TCBAC: An Access Control Model for Remote Calibration System
|
|
- Noah Payne
- 6 years ago
- Views:
Transcription
1 JOURNAL OF SOFTWARE, VOL. 8, NO., DECEMBER TCBAC: An Access Contol Model fo Remote Calibation System Zhuokui Wu School of Mechanical & Automotive Engineeing, South China Univesity of Technology, Guangzhou, China College of Automation, Zhongkai Univesity of Agicultue and Engineeing, Guangzhou, China Guixiong Liu School of Mechanical & Automotive Engineeing, South China Univesity of Technology, Guangzhou, China Abstact In ode to impove the eliability of emote calibation system, a task-constaint-based access contol model named TCBAC is pesented accoding to the chaacteistic of emote calibation system. TCBAC conducts access contol accoding to task. It defines authoization constaints and execution constaints by the chaacteistics of task and the elation among tasks. Uses can obtain a task authoization only when the authoization constaint is satisfied, and can execute a task only when the execution constaint is satisfied. The pefomance of TCBAC is analyzed by applying it to a emote calibation system and compaing it with DAC, MAC and RBAC which ae commonly used access contol models at pesent. The esults show that TCBAC has the advantages of consideing context and dynamics, it moe fully satisfies the pinciple of least pivilege and the pinciple of sepaation of duty and has good expansibility. Index Tems access contol, emote calibation, metology, instument, task I. INTRODUCTION Calibation is a kind of behavio which ensues the nomal opeation of measuing instument []. It concens industial and agicultual poduction, national defense constuction, scientific expeiments, domestic and foeign tade and the health and safety of the people. With the development of measuement, compute and netwok technologies, emote calibation technology ises gadually and has become a eseach hotspot []. Remote calibation technology stongly extends measuement assuance pogam, geatly shotens calibation time, and ealizes the high efficiency and low cost of calibation wok. Some kinds of emote calibation system have been pesented at pesent, such as emote calibation system of esisto [3][4], emote calibation system of pessue senso [5], emote calibation system of tempeatue senso [6], geneal emote calibation platfom based on Intenet [7], etc. These emote calibation systems solve the technical poblems of ealizing emote calibation opeation, but don t fully conside the eliable poblems of emote calibation opeation. Reliability diectly affects the pacticability, populaization and application of emote calibation system. It s a key poblem must be solved in the development of emote calibation system. Access contol technology is used to divide the pemission of opeato and pevent fom abusing pemission. It ensues calibation opeation can be completed safely and eliably. It s an impotant pat of eliable technology fo emote calibation system. Taditional access contol technology mainly includes DAC, MAC and RBAC at pesent [8][9][0]. But emote calibation system is a kind of multiple task system which is used to complete calibation opeation and elated auxiliay opeation, these taditional access contol technologies can t closely connect with the task opeation of emote calibation system because of thei static authoization mechanism, then the fine ganulaity access contol can t be conducted and some safety poblems ae caused. So it s vey impotant to build the dynamic access contol mechanism which can closely connect with the task of emote calibation system and conduct fine ganulaity access contol accoding to calibation task. Aiming at these poblems, a task-constaint-based access contol model named TCBAC fo emote calibation system is pesented. TCBAC closely connects with the task of emote calibation system, conducts fine ganulaity access contol accoding to calibation task and consides the dynamic change of task. So it has good safety and can impove the eliability of emote calibation system. II. BASIC STRUCTURE AND ACCESS CONTROL ANALYSIS OF REMOTE CALIBRATION SYSTEM A. Basic Stuctue The basic stuctue of emote calibation system is shown in Fig.. The calibation method by the stuctue is descibed as follows: The use of metology institution caies out the opeations of sending command and eceiving esult though the Intenet, and the use of calibation site caies out coesponding opeations by eceiving contol commands and feeds back esults to the use of metology institution. doi:0.4304/jsw
2 340 JOURNAL OF SOFTWARE, VOL. 8, NO., DECEMBER 03 Figue. The basic stuctue of emote calibation system B. Access Contol Analysis Remote calibation system has the chaacteistic of multiple tasks. The main tasks of emote calibation system include infomation egistation, infomation audit, instument infomation management, calibation application management, calibation pocess management and calibation esult management, etc. Some lage tasks also contain multiple child tasks. The access contol mechanism of emote calibation system is vey impotant to the eliability of calibation opeation in open netwok envionment. Fo the emote calibation system which has the chaacteistic of multiple tasks, the access contol mechanism needs to guaantee that a use can do which tasks and can t do which tasks and evey task opeation has a coesponding use, achieves the taceability of the unning of emote calibation system, then impoves the eliability of emote calibation system. So it needs to build a dynamic access contol model based on task. The model needs to meet the following equiements: () The pinciple of least pivilege. The pinciple of least pivilege means that the pemissions which a use has can t exceed the pemissions which the use uses to execute the task. In a emote calibation system, it means esticting the pemission of a use extemely to ensue the safety of emote calibation system unde the pecondition that calibation task can be completed successfully. () The pinciple of sepaation of duty. The pinciple of sepaation of duty means achieving the goal of supevising each othe by assigning tasks easonably. In emote calibation system, the fist use of the pinciple is to ensue the coectness of emote calibation opeation, the second use of it is to ensue no uses can t do faudulent activities in the system, so the eliability of emote calibation system is impoved. III. TASK-CONSTRAINT-BASED ACCESS CONTROL MODEL NAMED TCBAC The TCBAC model is descibed in detail fom task, task-constaint-based access contol and TCBAC model below. A. Task Task is the access unit of TCBAC. Task is defined as Definition fom the access contol pespective. Definition. Task: It means a specific wok assigned to a use. It includes multiple pemissive opeations to multiple objects fom the access contol pespective. All the tasks of a system ae expessed as a set of TASK = { taski i =,,3,...}. If all the opeation pemissions of a system ae expessed as a set of PERM = { pemi i =,,3,...} and all the objects of a system ae expessed as a set of OBJ = { obji i =,,3,...}, then an instance of task named task can be shown as Fig.. The task contains some opeation pemissions to thee objects named obj, obj and obj 3 which ae the opeation pemissions named pem, pem and pem 3 to obj, the opeation pemission named pem to obj and the opeation pemission named pem to obj 3. pem pem pem pem pem 3 task obj obj obj 3 Figue. Task instance Fo example, in a emote calibation system, a task named ceating and editing calibation tansaction file contains the view pemission to an object named instument infomation stoing data and the view and edit pemissions to an object named calibation tansaction infomation stoing data. B. Task-constaint-based Access Contol The task-constaint-based access contol mode is expessed as (). TASK USER ROLE GC EC. () In (), USER = { usei i =,,3,...}, ROLE = { olei i =,,3,...}, GC = { gci i =,,3,...} and EC = { eci i =,,3,...} epesents use set, ole set, authoization constaint set and execution constaint set, espectively. Equation () means: A use coesponds to a task set named TASK accoding to the ole named the use acts as; when authoizing a task named tsk to a use named u, if the use u satisfies the authoization constaint set named GC u,, then the authoization is tsk successful, othewise the authoization is fail; uses can t abusing pemission, they can use a pemission only when the execution constaint set is satisfied, fo example, the use u can execute the task tsk only when the execution constaint set named EC u, is satisfied. In tsk above, TASK TASK, the value of it is elated to the
3 JOURNAL OF SOFTWARE, VOL. 8, NO., DECEMBER ole ; GC u tsk, GC, EC u, tsk EC, the value of them is elated to the use u and the task tsk. Task, authoization constaint and execution constaint ae the main chaacteistics which the task-constaintbased access contol mode diffes fom othe access contol modes. The task-constaint-based access contol defines authoization constaints and execution constains by the chaacteistics of task and the elation among tasks. Authoization constaints ensue the pinciple of least pivilege and the pinciple of sepaation of duty, and execution constaints ensue the pinciple of least pivilege. Authoization constaints include authoization esponsibility constaint, authoization sepaation constaint, authoization count constaint and authoization time constaint. They ae defined espectively as follows. Definition. Authoization esponsibility constaint, ARC fo shot: It means a use coesponds to a task set named TASK accoding to the ole named the use acts as, the task not in TASK can t be authoized to the use. ARC is expessed as (). GC : TASK USER. () Equation () epesents the use acts as the ole only can be authoized the task in TASK. ARC is an authoization constaint based on task, and is contolled by the specific task in access contol. It eflects the pinciple of least pivilege. Definition 3. Authoization sepaation constaint, ASC fo shot: It means the use who is authoized the task tsk can t be authoized eithe task in TASK i. ASC is expessed as (3). GC : tsk TASK i. (3) GC task [ t min, t ]. (5) : max In (5), [ t min, tmax ] epesents a time inteval, it consists of lowe limit t min and uppe limit t max, and tmin t max. Equation (5) epesents a task can be authoized to a use only when the authoization time t satisfies the condition. ATC is an t min t t max authoization constaint based on task, and is contolled by the specific task in access contol. It pevents a use fom obtaining a pemission at any time which expands the pemission of the use and eflects the pinciple of least pivilege. Execution constaints include execution lifetime constaint, execution sequence constaint and execution time constaint. They ae defined espectively as follows. Definition 6. Execution lifetime constaint, ELC fo shot: It means a use can execute a task only when the task is in unning state. The lifetime of task includes fou states: domant state, blocking state, unning state and complete state, shown as Fig. 3. Each state is descibed as follows: () Domant state: It means the task has been ceated, but the task hasn t been assigned to a use. () Blocking state: It means the task has been assigned to a use, but the use can t execute the task because the execution constaint set isn t satisfied. (3) Running state: It means the task can be executed, the use who is authoized the task can execute it. (4) Complete state: It means the task has been completed, no uses can execute a completed task. Equation (3) epesents the task tsk and eithe task in TASK can t both be executed by the same use. ARC is i an authoization constaint based on task too, and is contolled by the specific task in access contol. It eflects the pinciple of sepaation of duty. Definition 4. Authoization count constaint, ACC fo shot: It means the numbe of tasks which a use has can t be infinite. ACC is expessed as (4). GC : use n. (4) Equation (4) epesents the numbe of tasks which a use can be authoized is n which doesn t include the numbe of completed tasks. ACC is an authoization constaint based on use, and is contolled by the specific use in access contol. It pevents fom expanding the pemission of use infinitely and eflects the pinciple of least pivilege. Definition 5. Authoization time constaint, ATC fo shot: It means a task can be authoized to a use only at a time between a time inteval. ATC is expessed as (5). Satisfying EC Not satisfying EC Figue 3. The lifetime of task As shown in Fig. 3, the state tansition of task is descibed as follows: The initial state when the task is ceated is domant state; the state tuns into unning state if satisfying the execution constaint set afte authoizing the task to a use, othewise the state tuns into blocking state; the state tuns into blocking state if the task in unning state doesn t satisfy the execution constaint set; if the use who is authoized the task can t complete the task fo vaious easons, the state of the task is einitialized to the domant state; the state tuns into complete state if the task is completed.
4 34 JOURNAL OF SOFTWARE, VOL. 8, NO., DECEMBER 03 ELC is a basic execution constaint, and is contolled by the system accoding to the state of task. ELC means a task can be executed only when it s in unning state. It eflects the pinciple of least pivilege. Definition 7. Execution sequence constaint, ESC fo shot: It means a task task j can be executed only afte anothe task task i has been completed. ESC is expessed as (6). UR USER ROLE TASK N EC TASK A EC : task i task j. (6) ESC is used to ensue the use execute the task in an odeed sequence. It limits the scope of use pemission and eflects the pinciple of least pivilege. Definition 8. Execution time constaint, ETC fo shot: It means a task can be executed only at a time between a time inteval. ETC is expessed as (7). EC task [ t min, t ]. (7) Figue 4. : max Equation (7) epesents a task can be executed only when the execution time t satisfies the condition tmin t t max. ETC is an execution constaint based on task, and is contolled by the specific task in access contol. ETC pevents the use fom abusing pemission at any time which expands the pemission of the use and eflects the pinciple of least pivilege. C. TCBAC model Definition 9. TCBAC model: TCBAC = { USER, ROLE, TASK, GC, EC, TU}. In the model, USER, ROLE, TASK, GC, EC, UR, TU epesents use set, ole set, task set, authoization constaint set, execution constaint set, use and ole assignment elation, task authoization mechanism. Fig. 4 is the TCBAC model schematic diagam, whee TASK N is the task set which hasn t been assigned and TASK is A the task set which has been assigned. GC TCBAC model TU The unning of TCBAC is based on thee elations and one mechanism. () Use and ole assignment elation UR : It means the elation between use and ole, the use coesponds to a task set accoding to the ole the use acts as in the system. UR is expessed as (8). UR : ROLE USER. (8) () Use and task authoization constaint elation GC : It means a use can t obtaining task pemission abitaily and the use can obtain task pemission only when the GC is satisfied, eflects the pinciple of least pivilege and the pinciple of sepaation of duty. GC mainly includes ARC, ASC, ACC and ATC, is expessed as (9). GC = { ARC, ASC, ACC, ATC}. (9) (3) Use and task execution constaint elation EC : It means a use can t abusing task pemission and the use can execute a task only when the EC is satisfied, eflects the pinciple of least pivilege. EC mainly includes ELC, ESC and ETC, is expessed as (0). EC = { ELC, ESC, ETC}. (0) (4) Task authoization mechanism TU : It ealizes to build the one to one elation between task and use, is expessed as (). TU : TASK USER. () The implementation algoithm fo TCBAC model is expessed as Algoithm. Algoithm : The pseudo-code of implementation algoithm fo TCBAC model DefiningRole(); // Defining ole DefiningUse(); // Defining use 3 DefiningUR (); // Use and ole assignment 4 DefiningTask(); // Defining task 5 DefiningGCofUse(use[i]); // Defining authoization constaints based on use, such as ACC 6 DefiningGCofTask(task[i]); // Defining authoization constaints based on task, such as ACC, ATC 7 DefiningECofTask(task[i]); // Defining execution constaints based on task, such as ESC, ETC 8 TU(); // Task authoization 9 ExecutingTask(task[i]); // Executing a task if the execution constaint set is satisfied IV. APPLICATION AND ANALYSIS OF TCBAC IN REMOTE CALIBRATION SYSTEM TCBAC is applied in a emote calibation system in this section. The application method of TCBAC in the emote calibation system is descibed in detail, and the pefomance of TCBAC is analyzed. A. Role, Use and UR Relation Definition Combining with the stuctue of emote calibation system, fou oles which ae administato of metology institution, odinay staff of metology institution, administato of calibation custome and odinay staff of calibation custome ae set in emote calibation system. The distibution of the fou oles in emote calibation system is shown as Fig. 5. In metology institution, one administato and some Figue 5. The oles of emote calibation system
5 JOURNAL OF SOFTWARE, VOL. 8, NO., DECEMBER odinay staffs ae set. Fo each calibation custome, one administato and some odinay staffs ae set too. The administato account of metology institution is configued diectly by the system, and the odinay staff account of metology institution can be configued by the administato of metology institution o be geneated by egisteing independently. The administato account and odinay staff account of calibation custome ae geneated by the mechanism of egisteing independently and auditing by the odinay staff of metology institution. The use and ole assignment elation is configued automatically by the system when a use egistes. A use only can act as one ole. B. Definition of Task, GC and EC GC based on use is shown in Table I, including ARC and ACC. The task definition of the system is shown in ARC in detail. application is confimed, the tasks which the calibation application includes ae boadcasted to the odinay staffs of metology institution and the odinay staffs of calibation custome unde the constaint of ARC. (3) The odinay staffs of metology institution and the odinay staffs of calibation custome can obtain the tasks which ae boadcasted to them unde the constaints of ASC and ATC. (4) The odinay staffs of metology institution and the odinay staffs of calibation custome can execute the tasks which they have obtained unde the constaints of ELC, ESC and ETC. D. Pefomance Analysis of TCBAC The effects of using TCBAC in emote calibation system ae summaized. Then TCBAC is compaed with DAC, MAC and RBAC which ae commonly used access contol models at pesent. The compaison esults ae TABLE I. GC BASED ON USER Role ARC ACC Administato of metology institution ()Odinay staff egiste ()Modifying use infomation (3)Viewing use infomation (4)Viewing issued cetificate (5)Confiming calibation application (6)Issuing calibation cetificate (7)Viewing the detailed infomation of calibation ode in pogess metology institution ()Auditing egiste infomation ()Viewing use infomation (3)Viewing instument infomation (4)Adding standad instument infomation (5)Viewing standad instument (6)Adding command file of standad instument (7)Adding calibation tansaction file (8)Viewing calibation tansaction file (9)Calibation opeations: It s set accoding to specific Viewing calibation custome Viewing calibated instument Selecting standad situation, such as 0. instument 4Confiming standad instument 4Ceating and editing calibation tansaction file 6Confiming calibation tansaction file 6 Auditing calibation pocess fo the fist time 8Auditing calibation pocess fo the second time 9 Dawing conclusion Administato of calibation custome ()Company egiste ()Odinay staff egiste (3)Modifying staff infomation (4)Viewing staff infomation (5)Viewing instument infomation (6)Making calibation application (7)Viewing calibation esult (8)Pinting calibation cetificate calibation custome ()Modifying pesonal infomation ()Adding instument infomation (3)Viewing instument infomation (4)Adding instument command file (5)Calibation opeations: It s set accoding to specific Viewing calibated instument infomation Executing calibation tansaction file situation, such as 5. Confiming calibation opeation GC and EC based on task ae shown in Table II. Only the tasks have GC and EC ae shown, and the tasks which aen t shown have no authoization constaints and execution constaints. The constaint based on task includes ASC, ATC, ELC, ESC and ETC. C. Access Contol Implementation Pocess of TCBAC Fo a emote calibation opeation in the emote calibation system, the access contol implementation pocess of TCBAC is descibed as follows: () The administato of calibation custome executes the task of making calibation application which submits a calibation application to the metology institution. () The administato of metology institution eceives the calibation application and executes the task of confiming calibation application. When the calibation shown in Table III. The compaison esult shown in Table III is explained as follows: () TCBAC conducts the fine ganulaity access contol accoding to calibation task fom task pespective, and consides the dynamic change of task and context, so it has good safety, satisfies the pinciple of least pivilege and the pinciple of sepaation of duty and has good expansibility. () DAC, MAC and RBAC ae static access contol models, don t conside context and haven t dynamics. (3) Use can delegate pemissions independently in DAC, so DAC has good authoization flexibility. But it s easy to make safety out of contol, can t satisfy the pinciple of least pivilege.
6 344 JOURNAL OF SOFTWARE, VOL. 8, NO., DECEMBER 03 TABLE II. GC AND EC BASED ON TASK Role Numbe Task ASC ATC ELC ESC ETC metology institution calibation custome Viewing calibation custome infomation Viewing calibated instument infomation 3 Selecting standad instument 4 Confiming standad instument Ceating and editing calibation tansaction file Confiming calibation tansaction file Auditing calibation pocess fo the fist time Auditing calibation pocess fo the second time 9 Dawing conclusion 0 Viewing calibated instument infomation Executing calibation tansaction file Confiming calibation opeation Automation Automation Task 8 Task 7 Task 7 and Task 8 Task Task Automation Automation Task 3 Automation Task 4 Automation Task 5 Automation Task Automation Task 7 Automation Task 8 Automation Automation Task 6 Automation Task TABLE III. THE COMPARISON RESULT AMONG TCBAC, DAC, MAC AND RBAC Access contol model Secuity Least pivilege Sepaation of duty Dynamics Context Expansibility TCBAC DAC MAC RBAC (4) MAC takes the method of mandatoy access contol, has good safety. But its authoization isn t flexible and its expansibility is poo. (5) RBAC has good safety, good authoization flexibility and good expansibility. But it doesn t conside context and dynamics, can t satisfy the pinciple of least pivilege. V. CONCLUSION A task-constaint-based access contol model named TCBAC fo emote calibation is pesented in this pape. The model has the chaacteistics and advantages as follows: () TCBAC conducts the fine ganulaity access contol accoding to calibation task, defines authoization constaints and execution constaints by the chaacteistics of task and the elation among tasks. Use can obtain a task pemission only when the authoization constaint is satisfied and execute a task only when the execution constaint is satisfied. Authoization constaints and execution constaints ensue the pinciple of least pivilege and the pinciple of sepaation of duty togethe. () Compaing with DAC, MAC and RBAC which ae commonly used access contol models at pesent, TCBAC has the advantages of consideing context and dynamics, it moe fully satisfies the pinciple of least pivilege and the pinciple of sepaation of duty and has good expansibility. The authoization mechanism of TCBAC model will be futhe eseached in the futue in ode to impove the pacticability of TCBAC model. ACKNOWLEDGMENT This wok was patially suppoted by the New Centuy Excellent Reseache Awad Pogam fom Ministy of Education of China (NCET-08-0).
7 JOURNAL OF SOFTWARE, VOL. 8, NO., DECEMBER REFERENCES [] Yu Zhang, Jing Zu, and Dongxing Pei, The miniatue intenal electonic pessue gauge and dynamic calibation method, Jounal of Computes, vol. 7, no., pp , 0. [] Xiaobin Hong, Guixiong Liu, Zhuokui Wu, and Xipeng Du, Remote calibation system fo fequency based on inplace benchmak, Fonties of Mechanical Engineeing, vol. 5, no. 3, pp. 36-3, 00. [3] M. Helmy A. Raouf, Rasha S. M. Ali, and M. S. Gadelab, Constuction and emote calibation of an automated esistance measuing system, MAPAN, vol. 6, no., pp. 5-3, 0. [4] S. Matsuzawa, T. Shimodaia, K. Hanaoka, A. Shimoyama, S. Sakagami, A. Domae, et al., Feasibility study on emote calibation of impedance standad fo industial use,, 008 Confeence on Pecision Electomagnetic Measuements Digest, pp , 008. [5] Tokihiko Kobata, Momoko Kojima, and Hioaki Kajikawa, Development of emote calibation system fo pessue standad, Measuement, vol. 45, no. 0, pp , 0. [6] Yue Qi and Heng Wang, Themocouple themomete emote calibation system design, Metology & Measuement Technique, vol. 39, no., pp. 4-5, 0. [7] Jingtao Guo and Zhigang Jin, Geneal tele-calibation platfom based on Intenet, Chinese Jounal of Scientific Instument, vol. 3, no. 4, pp [8] Guoyuan Lin, Yuyu Bie, and Min Lei, Tust based access contol policy in multi-domain of cloud computing, Jounal of Computes, vol. 8, no. 5, pp , 03. [9] Fenghua Li, Mang Su, Guozhen Shi, and Jianfeng Ma, Reseach status and development tends of access contol model, ACTA Electonica Sinica, vol. 40, no. 4, pp , 0. [0] Zan Yang, Lin Yang, Xiangyang Luo, Linu Ma, Baosheng Kou, and Kun Zhang, Model of domain based RBAC and suppoting technologies, Jounal of Computes, vol. 8, no. 5, pp. 0-9, 03. Zhuokui Wu was bon in 980, is cuently a lectue in Zhongkai Univesity of Agicultue and Engineeing, Guangzhou, China. He eceived maste degee fom South China Univesity of Technology, Guangzhou, China, in 006. He is cuently pusuing docto degee at School of Mechanical & Automotive Engineeing in South China Univesity of Technology. His eseach inteests include infomation system, instument, measuement and contol technology. Guixiong Liu was bon in 968, is cuently a pofesso and doctoal supeviso in South China Univesity of Technology, Guangzhou, China. He eceived docto degee fom Chongqing Univesity, Chongqing, China, in 995. His eseach inteests include moden detection technology and netwoked contol, intelligent sensing theoy and method, infomation system modeling theoy and application.
A modal estimation based multitype sensor placement method
A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;
More informationPositioning of a robot based on binocular vision for hand / foot fusion Long Han
2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,
More informationPoint-Biserial Correlation Analysis of Fuzzy Attributes
Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh
More informationSegmentation of Casting Defects in X-Ray Images Based on Fractal Dimension
17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach
More informationIP Network Design by Modified Branch Exchange Method
Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management
More informationJournal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012
2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo
More informationA ROI Focusing Mechanism for Digital Cameras
A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula
More informationControlled Information Maximization for SOM Knowledge Induced Learning
3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity
More informationTransmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design
Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced
More informationSlotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System
Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet
More informationSignal integrity analysis and physically based circuit extraction of a mounted
emc design & softwae Signal integity analysis and physically based cicuit extaction of a mounted SMA connecto A poposed geneal appoach is given fo the definition of an equivalent cicuit with SMAs mounted
More informationIllumination methods for optical wear detection
Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical
More informationOptical Flow for Large Motion Using Gradient Technique
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this
More informationObstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor
Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,
More informationDEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson
DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:
More informationCombinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments
Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile
More informationA New Finite Word-length Optimization Method Design for LDPC Decoder
A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology
More informationAn Extension to the Local Binary Patterns for Image Retrieval
, pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science
More informationSYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH
I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,
More informationAnd Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,
(IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat
More informationColor Correction Using 3D Multiview Geometry
Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,
More informationAssessment of Track Sequence Optimization based on Recorded Field Operations
Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment
More informationHigh performance CUDA based CNN image processor
High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu
More informationA Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation
A Minutiae-based Fingepint Matching Algoithm Using Phase Coelation Autho Chen, Weiping, Gao, Yongsheng Published 2007 Confeence Title Digital Image Computing: Techniques and Applications DOI https://doi.og/10.1109/dicta.2007.4426801
More informationDetection and Recognition of Alert Traffic Signs
Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives
More informationGeneralized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences
Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute
More informationXFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers
XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio
More informationIP Multicast Simulation in OPNET
IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok
More informationShortest Paths for a Two-Robot Rendez-Vous
Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal
More informationRANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES
RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class
More informationAccess Control Mechanisms for Inter-organizational Workflow
Access Contol Mechanisms fo Inte-oganizational Wokflo Myong H. Kang, Joon S. Pak and Judith N. Fosche Naval Reseach Laboatoy Infomation Technology Division 4555 Ovelook Ave. Washington, DC 20375 {mkang,
More informationAutomatically Testing Interacting Software Components
Automatically Testing Inteacting Softwae Components Leonad Gallaghe Infomation Technology Laboatoy National Institute of Standads and Technology Gaithesbug, MD 20899, USA lgallaghe@nist.gov Jeff Offutt
More informationAn Unsupervised Segmentation Framework For Texture Image Queries
An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu
More informationA Two-stage and Parameter-free Binarization Method for Degraded Document Images
A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and
More informationDesired Attitude Angles Design Based on Optimization for Side Window Detection of Kinetic Interceptor *
Poceedings of the 7 th Chinese Contol Confeence July 6-8, 008, Kunming,Yunnan, China Desied Attitude Angles Design Based on Optimization fo Side Window Detection of Kinetic Intecepto * Zhu Bo, Quan Quan,
More informationModelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set
Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;
More informationA Novel Automatic White Balance Method For Digital Still Cameras
A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing
More informationClustering Interval-valued Data Using an Overlapped Interval Divergence
Poc. of the 8th Austalasian Data Mining Confeence (AusDM'9) Clusteing Inteval-valued Data Using an Ovelapped Inteval Divegence Yongli Ren Yu-Hsn Liu Jia Rong Robet Dew School of Infomation Engineeing,
More informationFINITE ELEMENT MODEL UPDATING OF AN EXPERIMENTAL VEHICLE MODEL USING MEASURED MODAL CHARACTERISTICS
COMPDYN 009 ECCOMAS Thematic Confeence on Computational Methods in Stuctual Dynamics and Eathquake Engineeing M. Papadakakis, N.D. Lagaos, M. Fagiadakis (eds.) Rhodes, Geece, 4 June 009 FINITE ELEMENT
More informationA Memory Efficient Array Architecture for Real-Time Motion Estimation
A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN
More informationPrioritized Traffic Recovery over GMPLS Networks
Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing
More informationSCR R&D and control development combining GT-SUITE and TNO models. GTI user-conference
SCR R&D and contol development combining G-SUIE and NO models GI use-confeence Contents Intoduction: Bidging the gap fom R&D to ECU implementation Contol development at NO Implementation of NO models in
More informationInformation Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes
CS630 Repesenting and Accessing Digital Infomation Infomation Retieval: Basics Thosten Joachims Conell Univesity Infomation Retieval Basics Retieval Models Indexing and Pepocessing Data Stuctues ~ 4 lectues
More informationInput Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer
Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au
More informationPerformance Optimization in Structured Wireless Sensor Networks
5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame
More informationAssessment of query reweighing, by rocchio method in farsi information retrieval
Univesity of Wollongong Reseach Online Univesity of Wollongong in Dubai - Papes Univesity of Wollongong in Dubai 2008 Assessment of quey eweighing, by occhio metho in fasi infomation etieval F Sabooi Bu-Ali
More informationIMAGERY TEXTURE ANALYSIS BASED ON MULTI-FEATURE FRACTAL DIMENSION
IMAGERY TEXTURE ANALYSIS BASED ON MULTI-EATURE RACTAL DIMENSION Jingxue Wang a,*, Weidong Song a, eng Gao b a School o Geomatics, Liaoning Technical Univesity, uxin, Liaoning, 13, China xiaoxue1861@163.com,
More informationANN Models for Coplanar Strip Line Analysis and Synthesis
200 IJCSNS Intenational Jounal of Compute Science and Netwok Secuity, VOL.8 No.10, Octobe 2008 Models fo Coplana Stip Line Analysis and J.Lakshmi Naayana D.K.Si Rama Kishna D.L.Patap Reddy Chalapathi Institute
More informationA VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM
Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,
More informationDecentralized Trust Management for Ad-Hoc Peer-to-Peer Networks
Decentalized Tust Management fo Ad-Hoc Pee-to-Pee Netwoks Thomas Repantis Vana Kalogeaki Depatment of Compute Science & Engineeing Univesity of Califonia, Riveside Riveside, CA 92521 {tep,vana}@cs.uc.edu
More informationAn Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network
An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol
More informationCellular Neural Network Based PTV
3th Int Symp on Applications of Lase Techniques to Fluid Mechanics Lisbon, Potugal, 6-9 June, 006 Cellula Neual Netwok Based PT Kazuo Ohmi, Achyut Sapkota : Depatment of Infomation Systems Engineeing,
More informationADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM
ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,
More informationExtract Object Boundaries in Noisy Images using Level Set. Final Report
Extact Object Boundaies in Noisy Images using Level Set by: Quming Zhou Final Repot Submitted to Pofesso Bian Evans EE381K Multidimensional Digital Signal Pocessing May 10, 003 Abstact Finding object contous
More informationEmbeddings into Crossed Cubes
Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability
More informationReachable State Spaces of Distributed Deadlock Avoidance Protocols
Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications
More informationImproved Fourier-transform profilometry
Impoved Fouie-tansfom pofilomety Xianfu Mao, Wenjing Chen, and Xianyu Su An impoved optical geomety of the pojected-finge pofilomety technique, in which the exit pupil of the pojecting lens and the entance
More informationAPPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE
APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE 1 YAROSLAVTSEV A.F., 2 Al-THUNEIBAT S.A., 3 AL TAWALBEH N.A 1 Depatment of Netwoking, SSUTI, Novosibisk, Russia
More informationSeparability and Topology Control of Quasi Unit Disk Graphs
Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,
More informationQuality Aware Privacy Protection for Location-based Services
In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,
More informationMethod of controlling access to intellectual switching nodes of telecommunication networks and systems
ISSN (e): 2250 3005 Volume 05 Issue 05 ay 2015 Intenational Jounal of Computational Engineeing eseach (IJCE) ethod of contolling access to intellectual switching nodes of telecommunication netwoks and
More informationANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS
ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth
More informationCommunication vs Distributed Computation: an alternative trade-off curve
Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,
More informationTowards Adaptive Information Merging Using Selected XML Fragments
Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,
More informationExperimental and numerical simulation of the flow over a spillway
Euopean Wate 57: 253-260, 2017. 2017 E.W. Publications Expeimental and numeical simulation of the flow ove a spillway A. Seafeim *, L. Avgeis, V. Hissanthou and K. Bellos Depatment of Civil Engineeing,
More informationParallel processing model for XML parsing
Recent Reseaches in Communications, Signals and nfomation Technology Paallel pocessing model fo XML pasing ADRANA GEORGEVA Fac. Applied Mathematics and nfomatics Technical Univesity of Sofia, TU-Sofia
More informationFrequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters
Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using
More informationAutomatic Generation of Reliable E Commerce Payment Processes
Infomation Systems Engineeing (WISE 2000), Hong Kong, China, June 2000. Automatic Geneation of Reliable E Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Institute of Infomation Systems
More informationSecure Collaboration in Mediator-Free Environments
Secue Collaboation in Mediato-Fee Envionments Mohamed Shehab School of Electical and Compute Engineeing Pudue Univesity West Lafayette, IN, USA shehab@pudueedu Elisa Betino Depatment of Compute Sciences
More informationData mining based automated reverse engineering and defect discovery
Data mining based automated evese engineeing and defect discovey James F. Smith III, ThanhVu H. Nguyen Naval Reseach Laboatoy, Code 5741, Washington, D.C., 20375-5000 ABSTRACT A data mining based pocedue
More informationAccurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen
Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity
More informationTopological Characteristic of Wireless Network
Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences
More informationA New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE
5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai
More informationSpiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks
Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition
More informationEffects of Model Complexity on Generalization Performance of Convolutional Neural Networks
Effects of Model Complexity on Genealization Pefomance of Convolutional Neual Netwoks Tae-Jun Kim 1, Dongsu Zhang 2, and Joon Shik Kim 3 1 Seoul National Univesity, Seoul 151-742, Koea, E-mail: tjkim@bi.snu.ac.k
More informationSCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS
SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),
More informationThree-Dimensional Aerodynamic Design Optimization of a Turbine Blade by Using an Adjoint Method
Jiaqi Luo e-mail: jiaqil@uci.edu Juntao Xiong Feng Liu e-mail: fliu@uci.edu Depatment of Mechanical and Aeospace Engineeing, Univesity of Califonia, Ivine, Ivine, CA 92697-3975 Ivan McBean Alstom Powe
More informationOn Error Estimation in Runge-Kutta Methods
Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment
More informationGetting Started PMW-EX1/PMW-EX3. 1 Rotate the grip with the RELEASE button pressed. Overview. Connecting the Computer and PMW-EX1/EX3
A PMW-EX1/PMW-EX3 Getting Stated Oveview This document descibes how to use the XDCAM EX Vesion Up Tool (heeafte Vesion Up Tool ) to upgade the PMW-EX1 and PMW-EX3 to vesion 1.20 (PMW-EX1) o vesion 1.10
More informationMulti-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples
Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits
More informationAnnales UMCS Informatica AI 2 (2004) UMCS
Pobane z czasopisma Annales AI- Infomatica http://ai.annales.umcs.pl Annales Infomatica AI 2 (2004) 33-340 Annales Infomatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Embedding as a
More information5 4 THE BERNOULLI EQUATION
185 CHATER 5 the suounding ai). The fictional wok tem w fiction is often expessed as e loss to epesent the loss (convesion) of mechanical into themal. Fo the idealied case of fictionless motion, the last
More informationPrediction of Time Series Using RBF Neural Networks: A New Approach of Clustering
138 The Intenational Aab Jounal of Infomation Technology, Vol. 6,. 2, Apil 2009 Pediction of Time Seies Using RBF Neual Netwoks: A New Appoach of Clusteing Mohammed Awad 2, Hécto Pomaes 1, Ignacio Rojas
More informationa Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives
SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which
More informationEvent-based Location Dependent Data Services in Mobile WSNs
Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,
More informationSimulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM
J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on
More informationScaling Location-based Services with Dynamically Composed Location Index
Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute
More informationTHE SOLID IMAGE: a new concept and its applications
THE SOLID IMAGE: a new concept and its applications Leando Bonaz ( # ), Segio Dequal ( # ) ( # ) Politecnico di Toino - Dipatimento di Geoisose e Teitoio C.so Duca degli Abuzzi, 4 119 Toino Tel. +39.11.564.7687
More informationModule 6 STILL IMAGE COMPRESSION STANDARDS
Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.
More informationThe Internet Ecosystem and Evolution
The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee
More informationOPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO
OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO Zeeshan A. Shaikh 1 and T.Y. Badguja 2 1,2 Depatment of Mechanical Engineeing, Late G. N. Sapkal
More informationINDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING
INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING Emmanuel Buno Univesité du Sud Toulon-Va / LSIS CNRS BP 20132, F-83957 La Gade buno@univ-tln.f Nicolas Faessel LSIS CNRS Domaine Univesitaie de Saint-Jéôme
More informationAn Optimised Density Based Clustering Algorithm
Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,
More informationA Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform
A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad
More informationHierarchically Clustered P2P Streaming System
Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.
More informationVehicle Chassis Control Using Adaptive Semi-Active Suspension
Poceedings of the 17th Wold Congess The Intenational Fedeation of Automatic Contol Vehicle Chassis Contol Using Adaptive Semi-Active Suspension V. Sankaanaayanan, Sinan Oncu, Dince Ocan, and Levent Güvenç
More informationDynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing
IEEE TRANSACTIONS ON COMPUTERS, VOL. 50, NO. 9, SEPTEMBER 200 949 Dynamic Multiple Paity (DMP) Disk Aay fo Seial Tansaction Pocessing K.H. Yeung, Membe, IEEE, and T.S. Yum, Senio Membe, IEEE AbstactÐThe
More informationHaptic Glove. Chan-Su Lee. Abstract. This is a final report for the DIMACS grant of student-initiated project. I implemented Boundary
Physically Accuate Haptic Rendeing of Elastic Object fo a Haptic Glove Chan-Su Lee Abstact This is a final epot fo the DIMACS gant of student-initiated poject. I implemented Bounday Element Method(BEM)
More informationTitle. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information
Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220
More informationUsing Data Flow Diagrams for Supporting Task Models
in Companion Poc. of 5 th Euogaphics Wokshop on Design, Specification, Veification of Inteactive Systems DSV-IS 98 (Abingdon, 3-5 June 1998), P. Makopoulos & P. Johnson (Eds.), Spinge-Velag, Belin, 1998.
More information