A Resistance Temperature Detector (RTD) with a digital, networked smart sensor signal conditioner was designed and tested. The data format and internal Transducer Electronic Transducer Data Sheet (TEDS) is compatible ...
详细信息
ISBN:
(纸本)0780381432
A Resistance Temperature Detector (RTD) with a digital, networked smart sensor signal conditioner was designed and tested. The data format and internal Transducer Electronic Transducer Data Sheet (TEDS) is compatible with a revised (RS232) version of the ieee1451.2 smart sensor interface standard. A Network Capable Application Processor (NCAP) which interfaces directly to the Internet via Ethernet (without a PC) was demonstrated. Also a version with a PC (via RS232) was tested. A microprocessor with an internal 24-bit A/D and a ratio-metric circuit configuration allowed measurement and computational resolution to within 2 ppm. The overall data resolution was 0.001 °C. An advantage of the digital transfer of data is that resolution is not lost in the transfer process. Data can be viewed by any computer on the Internet through a standard browser either directly or through a service website which periodically polls the sensor and stores the data for later review.
The proceedings contain 130 papers. The special focus in this conference is on Information systems and Information Technologies. The topics include: Face detection by facial features with color images and face recogni...
ISBN:
(纸本)3540220542
The proceedings contain 130 papers. The special focus in this conference is on Information systems and Information Technologies. The topics include: Face detection by facial features with color images and face recognition using PCA;a new recurrent fuzzy associative memory for recognizing time-series patterns contained ambiguity;a feature-based algorithm for recognizing gestures on portable computers;fingerprint matching based on linking information structure of minutiae;video summarization using fuzzy one-class support vector machine;a transcode and prefetch technique of multimedia presentations for mobile terminals;a study on methodology for enhancing reliability of datapath;a useful method for multiple sequence alignment and its implementation;a research on the stochastic model for spoken language understanding;constructing control flow graph for java by decoupling exception flow from normal flow;a document classification algorithm using the fuzzy set theory and hierarchical structure of document;a supervised Korean verb sense disambiguation algorithm based on decision lists of syntactic features;a fuzzy expert system for network forensics;a design of preventive integrated security management system using security labels and a brief comparison with existing models;authentication of mobile node using AAA in coexistence of VPN and mobile IP;new approach for secure and efficient metering in the web advertising;detection techniques for ELF executable file using assembly instruction searching and applied research of active network to control network traffic in virtual battlefield.
The proceedings contain 25 papers. The special focus in this conference is on Integration and Peer to Peer. The topics include: JDBC in WSDL, or something altogether different;emergent semantics systems;user-specific ...
ISBN:
(纸本)3540236090
The proceedings contain 25 papers. The special focus in this conference is on Integration and Peer to Peer. The topics include: JDBC in WSDL, or something altogether different;emergent semantics systems;user-specific semantic integration of heterogeneous data;towards a mediation system framework for transparent access to largely distributed sources;null values revisited in prospect of data integration;semantic-based query routing and heterogeneous data integration in peer-to-peer semantic link networks;peer selection in peer-to-peer networks with semantic topologies;a self-organizing epidemic algorithm for selective information dissemination in wireless mobile ad-hoc networks;a framework for peer-to-peer data integration on grids;semantically linking and browsing provenance logs for e-science;towards self-organizing scientific metadata;semantic visualization of biochemical databases;semantic information interoperability in open networked systems;a new mechanism for the interoperability of data systems;an architecture for recommendation based service mediation;static-dynamic integration of external services into generic business processes;agent-based ontology-driven search over heterogeneous databases using semantic web services;managing grid schemas globally;relational graphical models of computational workflows for data mining;information resource integration;semantic annotation of classification data for KDD support services;role of the ontologies in the context of grid computing and application for the human disease studies;cluster entries for semantic organization of peer-to-peer network;a peer-to-peer service supporting data quality and analysis patterns for the geographic database conceptual schema.
The proceedings contain 36 papers. The special focus in this conference is on Foundations of Software Science and Computation Structures. The topics include: Theories for the global ubiquitous computer;choice in dynam...
ISBN:
(纸本)3540212981
The proceedings contain 36 papers. The special focus in this conference is on Foundations of Software Science and Computation Structures. The topics include: Theories for the global ubiquitous computer;choice in dynamic linking;a language for polynomial time computation;on the existence of an effective and complete inference system for cryptographic protocols;hypergraphs and degrees of parallelism;election and local computations on edges;decidability of freshness, undecidability of revelation;LTL over integer periodicity constraints;unifying recursive and co-recursive definitions in sheaf categories;deriving bisimulation congruences in the DPO approach to graph rewriting;a denotational account of untyped normalization by evaluation;on finite alphabets and infinite bases;specifying and verifying partial order properties using template MSCs;angelic semantics of fine-grained concurrency;on the expressiveness of infinite behavior and name scoping in process calculi;a language for controlling mobile code;distance desert automata and the star height one problem;adhesive categories;a game semantics of local names and good variables;partial correctness assertions provable in dynamic logics;polynomials for proving termination of context-sensitive rewriting;on recognizable timed languages;tree transducers and tree compressions;on term rewriting systems having a rational derivation;duality for labelled markov processes;electoral systems in ambient calculi;canonical models for computational effects;reasoning about dynamic policies;probabilistic bisimulation and equivalence for security analysis of network protocols and strong bisimulation for the explicit fusion calculus.
The proceedings contain 28 papers. The special focus in this conference is on Theory of Cryptography. The topics include: Notions of reducibility between cryptographic primitives;indifferentiability, impossibility res...
ISBN:
(纸本)3540210008
The proceedings contain 28 papers. The special focus in this conference is on Theory of Cryptography. The topics include: Notions of reducibility between cryptographic primitives;indifferentiability, impossibility results on reductions, and applications to the random oracle methodology;on the random-oracle methodology as applied to length-restricted signature schemes;universally composable commitments using random oracles;transformation of digital signature schemes into designated confirmer signature schemes;list-decoding of linear functions and analysis of a two-round zero-knowledge argument;on the possibility of one-message weak zero-knowledge;soundness of formal encryption in the presence of active adversaries;rerandomizable and replayable adaptive chosen ciphertext attack secure cryptosystems;alternatives to non-malleability: definitions, constructions, and applications;a note on constant-round zero-knowledge proofs for NP;lower bounds for concurrent self composition;secret-key zero-knowlegde and non-interactive verifiable exponentiation;a quantitative approach to reductions in secure computation;physically observable cryptography;efficient and universally composable committed oblivious transfer and applications;a universally composable mix-net;a general composition theorem for secure reactive systems;unfair noisy channels and oblivious transfer;computational collapse of quantum state with application to oblivious transfer;implementing oblivious transfer using collection of dense trapdoor permutations;composition of random systems;simpler session-key generation from short random passwords;constant-round oblivious transfer in the bounded storage model;hierarchical threshold secret sharing;on compressing encrypted data without the encryption key and on the notion of pseudo-free groups.
The proceedings contain 165 papers. The special focus in this conference is on Genetic Algorithms, Genetic Programming and Learning Classifier systems. The topics include: PID controller tuning for stable and unstable...
ISBN:
(纸本)3540223436
The proceedings contain 165 papers. The special focus in this conference is on Genetic Algorithms, Genetic Programming and Learning Classifier systems. The topics include: PID controller tuning for stable and unstable processes applying GA;dynamic uniform scaling for multiobjective genetic algorithms;computational complexity and simulation of rare events of ising spin glasses;fitness inheritance in the Bayesian optimization algorithm;limit cycle prediction in multivariable nonlinear systems using genetic algorithms;introduction of a new selection parameter in genetic algorithm for constrained reliability design problems;improving the performance of a genetic algorithm using a variable-reordering algorithm;designing competent mutation operators via probabilistic model building of neighborhoods;classification with scaled genetic algorithms in a coevolutionary setting;new epistasis measures for detecting independently optimizable partitions of variables;a comparison of genetic programming and genetic algorithms in the design of a robust, saturated control system;upper bounds on the time and space complexity of optimizing additively separable functions;an effective chromosome representation for evolving flexible job shop schedules;linkage identification by nonlinearity check for real-coded genetic algorithms;modeling dependencies of loci with string classification according to fitness differences;a gene based adaptive mutation strategy for genetic algorithms;subthreshold-seeking behavior and robust local search;non-stationary subtasks can improve diversity in stationary tasks;the shifting balance genetic algorithm as more than just another island model GA and an estimation of distribution algorithm based on maximum entropy.
The proceedings contain 25 papers. The special focus in this conference is on Management Architecture and SLA Based Management. The topics include: Requirements on quality specification posed by service orientation;au...
ISBN:
(纸本)3540236317
The proceedings contain 25 papers. The special focus in this conference is on Management Architecture and SLA Based Management. The topics include: Requirements on quality specification posed by service orientation;automating the provisioning of application services with the BPEL4WS workflow language;defining reusable business-level qos policies for diffserv;policy driven business performance management;business driven prioritization of service incidents;a case-based reasoning approach for automated management in policy-based networks;an analysis method for the improvement of reliability and performance in policy-based management systems;policy-based resource assignment in utility computing environments;failure recovery in distributed environments with advance reservation management systems;autonomous management of clustered server systems using JINI;event-driven management automation in the ALBM cluster system;a formal validation model for the Netconf protocol;using object-oriented constraint satisfaction for automated configuration generation;problem determination using dependency graphs and run-time behavior models;role-based access control for xml enabled management gateways;spotting intrusion scenarios from firewall logs through a case-based reasoning approach;a reputation management and selection advisor schemes for peer-to-peer systems;using process restarts to improve dynamic provisioning;server support approach to zero configuration in-home networking;rule-based CIM query facility for dependency resolution;availability-aware self-configuration in autonomic systems;a framework for autonomic job recovery and simplifying correlation rule creation for effective systems monitoring.
暂无评论