The proceedings contain 225 papers. The topics discussed include: a simple and efficient way to combine microcontrollers with RSA cryptography;graph theoretical algorithms for JVM operand stack visualization and bytec...
ISBN:
(纸本)9789881925244
The proceedings contain 225 papers. The topics discussed include: a simple and efficient way to combine microcontrollers with RSA cryptography;graph theoretical algorithms for JVM operand stack visualization and bytecode verification;a probabilistic approach to text generation of human motions extracted from kinect videos;cryptography for a high-assurance web-based enterprise;a dynamic Bayesian network model for predicting congestion during a ship fire evacuation;lifecycle for management of e-contracts based on web service;a graph-based decentralization proposal for convex non linear separable problems with linear constraints;system in sightseeing spots;construction of a home network system using a power line communication method and a voice recognition command controller;intelligent vertical handover for heterogeneous wireless network;and multiple antenna channel codes for satellite communication.
The proceedings contain 225 papers. The topics discussed include: a simple and efficient way to combine microcontrollers with RSA cryptography;graph theoretical algorithms for JVM operand stack visualization and bytec...
ISBN:
(纸本)9789881925169
The proceedings contain 225 papers. The topics discussed include: a simple and efficient way to combine microcontrollers with RSA cryptography;graph theoretical algorithms for JVM operand stack visualization and bytecode verification;a probabilistic approach to text generation of human motions extracted from kinect videos;cryptography for a high-assurance web-based enterprise;a dynamic Bayesian network model for predicting congestion during a ship fire evacuation;lifecycle for management of e-contracts based on web service;a graph-based decentralization proposal for convex non linear separable problems with linear constraints;system in sightseeing spots;construction of a home network system using a power line communication method and a voice recognition command controller;intelligent vertical handover for heterogeneous wireless network;and multiple antenna channel codes for satellite communication.
While the popularity of IoT networks has grown significantly, they remain highly vulnerable to various cyber-attacks. These attacks can disrupt services, compromise sensitive data, and damage the integrity of IoT ecos...
详细信息
This volume contains fifty-six revised and extended research articles, written by prominent researchers participating in the congress. Topics covered include electrical engineering, chemical engineering, circuits, com...
ISBN:
(纸本)9789402407853
This volume contains fifty-six revised and extended research articles, written by prominent researchers participating in the congress. Topics covered include electrical engineering, chemical engineering, circuits, computerscience, communications systems, engineering mathematics, systems engineering, manufacture engineering and industrial applications. This book offers theoretical advances in engineering technologies and presents state of the art applications. It also serves as an excellent source of reference for researchers and graduate students working with/on engineering technologies.
This volume contains fifty-six revised and extended research articles, written by prominent researchers participating in the congress. Topics covered include electrical engineering, chemical engineering, circuits, com...
ISBN:
(数字)9789401791144;9789401791151
ISBN:
(纸本)9789401791144;9789401791151
This volume contains fifty-six revised and extended research articles, written by prominent researchers participating in the congress. Topics covered include electrical engineering, chemical engineering, circuits, computerscience, communications systems, engineering mathematics, systems engineering, manufacture engineering and industrial *** book offers theoretical advances in engineering technologies and presents state of the art applications. It also serves as an excellent source of reference for researchers and graduate students working with/on engineering technologies.
An approach combining SysML and VHDL-AMS is proposed in this paper. The design is modeled with SysML and then we derive some intuitive rules to obtain the VHDL-AMS model of the lower level blocks built in SysML. The w...
详细信息
ISBN:
(纸本)9789881925237
An approach combining SysML and VHDL-AMS is proposed in this paper. The design is modeled with SysML and then we derive some intuitive rules to obtain the VHDL-AMS model of the lower level blocks built in SysML. The work is at the level of the tentative approach that is being carried out on real industrial application for onboard systems. The paper goes beyond the models issues and carries out the simulation procedure that are available on tools to validate the design for the intended blocks.
As technology advances, systems perform more functions and become more interconnected. The result is an increasing level of complexity. Those charged with acquiring such systems need to ask whether or not they have th...
详细信息
ISBN:
(纸本)9789881925312
As technology advances, systems perform more functions and become more interconnected. The result is an increasing level of complexity. Those charged with acquiring such systems need to ask whether or not they have the right skills to successfully complete them. A comprehensive technique is proposed for addressing reactive systems, such technique is based on systems engineering concepts. The work is illustrated through two systems engineering standard as IEEE P1220 and ANSI-EIA 632.
The purpose of this paper is to forward an algorithm that is useful to the assembly language programmer to enable him/her input numbers that are in fixed point or e-notation form. This algorithm shall enhance the maxi...
详细信息
ISBN:
(纸本)9789881925169
The purpose of this paper is to forward an algorithm that is useful to the assembly language programmer to enable him/her input numbers that are in fixed point or e-notation form. This algorithm shall enhance the maximization of the potentials of the Numerical Data Processor - the co-processor that performs floating point arithmetic.
The research presents improved design of a flour milling machine. It is a machine used for the milling of flour (dough) to a higher degree for food production without damaging the nutrients. In the construction of the...
详细信息
ISBN:
(纸本)9789881925244
The research presents improved design of a flour milling machine. It is a machine used for the milling of flour (dough) to a higher degree for food production without damaging the nutrients. In the construction of the design it is expected to use indigenous technology and to increase efficiency, minimize cost and maximize profit. The machine was designed to use the main drive shaft as means of speed reduction. It is very cheap to maintain.
The fatigue process of mechanical components under service loading is stochastic in nature. Fatigue life prediction and reliability evaluation is still a problematical issue. A new damage model is presented and some d...
详细信息
ISBN:
(纸本)9789881925244
The fatigue process of mechanical components under service loading is stochastic in nature. Fatigue life prediction and reliability evaluation is still a problematical issue. A new damage model is presented and some difficulty in fatigue crack growth under variable amplitude loading involved in load interaction effects have been kept in a memory function M(a). A technique is introduced where both deterministic and probabilistic viewpoints in fatigue modelling are combined in a simple manner.
暂无评论