Search Results - "INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005"
-
1
A survey of digital image watermarking techniques
Published in INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005 (2005)“…Watermarking, which belong to the information hiding field, has seen a lot of research interest. There is a lot of work begin conducted in different branches…”
Get full text
Conference Proceeding -
2
Service-oriented architectures for devices - the SIRENA view
Published in INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005 (2005)“…This paper outlines the perspectives opened by the application of the service-orientation paradigm for realizing high-level communications between…”
Get full text
Conference Proceeding -
3
Executing real-time constrained control applications modelled in IEC 61499 with respect to dynamic reconfiguration
Published in INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005 (2005)“…New fast moving markets demand flexible, adaptable production facilities to allow manufacturing companies a fast reaction on consumer needs. Reconfigurable…”
Get full text
Conference Proceeding -
4
A real-time Linux execution environment for function-block based distributed control applications
Published in INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005 (2005)“…The function block (FB) construct has been adopted by recent IEC standards for the design of reusable, interoperable, distributed control applications…”
Get full text
Conference Proceeding -
5
An IEC 61499 application generator for scan-based industrial controllers
Published in INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005 (2005)“…In order to cope with today's market uncertainties, manufacturing is required to rapidly adapt and react to changes and unpredictable scenarios. These are…”
Get full text
Conference Proceeding -
6
Fingerprinted secret sharing steganography for robustness against image cropping attacks
Published in INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005 (2005)“…Steganography is the art and science of hiding information. In this paper we propose a conceptual framework for fingerprinted secret sharing steganography. We…”
Get full text
Conference Proceeding -
7
A multiagent based control approach for evolvable assembly systems
Published in 2005 3rd IEEE International Conference on Industrial Informatics, 2005 (2005)“…The work presented in this paper intends to clarify how multiagents can be an adequate paradigm to solve the challenges imposed by evolvable assembly systems…”
Get full text
Conference Proceeding -
8
Web based methodology for engineering and maintenance of distributed control systems: the TORERO approach
Published in INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005 (2005)“…This paper presents the architecture and the methodology of a distributed control system (DCS) which is based on intelligent field devices and an integrative…”
Get full text
Conference Proceeding -
9
Multi-agent based information access services for condition monitoring in process automation
Published in INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005 (2005)“…This paper studies issues concerning the application of goal-oriented information agents to condition monitoring tasks in process automation. In the presented…”
Get full text
Conference Proceeding -
10
Trustworthy service selection and composition - reducing the entropy of service-oriented Web
Published in INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005 (2005)“…Current e-service selection relies upon service registries to make recommendations. It is almost impossible to capture and make use of valuable personal…”
Get full text
Conference Proceeding -
11
Design and implementation of distributed hierarchical automation and control systems with IEC 61499
Published in INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005 (2005)“…The paper presents a prototypical implementation of a Java thread-based run-time environment for IEC 61499 applications and its use in the application design…”
Get full text
Conference Proceeding -
12
DETECTIVE: a decision tree based categorical value clustering and perturbation technique for preserving privacy in data mining
Published in INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005 (2005)“…Data mining is a powerful tool for information discovery from huge datasets. Various sectors, including commercial, government, financial, medical, and…”
Get full text
Conference Proceeding -
13
Dynamic spatial block arrangement scheduling in shipbuilding industry using genetic algorithm
Published in INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005 (2005)“…In any large heavy industry like that of ship building, there exist a lot of complications for the arrangement of building blocks optimally for the minimal…”
Get full text
Conference Proceeding -
14
Proxy-and-hook: a Java-based distributed object caching
Published in INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005 (2005)“…Scalability is a stringent requirement to every evolving information system. One of the key solutions to the scalability is caching. Most distributed object…”
Get full text
Conference Proceeding -
15
FASPRO: fast computer tool for the analysis of propagation in mobile communications
Published in INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005 (2005)“…FASPRO is an accurate and extremely efficient tool to perform deterministic analysis of propagation in urban picocells and microcells. A fully 3D propagation…”
Get full text
Conference Proceeding -
16
Architecture for automation system development based on IEC 61499 standard
Published in INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005 (2005)“…This paper introduces an idea of a validatable architecture for software intensive industrial automation systems. The validation means will be provided through…”
Get full text
Conference Proceeding -
17
M-CI/sup 2/: modelling cyber interdependencies between critical infrastructures
Published in INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005 (2005)“…For Canadians, recent events such as the Ontario/US power blackout of 2003 and the SAKS scare highlight the importance of protection of infrastructure of…”
Get full text
Conference Proceeding -
18
Integral resource optimization network - a new solution on power markets
Published in INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005 (2005)“…Many of today's European power systems are influenced by the deregulated energy market. Although demand and supply result in free prices and customers are free…”
Get full text
Conference Proceeding -
19
An energy-aware elevator group control system
Published in INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005 (2005)“…As the trend for mega high-rise buildings continues, efficient scheduling of group elevator systems is becoming increasingly important. In this paper, we…”
Get full text
Conference Proceeding -
20
Application of UML in plant modeling for model-based verification: UML translation to TNCES
Published in INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005 (2005)“…There do exist dozens of formal languages and formalisms that may be used for modeling different phenomena of real world. The time for industrial acceptance of…”
Get full text
Conference Proceeding