By Topic

Power Electronics and Intelligent Transportation System, 2008. PEITS '08. Workshop on

Date 2-3 Aug. 2008

Filter Results

Displaying Results 1 - 25 of 136
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (198 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (15 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (47 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - xiii
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • Message from the Workshop Chair

    Publication Year: 2008, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (102 KB) | HTML iconHTML
    Freely Available from IEEE
  • PEITS 2008 Organizing Committee

    Publication Year: 2008, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • PEITS 2008 Committee Members

    Publication Year: 2008, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • A Cross-Layer Fast Handover Mechanism for IEEE 802.16e Networks with HMIPv6 Mobility

    Publication Year: 2008, Page(s):3 - 7
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    IEEE 802.16e standard is considered to be one of the most promising solutions for next generation broadband wireless networks. Still, handover latency in IEEE 802.16e networks is an important issue that affects real-time applications. In this paper, a cross-layer fast hierarchical handover mechanism (CLFH) for IEEE 802.16e networks is introduced. The handover procedure of IEEE 802.16e is integrate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design of Manufacturing Execution System Based on RFID

    Publication Year: 2008, Page(s):8 - 11
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    From the supply chain, now RFID technology is gradually applied to the core of manufacturing process. By adopting the RFID technology in workshop layer, the exact real-time information that is obtained from RFID, can be seamlessly integrated into the manufacturing execution system. Therefore it can create additional value, and increase productivity for the enterprise. The technical advantages of a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Channel Assignment in Wireless LANs

    Publication Year: 2008, Page(s):12 - 17
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    A traffic-aware and client-aware algorithm for dynamically assigning channels to access points (APs) in wireless local access networks (WLANs) is proposed. Traffic loads and received signal strength (RSS) values are used to characterize interference. The problem of selecting channels to minimize total interference then reduces to the Max k-Cut problem, which we efficiently solve with semidefinite ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing Optimized Video Transmission over Mobile Ad Hoc Networks

    Publication Year: 2008, Page(s):18 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (513 KB) | HTML iconHTML

    In mobile ad hoc networks, the communication node always produces a great deal of routing control packets while performing the route discovery and maintenance, which seriously impacts the real-time video transmission quality. Therefore, we propose a new routing control packets limited forwarding (RCPLF) algorithm that can reduce the routing overhead of on-demand routing protocol. In our algorithm,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High-Frequency Surface-Wave Radar Real Time Frequency Selecting Based on Frequency Randomly Hopping Signal

    Publication Year: 2008, Page(s):23 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    Serious radio interferences are distributed in the operating frequency band of High-frequency surface-wave radar (HFSWR) which makes it difficult to find silent bandwidth especially at night to work, the performance of HFSWR is decreased greatly. Frequency randomly hopping signal which breakthrough the restriction of continual spectrum has become an effective anti-jamming method. Based on the stud... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Highway Incident Detection Method Based on Wireless Positioning Technology

    Publication Year: 2008, Page(s):27 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    An innovative motorist-initiated incident detection method using wireless positioning technology, such as Global Positioning System (GPS) and Cellular Phone Positioning System (CPS) is developed. Then, the basic detection algorithm is presented. The position information and operating characteristics of reporting vehicles are detected using wireless positioning system and is transferred by global s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic ID-Based User Authentication and Key Agreement Scheme for Multi-Server Environment Using Bilinear Pairings

    Publication Year: 2008, Page(s):33 - 37
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (142 KB) | HTML iconHTML

    Remote user authentication is suited to solve the privacy and security problems for the single server architecture environment. With the rapid development of Internet service, more and more network architectures are used in multi-server environments. In this paper, a user authentication scheme for multi-server environment is presented. The proposed scheme is based on bilinear pairings. Moreover, i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Deterministic Packet Marking Scheme for IP Traceback

    Publication Year: 2008, Page(s):38 - 41
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    This paper proposes a novel deterministic packet marking (NDPM) scheme for IP traceback. It mainly marks packets with IP addresses and the number of current autonomous system (AS) through border gateway protocol (BGP) routers. According to the marked information in the packets, victims can not only trace the attack source to the original AS, but also can filter the malicious packets, hence making ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fast Method of Local Network Topology

    Publication Year: 2008, Page(s):42 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    Only few switches in a real-time power system are operated during a short interval between the executions of the network topology algorithm, and switch activities just have local affect on network topology. So a fast local network topology method using optimal search direction is presented in this paper. The proposed method has three main procedures: determining optimal search direction, substatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invulnerability Assessment for Mobile Ad Hoc Networks

    Publication Year: 2008, Page(s):48 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    Usually, a mobile ad hoc network is confronted with four different damages: random failure, mobile attack, energy limit and selective attack. These attacks will not only destroy network topology, but also will make the transferring capacity and bandwidth of network to be influenced. An assessment of mobile ad hoc network invulnerability is proposed based on the characteristic of mobile ad hoc netw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovery of Unknown Visual Information Based on Target Tracking

    Publication Year: 2008, Page(s):52 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (527 KB) | HTML iconHTML

    To discover important but previously unknown information in video sequences, a discovery method of unknown visual information based on target tracking is proposed in this paper. It provides a worthy approach for support decision. The proposed discovery method analyzes the video using target tracking. This method, adopting detection and correspondence of feature points, target identification and tr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Email Virus Propagation Model

    Publication Year: 2008, Page(s):56 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    in this paper, two new parameters, user vigilance and removing time, are incorporated into the classical email virus propagation model SEIR. New model extended the classical virus propagation model SEIR. The experimental results showed that these parameters greatly influence the virus propagation. Meanwhile, the simulations demonstrate that improved model can be used for calculating the costs of v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheme of Electronic Seal Based on Public Key Infrastructure

    Publication Year: 2008, Page(s):61 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    This paper improves the general electronic seal scheme based on PKI platform. The original scheme has low efficiency and complicated process when seal's authenticity is verified. In this new scheme, before the seal is used for the time a random code will be created by CA. The random code and the electronic seal image will be printed together. User can easily complete the seal security anti-counter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CAN-Based Integrated Control Strategy for the Drivetrain of Commercial Vehicles Equipped with Automated Manual Transmission

    Publication Year: 2008, Page(s):67 - 71
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    In traditional control strategy for the drivetrain of commercial vehicles equipped with automated manual transmission (AMT), no information exchanges between the transmission control unit (TCU) and the engine control unit (ECU). Such independent operations of these two parts of drivetrain inevitably reduce operational safety as well as starting and shifting performance of vehicles. To overcome the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delimitation of Traffic Coordinated Control Sub-Area for the Road Network Containing Freeway

    Publication Year: 2008, Page(s):72 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    A practical approach is presented for determining boundary of urban traffic signal coordinated control sub-area when freeway exists. It is based on the analysis of quantitative measure of interconnection between intersection and freeway ramps. According to these quantitative indexes, those intersection(s) and ramp(s) that relate with each other closely should be delimited in the same sub-area and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-Path Access Control Scheme in Core Packet Network

    Publication Year: 2008, Page(s):77 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    The current best-effort Internet is adverse to deliver real media information since it is provided with an uncertain delay property in the traditional routing, flow control and retransmission. The research on the access control mechanism is more significant along with the development of the media applications. In this paper, a multi-path access control scheme on cost in core packet network is prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Optimization Based on Dynamic Bandwidth Allocation for Networked Motion Control Systems

    Publication Year: 2008, Page(s):83 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Limited network bandwidth and static bandwidth allocation method are the key factors to affect the performance of network motion control systems. To solve inefficiency of traditional static scheduling strategy, a dynamic bandwidth allocation method based on current QoC is proposed. Implementation algorithm and step of the dynamic bandwidth allocation are presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.