Poc. of the 8th Austalasian Data Mining Confeence (AusDM'9) Clusteing Inteval-valued Data Using an Ovelapped Inteval Divegence Yongli Ren Yu-Hsn Liu Jia Rong Robet Dew School of Infomation Engineeing,

More information

FINITE ELEMENT MODEL UPDATING OF AN EXPERIMENTAL VEHICLE MODEL USING MEASURED MODAL CHARACTERISTICS

FINITE ELEMENT MODEL UPDATING OF AN EXPERIMENTAL VEHICLE MODEL USING MEASURED MODAL CHARACTERISTICS COMPDYN 009 ECCOMAS Thematic Confeence on Computational Methods in Stuctual Dynamics and Eathquake Engineeing M. Papadakakis, N.D. Lagaos, M. Fagiadakis (eds.) Rhodes, Geece, 4 June 009 FINITE ELEMENT

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

SCR R&D and control development combining GT-SUITE and TNO models. GTI user-conference

SCR R&D and control development combining GT-SUITE and TNO models. GTI user-conference SCR R&D and contol development combining G-SUIE and NO models GI use-confeence Contents Intoduction: Bidging the gap fom R&D to ECU implementation Contol development at NO Implementation of NO models in

More information

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes CS630 Repesenting and Accessing Digital Infomation Infomation Retieval: Basics Thosten Joachims Conell Univesity Infomation Retieval Basics Retieval Models Indexing and Pepocessing Data Stuctues ~ 4 lectues

More information

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Assessment of query reweighing, by rocchio method in farsi information retrieval

Assessment of query reweighing, by rocchio method in farsi information retrieval Univesity of Wollongong Reseach Online Univesity of Wollongong in Dubai - Papes Univesity of Wollongong in Dubai 2008 Assessment of quey eweighing, by occhio metho in fasi infomation etieval F Sabooi Bu-Ali

More information

IMAGERY TEXTURE ANALYSIS BASED ON MULTI-FEATURE FRACTAL DIMENSION

IMAGERY TEXTURE ANALYSIS BASED ON MULTI-FEATURE FRACTAL DIMENSION IMAGERY TEXTURE ANALYSIS BASED ON MULTI-EATURE RACTAL DIMENSION Jingxue Wang a,*, Weidong Song a, eng Gao b a School o Geomatics, Liaoning Technical Univesity, uxin, Liaoning, 13, China xiaoxue1861@163.com,

More information

ANN Models for Coplanar Strip Line Analysis and Synthesis

ANN Models for Coplanar Strip Line Analysis and Synthesis 200 IJCSNS Intenational Jounal of Compute Science and Netwok Secuity, VOL.8 No.10, Octobe 2008 Models fo Coplana Stip Line Analysis and J.Lakshmi Naayana D.K.Si Rama Kishna D.L.Patap Reddy Chalapathi Institute

More information

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,

More information

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Decentalized Tust Management fo Ad-Hoc Pee-to-Pee Netwoks Thomas Repantis Vana Kalogeaki Depatment of Compute Science & Engineeing Univesity of Califonia, Riveside Riveside, CA 92521 {tep,vana}@cs.uc.edu

More information

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol

More information

Cellular Neural Network Based PTV

Cellular Neural Network Based PTV 3th Int Symp on Applications of Lase Techniques to Fluid Mechanics Lisbon, Potugal, 6-9 June, 006 Cellula Neual Netwok Based PT Kazuo Ohmi, Achyut Sapkota : Depatment of Infomation Systems Engineeing,

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

Extract Object Boundaries in Noisy Images using Level Set. Final Report

Extract Object Boundaries in Noisy Images using Level Set. Final Report Extact Object Boundaies in Noisy Images using Level Set by: Quming Zhou Final Repot Submitted to Pofesso Bian Evans EE381K Multidimensional Digital Signal Pocessing May 10, 003 Abstact Finding object contous

More information

Embeddings into Crossed Cubes

Embeddings into Crossed Cubes Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability

More information

Reachable State Spaces of Distributed Deadlock Avoidance Protocols

Reachable State Spaces of Distributed Deadlock Avoidance Protocols Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications

More information

Improved Fourier-transform profilometry

Improved Fourier-transform profilometry Impoved Fouie-tansfom pofilomety Xianfu Mao, Wenjing Chen, and Xianyu Su An impoved optical geomety of the pojected-finge pofilomety technique, in which the exit pupil of the pojecting lens and the entance

More information

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE 1 YAROSLAVTSEV A.F., 2 Al-THUNEIBAT S.A., 3 AL TAWALBEH N.A 1 Depatment of Netwoking, SSUTI, Novosibisk, Russia

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

Quality Aware Privacy Protection for Location-based Services

Quality Aware Privacy Protection for Location-based Services In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,

More information

Method of controlling access to intellectual switching nodes of telecommunication networks and systems

Method of controlling access to intellectual switching nodes of telecommunication networks and systems ISSN (e): 2250 3005 Volume 05 Issue 05 ay 2015 Intenational Jounal of Computational Engineeing eseach (IJCE) ethod of contolling access to intellectual switching nodes of telecommunication netwoks and

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Experimental and numerical simulation of the flow over a spillway

Experimental and numerical simulation of the flow over a spillway Euopean Wate 57: 253-260, 2017. 2017 E.W. Publications Expeimental and numeical simulation of the flow ove a spillway A. Seafeim *, L. Avgeis, V. Hissanthou and K. Bellos Depatment of Civil Engineeing,

More information

Parallel processing model for XML parsing

Parallel processing model for XML parsing Recent Reseaches in Communications, Signals and nfomation Technology Paallel pocessing model fo XML pasing ADRANA GEORGEVA Fac. Applied Mathematics and nfomatics Technical Univesity of Sofia, TU-Sofia

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

Automatic Generation of Reliable E Commerce Payment Processes

Automatic Generation of Reliable E Commerce Payment Processes Infomation Systems Engineeing (WISE 2000), Hong Kong, China, June 2000. Automatic Geneation of Reliable E Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Institute of Infomation Systems

More information

Secure Collaboration in Mediator-Free Environments

Secure Collaboration in Mediator-Free Environments Secue Collaboation in Mediato-Fee Envionments Mohamed Shehab School of Electical and Compute Engineeing Pudue Univesity West Lafayette, IN, USA shehab@pudueedu Elisa Betino Depatment of Compute Sciences

More information

Data mining based automated reverse engineering and defect discovery

Data mining based automated reverse engineering and defect discovery Data mining based automated evese engineeing and defect discovey James F. Smith III, ThanhVu H. Nguyen Naval Reseach Laboatoy, Code 5741, Washington, D.C., 20375-5000 ABSTRACT A data mining based pocedue

More information

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

Effects of Model Complexity on Generalization Performance of Convolutional Neural Networks

Effects of Model Complexity on Generalization Performance of Convolutional Neural Networks Effects of Model Complexity on Genealization Pefomance of Convolutional Neual Netwoks Tae-Jun Kim 1, Dongsu Zhang 2, and Joon Shik Kim 3 1 Seoul National Univesity, Seoul 151-742, Koea, E-mail: tjkim@bi.snu.ac.k

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

Three-Dimensional Aerodynamic Design Optimization of a Turbine Blade by Using an Adjoint Method

Three-Dimensional Aerodynamic Design Optimization of a Turbine Blade by Using an Adjoint Method Jiaqi Luo e-mail: jiaqil@uci.edu Juntao Xiong Feng Liu e-mail: fliu@uci.edu Depatment of Mechanical and Aeospace Engineeing, Univesity of Califonia, Ivine, Ivine, CA 92697-3975 Ivan McBean Alstom Powe

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

Getting Started PMW-EX1/PMW-EX3. 1 Rotate the grip with the RELEASE button pressed. Overview. Connecting the Computer and PMW-EX1/EX3

Getting Started PMW-EX1/PMW-EX3. 1 Rotate the grip with the RELEASE button pressed. Overview. Connecting the Computer and PMW-EX1/EX3 A PMW-EX1/PMW-EX3 Getting Stated Oveview This document descibes how to use the XDCAM EX Vesion Up Tool (heeafte Vesion Up Tool ) to upgade the PMW-EX1 and PMW-EX3 to vesion 1.20 (PMW-EX1) o vesion 1.10

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

Annales UMCS Informatica AI 2 (2004) UMCS

Annales UMCS Informatica AI 2 (2004) UMCS Pobane z czasopisma Annales AI- Infomatica http://ai.annales.umcs.pl Annales Infomatica AI 2 (2004) 33-340 Annales Infomatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Embedding as a

More information

5 4 THE BERNOULLI EQUATION

5 4 THE BERNOULLI EQUATION 185 CHATER 5 the suounding ai). The fictional wok tem w fiction is often expessed as e loss to epesent the loss (convesion) of mechanical into themal. Fo the idealied case of fictionless motion, the last

More information

Prediction of Time Series Using RBF Neural Networks: A New Approach of Clustering

Prediction of Time Series Using RBF Neural Networks: A New Approach of Clustering 138 The Intenational Aab Jounal of Infomation Technology, Vol. 6,. 2, Apil 2009 Pediction of Time Seies Using RBF Neual Netwoks: A New Appoach of Clusteing Mohammed Awad 2, Hécto Pomaes 1, Ignacio Rojas

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

Event-based Location Dependent Data Services in Mobile WSNs

Event-based Location Dependent Data Services in Mobile WSNs Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

THE SOLID IMAGE: a new concept and its applications

THE SOLID IMAGE: a new concept and its applications THE SOLID IMAGE: a new concept and its applications Leando Bonaz ( # ), Segio Dequal ( # ) ( # ) Politecnico di Toino - Dipatimento di Geoisose e Teitoio C.so Duca degli Abuzzi, 4 119 Toino Tel. +39.11.564.7687

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO

OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO Zeeshan A. Shaikh 1 and T.Y. Badguja 2 1,2 Depatment of Mechanical Engineeing, Late G. N. Sapkal

More information

INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING

INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING Emmanuel Buno Univesité du Sud Toulon-Va / LSIS CNRS BP 20132, F-83957 La Gade buno@univ-tln.f Nicolas Faessel LSIS CNRS Domaine Univesitaie de Saint-Jéôme

More information

An Optimised Density Based Clustering Algorithm

An Optimised Density Based Clustering Algorithm Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

Vehicle Chassis Control Using Adaptive Semi-Active Suspension

Vehicle Chassis Control Using Adaptive Semi-Active Suspension Poceedings of the 17th Wold Congess The Intenational Fedeation of Automatic Contol Vehicle Chassis Contol Using Adaptive Semi-Active Suspension V. Sankaanaayanan, Sinan Oncu, Dince Ocan, and Levent Güvenç

More information

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing IEEE TRANSACTIONS ON COMPUTERS, VOL. 50, NO. 9, SEPTEMBER 200 949 Dynamic Multiple Paity (DMP) Disk Aay fo Seial Tansaction Pocessing K.H. Yeung, Membe, IEEE, and T.S. Yum, Senio Membe, IEEE AbstactÐThe

More information

Haptic Glove. Chan-Su Lee. Abstract. This is a final report for the DIMACS grant of student-initiated project. I implemented Boundary

Haptic Glove. Chan-Su Lee. Abstract. This is a final report for the DIMACS grant of student-initiated project. I implemented Boundary Physically Accuate Haptic Rendeing of Elastic Object fo a Haptic Glove Chan-Su Lee Abstact This is a final epot fo the DIMACS gant of student-initiated poject. I implemented Bounday Element Method(BEM)

More information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220

More information

Using Data Flow Diagrams for Supporting Task Models

Using Data Flow Diagrams for Supporting Task Models in Companion Poc. of 5 th Euogaphics Wokshop on Design, Specification, Veification of Inteactive Systems DSV-IS 98 (Abingdon, 3-5 June 1998), P. Makopoulos & P. Johnson (Eds.), Spinge-Velag, Belin, 1998.

More information