By Topic

Power Electronics and Intelligent Transportation System, 2008. PEITS '08. Workshop on

Date 2-3 Aug. 2008

Filter Results

Displaying Results 1 - 25 of 136
  • [Front cover]

    Publication Year: 2008 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (198 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (15 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (50 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (47 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008 , Page(s): v - xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (136 KB)  
    Freely Available from IEEE
  • Message from the Workshop Chair

    Publication Year: 2008 , Page(s): xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (102 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • PEITS 2008 Organizing Committee

    Publication Year: 2008 , Page(s): xv
    Save to Project icon | Request Permissions | PDF file iconPDF (116 KB)  
    Freely Available from IEEE
  • PEITS 2008 Committee Members

    Publication Year: 2008 , Page(s): xvi - xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (113 KB)  
    Freely Available from IEEE
  • A Cross-Layer Fast Handover Mechanism for IEEE 802.16e Networks with HMIPv6 Mobility

    Publication Year: 2008 , Page(s): 3 - 7
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (322 KB) |  | HTML iconHTML  

    IEEE 802.16e standard is considered to be one of the most promising solutions for next generation broadband wireless networks. Still, handover latency in IEEE 802.16e networks is an important issue that affects real-time applications. In this paper, a cross-layer fast hierarchical handover mechanism (CLFH) for IEEE 802.16e networks is introduced. The handover procedure of IEEE 802.16e is integrated with fast and hierarchical MIPv6 handover to achieve performance improvements. Moreover, the 802.16e network re-entry procedures are optimized to reduce the link layer handover delay. The proposed mechanism is discussed in detail and compared with a mechanism proposed in IETF draft. The simulation results illustrate that the proposed mechanism achieves better performance in the handover latency and the service disruption time. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design of Manufacturing Execution System Based on RFID

    Publication Year: 2008 , Page(s): 8 - 11
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (276 KB) |  | HTML iconHTML  

    From the supply chain, now RFID technology is gradually applied to the core of manufacturing process. By adopting the RFID technology in workshop layer, the exact real-time information that is obtained from RFID, can be seamlessly integrated into the manufacturing execution system. Therefore it can create additional value, and increase productivity for the enterprise. The technical advantages of applying RFID technology to the manufacturing execution system are analyzed detailedly by this paper. Taking the textile industry as object, the design of manufacturing execution system based on RFID is presented by this paper. And it provide perfection system solution for enterprise realizing real-time informatization. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Channel Assignment in Wireless LANs

    Publication Year: 2008 , Page(s): 12 - 17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (303 KB) |  | HTML iconHTML  

    A traffic-aware and client-aware algorithm for dynamically assigning channels to access points (APs) in wireless local access networks (WLANs) is proposed. Traffic loads and received signal strength (RSS) values are used to characterize interference. The problem of selecting channels to minimize total interference then reduces to the Max k-Cut problem, which we efficiently solve with semidefinite programming (SDP) relaxation. Testbed experiments demonstrate that our traffic-aware algorithm can significantly improve the quality of a channel assignment in terms of total network throughput and channel utilization. Under a randomly generated continuous traffic distribution, throughput gains of 40% on average over static channel assignment are observed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing Optimized Video Transmission over Mobile Ad Hoc Networks

    Publication Year: 2008 , Page(s): 18 - 22
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (513 KB) |  | HTML iconHTML  

    In mobile ad hoc networks, the communication node always produces a great deal of routing control packets while performing the route discovery and maintenance, which seriously impacts the real-time video transmission quality. Therefore, we propose a new routing control packets limited forwarding (RCPLF) algorithm that can reduce the routing overhead of on-demand routing protocol. In our algorithm, the route discovery is limited within a reasonable region, so that the number of routing control packets can be reduced and the bandwidth occupied by them can be saved effectively. Thus RCPLF algorithm is beneficial to improve the real-time video transmission quality. The simulation experiments have been carried out to measure the performance. In addition, any routing protocol using flooding based route discovery can use this algorithm to optimize video transmission performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High-Frequency Surface-Wave Radar Real Time Frequency Selecting Based on Frequency Randomly Hopping Signal

    Publication Year: 2008 , Page(s): 23 - 26
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (225 KB) |  | HTML iconHTML  

    Serious radio interferences are distributed in the operating frequency band of High-frequency surface-wave radar (HFSWR) which makes it difficult to find silent bandwidth especially at night to work, the performance of HFSWR is decreased greatly. Frequency randomly hopping signal which breakthrough the restriction of continual spectrum has become an effective anti-jamming method. Based on the study of HF spectrum forecasting measure, the frequency selecting methods of frequency hopping signal radar was studied in this paper. Forecast with deterministic model followed by state partition was proposed, which has higher reliability than traditional deterministic model and statistical model. The rule of most silent channel was used to select the optimum frequency band and genetic algorithm was used to optimize frequency combination. The noise floor and the signal side-lobe level are minimized effectively and it improves the detection capability of HFSWR in heavily congested electromagnetic environments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Highway Incident Detection Method Based on Wireless Positioning Technology

    Publication Year: 2008 , Page(s): 27 - 30
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (328 KB) |  | HTML iconHTML  

    An innovative motorist-initiated incident detection method using wireless positioning technology, such as Global Positioning System (GPS) and Cellular Phone Positioning System (CPS) is developed. Then, the basic detection algorithm is presented. The position information and operating characteristics of reporting vehicles are detected using wireless positioning system and is transferred by global system for mobile communications (GSM) networks. According to the information, the traffic management center (TMC) can position the incident accurately in short order. The validity of this incident detection method is proved by a simulation model and the detecting performances are evaluated under different traffic and incident conditions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic ID-Based User Authentication and Key Agreement Scheme for Multi-Server Environment Using Bilinear Pairings

    Publication Year: 2008 , Page(s): 33 - 37
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (142 KB) |  | HTML iconHTML  

    Remote user authentication is suited to solve the privacy and security problems for the single server architecture environment. With the rapid development of Internet service, more and more network architectures are used in multi-server environments. In this paper, a user authentication scheme for multi-server environment is presented. The proposed scheme is based on bilinear pairings. Moreover, it does not only implement mutual authentication and session key agreement but also achieve user's anonymity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Deterministic Packet Marking Scheme for IP Traceback

    Publication Year: 2008 , Page(s): 38 - 41
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (245 KB) |  | HTML iconHTML  

    This paper proposes a novel deterministic packet marking (NDPM) scheme for IP traceback. It mainly marks packets with IP addresses and the number of current autonomous system (AS) through border gateway protocol (BGP) routers. According to the marked information in the packets, victims can not only trace the attack source to the original AS, but also can filter the malicious packets, hence making it possible to alleviate the impact caused by attack traffic on the victims. It resolves the disadvantages of the traditional packet marking methods with heavy computational overhead and low speed of tracing back to the attack source. At the same time, it doesn't need all the routers' participation in marking in the attack path, which greatly reduces the overhead of routers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fast Method of Local Network Topology

    Publication Year: 2008 , Page(s): 42 - 47
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (199 KB) |  | HTML iconHTML  

    Only few switches in a real-time power system are operated during a short interval between the executions of the network topology algorithm, and switch activities just have local affect on network topology. So a fast local network topology method using optimal search direction is presented in this paper. The proposed method has three main procedures: determining optimal search direction, substation configuration and network configuration. Firstly the proposed method determines generalized overhanging branches and finds the optimal search directions for them. Then the substation configuration reconfigures buses only at substation voltage levels affected by switch activities. At last the network configuration determines network connectivity for islands in optimal search direction which can greatly decrease search scope. The presented method is fast, effective and reliable, and experimental results illustrate the effectiveness of the method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invulnerability Assessment for Mobile Ad Hoc Networks

    Publication Year: 2008 , Page(s): 48 - 51
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (220 KB) |  | HTML iconHTML  

    Usually, a mobile ad hoc network is confronted with four different damages: random failure, mobile attack, energy limit and selective attack. These attacks will not only destroy network topology, but also will make the transferring capacity and bandwidth of network to be influenced. An assessment of mobile ad hoc network invulnerability is proposed based on the characteristic of mobile ad hoc network. A definition of invulnerability rate is proposed. The invulnerability rate of network is decided by three factors, i.e., connectivity, transferring capacity, and bandwidth of network. At last, we give two experiments to evaluate the performance of the proposed invulnerability assessment method. The results show that mobile ad hoc network has the very strong invulnerability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovery of Unknown Visual Information Based on Target Tracking

    Publication Year: 2008 , Page(s): 52 - 55
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (527 KB) |  | HTML iconHTML  

    To discover important but previously unknown information in video sequences, a discovery method of unknown visual information based on target tracking is proposed in this paper. It provides a worthy approach for support decision. The proposed discovery method analyzes the video using target tracking. This method, adopting detection and correspondence of feature points, target identification and tracking, and target occlusion techniques etc, analyzes video sequences. In the video, using above techniques, we not only study the spatio-temporal relationships of moving target to obtain important information accurately, but also still study the target model problem. This discovery method can be applied in actual domain. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Email Virus Propagation Model

    Publication Year: 2008 , Page(s): 56 - 60
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (310 KB) |  | HTML iconHTML  

    in this paper, two new parameters, user vigilance and removing time, are incorporated into the classical email virus propagation model SEIR. New model extended the classical virus propagation model SEIR. The experimental results showed that these parameters greatly influence the virus propagation. Meanwhile, the simulations demonstrate that improved model can be used for calculating the costs of virus outbreak. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheme of Electronic Seal Based on Public Key Infrastructure

    Publication Year: 2008 , Page(s): 61 - 64
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (204 KB) |  | HTML iconHTML  

    This paper improves the general electronic seal scheme based on PKI platform. The original scheme has low efficiency and complicated process when seal's authenticity is verified. In this new scheme, before the seal is used for the time a random code will be created by CA. The random code and the electronic seal image will be printed together. User can easily complete the seal security anti-counterfeiting verification under security strength with no high requirement, through contacting CA for checking the random. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CAN-Based Integrated Control Strategy for the Drivetrain of Commercial Vehicles Equipped with Automated Manual Transmission

    Publication Year: 2008 , Page(s): 67 - 71
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (258 KB) |  | HTML iconHTML  

    In traditional control strategy for the drivetrain of commercial vehicles equipped with automated manual transmission (AMT), no information exchanges between the transmission control unit (TCU) and the engine control unit (ECU). Such independent operations of these two parts of drivetrain inevitably reduce operational safety as well as starting and shifting performance of vehicles. To overcome the shortcoming of independent operations, an integrated control strategy based on controller area network (CAN) for the drivetrain of vehicles during the starting and shifting processes of AMT was put forward. In this paper, we summarize the communication protocol and characteristics of CAN bus at first, and then define the communication information specification between TCU and ECU, which are classified into instructive and shared information according to their different functionalities. Based on that, a CAN-based integrated control strategy is put forward, which is proven to be practicable through the tests of an AMT prototype vehicle. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delimitation of Traffic Coordinated Control Sub-Area for the Road Network Containing Freeway

    Publication Year: 2008 , Page(s): 72 - 76
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (216 KB) |  | HTML iconHTML  

    A practical approach is presented for determining boundary of urban traffic signal coordinated control sub-area when freeway exists. It is based on the analysis of quantitative measure of interconnection between intersection and freeway ramps. According to these quantitative indexes, those intersection(s) and ramp(s) that relate with each other closely should be delimited in the same sub-area and be coordinately controlled. The proposed approach lays a foundation for research on coordinated control of freeway ramps and adjacent intersections which is an essential element in improving efficiency and mitigating congestion of freeway network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-Path Access Control Scheme in Core Packet Network

    Publication Year: 2008 , Page(s): 77 - 82
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (185 KB) |  | HTML iconHTML  

    The current best-effort Internet is adverse to deliver real media information since it is provided with an uncertain delay property in the traditional routing, flow control and retransmission. The research on the access control mechanism is more significant along with the development of the media applications. In this paper, a multi-path access control scheme on cost in core packet network is proposed to make it highly scalable and robust. In which, the scheduling and routing model in core network is presented, and the link cost of core network is calculated, then the optimized route is selected in term of the minimum cost. Simulation results show that the cost provided by this access control scheme would be nearly accordant with the performance of services in the network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Optimization Based on Dynamic Bandwidth Allocation for Networked Motion Control Systems

    Publication Year: 2008 , Page(s): 83 - 87
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (240 KB)  

    Limited network bandwidth and static bandwidth allocation method are the key factors to affect the performance of network motion control systems. To solve inefficiency of traditional static scheduling strategy, a dynamic bandwidth allocation method based on current QoC is proposed. Implementation algorithm and step of the dynamic bandwidth allocation are presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.