Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications [1 ed.] 1402062656, 9781402062650

This book includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art resear

249 97 10MB

English Pages 552 [529] Year 2007

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
1402062656......Page 1
Table of Contents......Page 5
Preface......Page 12
Acknowledgements......Page 13
1. A Hybrid Predistorter for Nonlinearly Amplified MQAM Signals......Page 15
2. Safe Logon with Free Lightweight Technologies......Page 19
3. Stochastic Communication in Application Specific Networks–on–Chip......Page 24
4. A Random Approach to Study the Stability of Fuzzy Logic Networks......Page 30
5. Extending Ad Hoc Network Range using CSMA(CD) Parameter Optimization......Page 35
6. Resource Aware Media Framework for Mobile Ad Hoc Networks......Page 38
7. Cross-Layer Scheduling of QoS-Aware Multiservice Users in OFDM-Based Wireless Networks......Page 42
8. Development of a Joystick-based Control for a Differential Drive Robot......Page 48
9. Structure and Analysis of a Snake-like Robot......Page 53
10. A Novel Online Technique to Characterize and Mitigate DoS Attacks using EPSD and Honeypots......Page 58
11. Multi-Scale Modelling of VoIP Traffic by MMPP......Page 64
12. Transparent Multihoming Protocol Extension for MIPv6 with Dynamic Traffic Distribution across Multiple Interfaces......Page 70
13. The Wave Variables, A Solution for Stable Haptic Feedback in Molecular Docking Simulations......Page 76
14. A Model for Resonant Tunneling Bipolar Transistors......Page 83
15. Developing secure Web-applications – Security Criteria for the Development of e-Democracy Webapplications......Page 87
16. Data Acquisition and Processing for Determination of Vibration state of Solid Structures – Mechanical press PMCR 63......Page 93
17. Quality of Uni- and Multicast Services in a Middleware. LabMap Study Case......Page 97
18. Traffic Flow Analysis Over a IPv6 Hybrid Manet......Page 103
19. Designing Aspects of a Special Class of Reconfigurable Parallel Robots......Page 109
20. Performance Analysis of Blocking Banyan Switches......Page 115
21. Demystifying the Dynamics of Linear Array Sensor Imagery......Page 120
22. On the Robustness of Integral Time Delay Systems with PD Controllers......Page 125
23. Improvement of the Segmentation in HS Sub-space by means of a Linear Transformation in RGB Space......Page 131
24. Obstruction Removal Using Feature Extraction Through Time for Videoconferencing Processing......Page 137
25. Blade Design and Forming for Fans Using Finite Elements......Page 140
26. On the Application of Cumulant-based Cyclostationary Processing on Bearings Diagnosis......Page 146
27. Application of Higher-order Statistics on Rolling Element Bearings Diagnosis......Page 150
28. Extending RSVP-TE to Support Guarantee of Service in MPLS......Page 154
29. Operators Preserving Products of Hurwitz Polynomials and Passivity......Page 160
30. A Computer Aided Tool Dedicated to Specification and Verification of the MoC and the MoF......Page 163
31. Directionality Based Preventive Protocol for Mobile Ad Hoc Networks......Page 169
32. The Problem of Accurate Time Measurement in Researching Self-Similar Nature of Network Traffic......Page 175
33. Wi-Fi as a Last Mile Access Technology and The Tragedy of the Commons......Page 178
34. Study of Surfaces Generated by Abrasive Waterjet Technology......Page 184
35. On Length-Preserving Symmetric Cryptography......Page 189
36. Revocable Proxy Signature Scheme with Efficient Multiple Delegations to the Same Proxy Signer......Page 195
37. A Robust Method for Registration of Partially-Overlapped Range Images Using Genetic Algorithms......Page 200
38. Lips Movement Segmentation and Features Extraction in Real Time......Page 206
39. Droplet Acceleration In The Arc......Page 212
40. A Comparison of Methods for Estimating the Tail Index of Heavy-tailed Internet Traffic......Page 219
41. IEC61499 Execution Model Semantics......Page 223
42. Towards a Practical Differential Image Processing Approach of Change Detection......Page 229
43. An ISP level Distributed Approach to Detect DDoS Attacks......Page 235
44. Performance Enhancement of Blowfish Algorithm by Modifying its Function......Page 241
45. A Clustering Algorithm Based on Geographical Sensor Position in Wireless Sensor Networks......Page 245
46. The Economic Evaluation of the Active DSRC Application for Electronic Toll Collection System in KOREA......Page 250
47. Adaptive Control of Milling Forces under Fractional Order Holds......Page 256
48. Application of Genetic Algorithms to a Manufacturing Industry Scheduling Multi-Agent System......Page 261
49. Pre- and Post- Processing for Enhancement of Image Compression Based on Spectrum Pyramid......Page 267
50. The Use of Maple in Computation of Generalized Transfer Functions for Nonlinear Systems......Page 273
51. A Game Theoretic Approach to Regulating Mutual Repairing in a Self-Repairing Network......Page 279
52. An Automated Self-Configuring Driver System for IEEE 802.11b/g WLAN Standards......Page 285
53. Development of a Virtual Force-Reflecting Scara Robot for Teleoperation......Page 290
54. Improving HORSE Again and Authenticating MAODV......Page 296
55. Curvelet Transform Based Logo Watermarking......Page 301
56. Fairness Enhancement of IEEE 802.11 Ad Hoc Mode Using Rescue Frames......Page 306
57. Modelling Trust in Wireless Sensor Networks from the Sensor Reliability Prospective......Page 312
58. Performability Estimation of Network Services in the Presence of Component Failures......Page 317
59. RBAC Model for SCADA......Page 323
60. DNPSec Simulation Study......Page 330
61. A Client-Server Software that Violates Security Rules Defined by Firewalls and Proxies......Page 336
62. Mobile Communication in Real Time for the First Time. User Evaluation of Non-voice Terminal Equipment for People with Hearing and Speech Disabilities......Page 340
63. Analyzing the Key Distribution from Security Attacks in Wireless Sensor......Page 346
64. Hint Key Distribution for Sensor Networks......Page 351
65. A Model for GSM Mobile Network Design......Page 356
66. Application of LFSR with NTRU Algorithm......Page 360
67. Adaptive Packet Loss Concealment Mechanism for Wireless Voice Over Ip......Page 365
68. Dynamic Location Privacy Mechanism in Location-Aware System......Page 368
69. Video Transmission Performance Using Bluetooth Technology......Page 374
70. Kelvin Effect, Mean Curvatures and Load Impedance in Surface Induction Hardening: An Analytical Approach including Magnetic Losses......Page 377
71. A Simple Speed Feedback System for Low Speed DC Motor Control in Robotic Applications......Page 384
72. A Low Power CMOS Circuit for Generating Gaussian Pulse and its Derivatives for High Frequency Applications......Page 387
73. On the Efficiency and Fairness of Congestion Control Algorithms......Page 391
74. Hopfield Neural Network as a Channel Allocator......Page 394
75. Command Charging Circuit with Energy Recovery for Pulsed Power Supply of Copper Vapor Laser......Page 398
76. Performance Evaluation of MANET Routing Protocols Using Scenario Based Mobility Models......Page 403
77. Analysis of Small World Phenomena and Group Mobility in Ad Hoc Networks......Page 409
78. Handoff Management Schemes for HCN/WLAN Interworking......Page 415
79. Cross-Layer Fast and Seamless Handoff Scheme for 3GPP-WLAN Interworking......Page 421
80. Minimizing the Null Message Exchange in Conservative Distributed Simulation......Page 427
81. An Analog Computer to Solve any Second Order Linear Differential Equation with Arbitrary Coefficients......Page 433
82. QoS Provisioning in WCDMA 3G Networks using Mobility Prediction......Page 436
83. Patent-Free Authenticated-Encryption as Fast as OCB......Page 442
84. Application of Least Squares Support Vector Machines in Modeling of the Top-oil Temperature......Page 445
85. Optimal Routing with Qos Guarantees in the Wireless Networks......Page 451
86. RFID in Automotive Supply Chain Processes - There is a Case......Page 456
87. Reduced – Order Controller Design in Discrete Time Domain......Page 462
88. Simple Intrusion Detection in an 802.15.4 Sensor Cluster......Page 468
89. Dim Target Detection in Infrared Image Sequences Using Accumulated Information......Page 474
90. Cooperative Diversity Based on LDPC Code......Page 478
91. MEMS Yield Simulation with Monte Carlo Method......Page 481
92. A Human Interface Tool for System Modeling and Application Development Based on Multilevel Flow Models......Page 485
93. Genetic Algorithm Approach in Adaptive Resource Allocation in OFDM Systems......Page 491
94. Real-time Vehicle Detection with the Same Algorithm both Day and Night Using the Shadows Underneath Vehicles......Page 497
95. An Authentication Protocol to Address the Problem of the Trusted 3rd Party Authentication Protocols......Page 503
96. Autonomous Agents based Dynamic Distributed (A2D2) Intrusion Detection System......Page 507
97. Modeling and Implementation of Agent-Based Discrete Industrial Automation......Page 514
98. Performance of CBR and TCP Traffics in Various MANET Environments......Page 520
D......Page 525
I......Page 526
M......Page 527
S......Page 528
Z......Page 529

Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications [1 ed.]
 1402062656, 9781402062650

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Recommend Papers