By Topic

2010 International Conference on Information, Networking and Automation (ICINA)

18-19 Oct. 2010

Go

Filter Results

Displaying Results 1 - 25 of 119
  • [Front and back cover]

    Publication Year: 2010, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (765 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2010, Page(s):i - xvi
    Request permission for commercial reuse | PDF file iconPDF (254 KB)
    Freely Available from IEEE
  • Information fusion of integrated navigation based on self-adaptive filter

    Publication Year: 2010, Page(s):V2-1 - V2-5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (838 KB) | HTML iconHTML

    In order to realize high accuracy and excellent reliability of navigation system, information fusion technology of integrated navigation based on self-adaptive filter is researched in this paper. Inertial navigation system (INS), global navigation satellite system (GNSS), synthetic aperture radar (SAR) and barometric altimeter (BA) are taken to construct INS/GNSS/SAR/BA integrated navigation syste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web user clustering analysis based on KMeans algorithm

    Publication Year: 2010, Page(s):V2-6 - V2-9
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (374 KB) | HTML iconHTML

    As one of the most important tasks of Web Usage Mining (WUM), web user clustering, which establishes groups of users exhibiting similar browsing patterns, provides useful knowledge to personalized web services. In this paper, we cluster web users with KMeans algorithm based on web user log data. Given a set of web users and their associated historical web usage data, we study their behavior charac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Removal of attitude errors based on multi-target multi-sensor environment in earth-centered earth-fixed coordinates

    Publication Year: 2010, Page(s):V2-10 - V2-14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB) | HTML iconHTML

    This paper describes a sensor registration methodology to estimate attitude biases in a multi-target multi-sensor environment. First, the available pairwise sensor alignment algorithm in Earth-Centered Earth-Fixed (ECEF) coordinates is introduced. However, for the multi-target multi-sensor environment, this method will result in non-unique alignment solutions, which is undesirable for many applica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Peers' attribute data prediction in a p2p network based on the Grey Prediction Model and its improvements

    Publication Year: 2010, Page(s):V2-15 - V2-19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (798 KB) | HTML iconHTML

    A Prediction Model and two improved models are proposed and analyzed in this paper, aiming to solving the task of peers' attribute data prediction in a p2p network. The simulation results demonstrate that the Basic Grey Prediction Model performs well under the condition that the accumulation of Raw Data Series complies with the positive or negative growth of an exponential function. When this cond... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of three-phase inverter based on SPWM

    Publication Year: 2010, Page(s):V2-20 - V2-23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (821 KB) | HTML iconHTML

    Wind energy resource is green energy of non-polluting and makes a least impact on the environment among kinds of energy. Therefore, in order to promote economic and social development and ease the conventional energy resources limited and the problem of environmental pollution, wind energy and other renewable resources have be paid attention to in various countries. In this paper the structure of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of AES algorithm in digital cinema projection system based on DaVinci technology

    Publication Year: 2010, Page(s):V2-24 - V2-27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1605 KB) | HTML iconHTML

    To solve the security issues of digital cinema projection equipments, and avoid video data to be illegal theft or malicious tampering, this paper proposes a new type of design for encrypting digital movies using advanced symmetric encryption algorithm - AES128 with TMS320DM6446 and DaVinci technology. The project takes full advantage of the characteristics of high efficiency and programming flexib... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contention-based congestion control in wireless ad hoc networks

    Publication Year: 2010, Page(s):V2-28 - V2-32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (507 KB) | HTML iconHTML

    The performance of traditional TCP congestion control protocol degrades when congestion and contention increase in ad hoc networks that use the IEEE 802.11 DCF. Many of the problems result from medium contention at the media access control (MAC) layer. In this paper, we present a new contention-based congestion control (CBCC) method according to a novel congestion information from MAC layer. This ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new method of image enhancement under impulsive noise based on adaptive filtering

    Publication Year: 2010, Page(s):V2-33 - V2-36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    This paper presents a new adaptive filtering algorithm for image enhancement basing on several image enhancement algorithms, under α stable impulsive noise. The algorithm defines a new fractional lower order moment to adjust the weight of adaptive filter. It has a better robustness to impulsive noise. Simulation results show that the new algorithm is more effective to restrain spike noise u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Controlling a one degree of freedom arm, using fuzzy controller

    Publication Year: 2010, Page(s):V2-37 - V2-41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1548 KB) | HTML iconHTML

    Nowadays, Quadrotor helicopters are becoming very popular platform for unmanned aerial vehicle (UAV) research, due to their capability of hovering, vertical takeoff and landing (VTOL) and simplicity of their design and maintenance. To date, the control of most Quadrotor aerial robots have been based on their dynamical models, but in this research it's been tried to control the vehicle without any ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A constant acceleration local-world model for complex networks

    Publication Year: 2010, Page(s):V2-42 - V2-44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB) | HTML iconHTML

    In many real-world networks, the rates of node and link addition are time dependent. The nodes in a community within a network are much more connected to each other than to the others outside the community in the same network. A constant acceleration local-world model has been proposed to capture and describe the essential topological properties of real networks. A mean-field method has been used ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A weighted cooperative spectrum sensing in cognitive radio networks

    Publication Year: 2010, Page(s):V2-45 - V2-48
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (918 KB) | HTML iconHTML

    In cognitive radio networks (CRNs), different received signal-to-noise ratios (SNRs) of secondary users (SUs) lead to different reliability of their local spectrum sensing decisions, and then greatly affect sensing capability of cooperative spectrum sensing. Cooperative spectrum sensing with traditional hard decisions can not improve sensing capability efficiently due to allocating the same weight... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gateway system for CAN and FlexRay in automotive ECU networks

    Publication Year: 2010, Page(s):V2-49 - V2-53
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (934 KB) | HTML iconHTML

    Automotive gateway system is necessary because several communication protocols is used and need to communicate between other. CAN bus is one of the most popular buses, and FlexRay has the unique advantages of high speed, large bandwidth and reliability. In this paper, a gateway for CAN and FlexRay in automotive has been proposed. The gateway can convert data between CAN and FlexRay protocols that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maneuvering object tracking under large-area occlusive condition using mean shift embedded IMM filter

    Publication Year: 2010, Page(s):V2-54 - V2-58
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (958 KB) | HTML iconHTML

    Visual tracking is the act of consistently locating a desired feature in each image of a given input sequence and it is typically complicated by several factors such as noise of sensors, motion in the scene, motion on the part of the observer and real-time constraints. In this paper, a novel visual tracking approach is proposed by jointly using mean shift and IMM, which can effectively deal with t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The research on image mosaics for intelligent video surveillance

    Publication Year: 2010, Page(s):V2-59 - V2-62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (852 KB) | HTML iconHTML

    This paper concerns the problem of the wide filed-of-view on intelligent video surveillance system and presents an image mosaics solution based on scale invariant feature transform (SIFT) algorithm to get the wider view. Image mosaics contain mainly two parts: image registration and image fusion. The SIFT algorithm is improved to meet the requirements of the intelligent video surveillance system, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fire control system with SVF method

    Publication Year: 2010, Page(s):V2-63 - V2-66
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (933 KB) | HTML iconHTML

    Afire control system with space virtual feedback (SVF) is presented. The whole tracking systems is close-looped by the space virtual feedback line which is the line of sight (LOS). But the parts in the system, such as tracking subsystem and servo subsystem, run in the state of open-loop. Because the SVF tracking method is used in the system, the corrector can be removed in this system architecture... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An advanced entropy-based DDOS detection scheme

    Publication Year: 2010, Page(s):V2-67 - V2-71
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB) | HTML iconHTML

    Prior work has shown entropy-based DDOS detection is suitable for detecting low-rate DOS. A key challenge in this approach is to determine the most suitable threshold for detecting DDOS attacks accurately. To address this challenge, we propose an advanced entropy-based (AEB) scheme, which divides variable rate DDOS attacks into different fields and treats each field with different methods. Compare... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An economical design of an AUV for navigation and Ocean Floor Research

    Publication Year: 2010, Page(s):V2-72 - V2-75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1071 KB) | HTML iconHTML

    In this paper we propose a design of an Autonomous Underwater Vehicle that can perform some primary functions and can be of great relevance to numerous underwater predicaments for the researchers. We are focussing on fields like Vehicle Hydrodynamics, Underwater Propulsion, Underwater Sensing, Mechanical Systems, Underwater Acoustics and Power Systems. Formulating our design on all the above chara... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Domain based routing algorithm for DTN (The single copy case)

    Publication Year: 2010, Page(s):V2-76 - V2-79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    In order to improve delivery ratio and reduce average delay and network cost in Delay and disruption Tolerant Network (DTN), This paper puts forward a domain based single copy routing algorithm (DBR) for BirdNet, which is a special DTN based on mobile sensor nodes installed on birds with GPS function enabled. In this algorithm, the GPS position information from the bird is used, to assign the mobi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New rotor structure mitigating vibration and noise in switched reluctance motor

    Publication Year: 2010, Page(s):V2-80 - V2-84
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1484 KB) | HTML iconHTML

    Vibration and noise are the fetters which restrict the development of switched reluctance motor drive; this paper presented a new rotor structure which mitigates motor's vibration and noise effectively. Based on the permeability theory, set holes on the rotor without filling materials in order to reduce the magnetic flux at the aligned position, further more, reduce the radial force amplitude from... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of water resources and environment management information system based on ArcIMS

    Publication Year: 2010, Page(s):V2-85 - V2-88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (824 KB) | HTML iconHTML

    This paper present a water resource and environment management information system based on GIS technology. The system select ArcIMS product as service platform, then use the EJB technology to encapsulate the map realization. The paper describes the key technology in the development of system, including the architecture of system, the class to encapsulate the map realization and the function of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predictive power and rate control for mobile wireless networks with time-varying delay

    Publication Year: 2010, Page(s):V2-89 - V2-93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    Power and rate control is an important requirement for code-division multiple access (CDMA) mobile wireless networks. However, almost all existing control algorithms assume that the time delay is known and fixed. This paper investigates power and rate control of CDMA mobile wireless networks with unknown and time varying transmission delay in communication channels. To compensate for the time-vary... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on inverting control of PV grid-connected LED street lighting system

    Publication Year: 2010, Page(s):V2-94 - V2-96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB) | HTML iconHTML

    The lighting system consisting of LED street light system, power grid, photovoltaic (PV) arrays and inverting control system of grid-connected PV was investigated. The excess power generated from PV can be transported into power grid through an inverter which changes direct current (DC) into alternating current (AC) using current hysteresis control. PLC controls when to light LED and whether the b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on metadata extraction of traffic security information

    Publication Year: 2010, Page(s):V2-97 - V2-99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (141 KB) | HTML iconHTML

    If we full and effective use of the Web on the distribution of a large number of traffic security information, and then it can provide people with integrated safety professional, personalized information services. In order to quickly retrieve traffic security information resources, description method for the metadata of traffic security information resources is proposed combined with the Dublin Co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.