By Topic

18th International Conference on Systems Engineering (ICSEng'05)

Date 16-18 Aug. 2005

Filter Results

Displaying Results 1 - 25 of 87
  • Proceedings. 18th International Conference on Systems Engineering

    Publication Year: 2005
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • 18th International Conference on Systems Engineering - Title Page

    Publication Year: 2005, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • 18th International Conference on Systems Engineering - Copyright Page

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • 18th International Conference on Systems Engineering - Table of contents

    Publication Year: 2005, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • General Chair's message

    Publication Year: 2005, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (33 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2005, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • A fuzzy logic approach for aircraft evacuation modelling

    Publication Year: 2005, Page(s):3 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (79 KB) | HTML iconHTML

    Aircraft evacuation effectiveness is a critical issue for passenger's safety with large aircraft. New aircraft must comply with maximum exit time limits. To validate the aircraft evacuation system design and procedures, demonstration according to many different scenarios have been performed in the past. But more recently, numerical simulation tools have been developed to avoid the limitations inhe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On optimization of sensor selection for aircraft gas turbine engines

    Publication Year: 2005, Page(s):9 - 14
    Cited by:  Papers (7)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (95 KB) | HTML iconHTML

    Many science and management problems can be formulated as global optimization problems. Conventional optimization methods that make use of derivatives and gradients are not, in general, able to locate or identify the global optimum. Sometimes these problems can be solved using exact methods like brute force. Unfortunately, these methods become computationally intractable because of multidimensiona... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantics based operators for integrating heterogeneous biological data sources

    Publication Year: 2005, Page(s):16 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    Advances in analytical techniques have drastically increased the amount of biological data available, which in turn has increased the difficulty and complexity of biological knowledge discovery. It is important to have mechanisms to take fall advantage of the data not only for doing simple searches, but also for answering ad hoc and complex questions at the user's will by virtually connecting the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network intrusion and failure detection system with statistical analyses of packet headers

    Publication Year: 2005, Page(s):22 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    In this research, practical application for quasi-realtime intrusion and network failure detection was designed and implemented. IP packet headers are counted at the monitoring point and summarized in every 5 minutes. Then four kind of statistical analyses are applied to the 5-minute summaries to find a sudden increase/decrease. As the result, the developed application works fine with a standard d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A query system for spatiotemporal database applications

    Publication Year: 2005, Page(s):28 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    In recent years, an increasing number of database applications deal with continuously changing data objects (CCDOs). In these applications, the underlying data management system must support new types of spatiotemporal queries that refer to CCDOs. The expressive power of the supported query language and the query processing algorithms determine the quality and the efficiency of the query system. I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data mining in the analysis of Internet performance as perceived by end-users

    Publication Year: 2005, Page(s):34 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    In this paper, we propose data mining analysis of Internet performance data. The research is aimed at characterization of Web performance as seen by the end-users. Our strategy involves discovering knowledge that characterizes Web performance perceived by end-users and then making use of this knowledge to guide users in further Internet usage. Our two-phase data mining decision model can predict R... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RACE on a physically distributed and logically shared memory system

    Publication Year: 2005, Page(s):40 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    The RACE (remote access cache coherency enforcement) protocol is a cache coherency protocol that uses a full-mapped directory-based cache protocol to provide a consistent memory through multi-level memory hierarchy consisting of a number of processor caches, physically distributed shared-memory, and third level caches. In this paper, we have proposed a RACE protocol which can be used in the physic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Closed-loop driver/vehicle model for automotive control

    Publication Year: 2005, Page(s):46 - 51
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    This paper demonstrates the implementation of a comprehensive vehicle model combined with a driver model in closed loop for the purpose of developing and testing of vehicle stability systems. As an example of such a stability system, a model of an active front steering controller is considered. The operation of this controller is based on vehicle states available my means of a state estimator. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preventing deadlock with dynamic message scheduling

    Publication Year: 2005, Page(s):52 - 57
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    Although deadlock is not completely avoidable in distributed and parallel programming, we here describe theory and practice of a system that allows us to limit deadlock to situations in which there are true circular data dependences or failure of processes that compute data needed at other processes. This allows us to guarantee absence of deadlock in SPMD computations absent process failure. Our s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and performance evaluation of an adaptive parity cache technique

    Publication Year: 2005, Page(s):58 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    This research proposes adaptive parity cache technique on cache to solve "small write problem" of RAID 5 especially in OLTP environments. This configuration provides a cache management method that adds information on the read/write characteristics of the file when a user process in RAID 5 makes a request to kernel for a file. This information is used for management of disk cache by reading the par... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two-level cache for distributed system in RAID 5 disk controller

    Publication Year: 2005, Page(s):64 - 69
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    We proposed a two-level disk cache model to achieve higher hit ratios and relieve 'small write problem' in RAID 5 disk controller and to enhance reliability of disk cache using non-volatile memory device for stable data. Especially this model improved utilization of first level cache. The proposed cache system consists of two-level caches with different associativities and different block sizes. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual clusters

    Publication Year: 2005, Page(s):70 - 75
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Because of the comparative inexpensiveness of hardware and the availability of open source software, cluster computing has become common for institutions with moderate to large needs for high performance computing. One of the problems with cluster computing, though, is that debugging existing or new system software or analyzing the effects of altering system hardware can require that a cluster be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The capacity and non-simultaneously multicommodity flow problem in wide area network and data flow management

    Publication Year: 2005, Page(s):76 - 80
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (75 KB) | HTML iconHTML

    The paper presents a formulation of the capacity and non-simultaneously multicommodity flow assignment problem in a wide area computer network and dataflow management. The problem consists of selection of non-simultaneously multicommodity flow routes and channel capacities in order to minimize the average delay per packet subject to a budget constraint. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Co-existence of transaction and non transaction-managed activity in a persistent object store

    Publication Year: 2005, Page(s):81 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB) | HTML iconHTML

    Persistent object stores provide an execution environment in which data and its interrelationships are, by default, retained in their original form beyond the lifetimes of the program or programs that created them. Stability mechanisms ensure that such stores always start up in a self-consistent state, even after non-orderly shutdowns that result from events such as power outages or hardware failu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ensuring preset level of robustness in control systems for objects with the distributed parameters

    Publication Year: 2005, Page(s):88 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    The problem of sampled-data regulator synthesis of automatic control system is considered. For the decision of the problem, the real interpolation method is offered. Two important procedures, which guarantee decreasing of computation costs in comparison with traditional methods, are in its basis. Firstly, a special discrete transformation of time functions is used and derivable functions-images ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LQG control under input variance constraint

    Publication Year: 2005, Page(s):94 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    In this paper, a variance-constrained LQG control is considered for a plant given by discrete-time ARMAX model. The minimization of constrained quadratic cost is approached by Kalman filter and output feedback methods. The obtained optimization algorithms are simulated for second-order plant model and different constraints. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On absolute stability and semi-active control of a magnetorheological fluid vibration suppression system

    Publication Year: 2005, Page(s):100 - 105
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    This paper treats the question of absolute stability and control of a two degree-of-freedom vibration suppression system. For the position control and vibration suppression of the payload, a magnetorheological (MR) fluid damper is chosen. First, it is shown that for any arbitrarily time varying input current, the system is absolutely stable. Then a nonlinear inverse (feedback linearizing) control ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Output-ing subspaces, zero dynamics and zeros in MIMO LTI proper systems

    Publication Year: 2005, Page(s):106 - 111
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (94 KB) | HTML iconHTML

    In linear time-invariant multi-input multi-output proper systems S(A,B,C,D) the classical notion of Smith zeros does not characterize fully the output-zeroing problem nor the zero dynamics. However, introducing the notion of invariant zeros (defined as those complex numbers in which there exists a zero direction with nonzero state-zero direction) which constitutes an extension of the concept of Sm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Review and enhancement of cautious parameter estimation for model based control: a specific realization of regularization

    Publication Year: 2005, Page(s):112 - 117
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    This paper reviews a method of cautious parameter estimation which was proposed initially for estimating models of industrial processes for the purpose of model based control. Essentially, the method is able to influence the resulting estimation algorithm by introducing 'fictitious' measurements which correspond to a priori knowledge of the values of specific model parameters. The paper shows that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.