By Topic

Information Networking and Automation (ICINA), 2010 International Conference on

Date 18-19 Oct. 2010

Go

Filter Results

Displaying Results 1 - 25 of 119
  • [Front and back cover]

    Page(s): c1 - c4
    Save to Project icon | Request Permissions | PDF file iconPDF (765 KB)  
    Freely Available from IEEE
  • [Title page]

    Page(s): i - xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (254 KB)  
    Freely Available from IEEE
  • Information fusion of integrated navigation based on self-adaptive filter

    Page(s): V2-1 - V2-5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (838 KB) |  | HTML iconHTML  

    In order to realize high accuracy and excellent reliability of navigation system, information fusion technology of integrated navigation based on self-adaptive filter is researched in this paper. Inertial navigation system (INS), global navigation satellite system (GNSS), synthetic aperture radar (SAR) and barometric altimeter (BA) are taken to construct INS/GNSS/SAR/BA integrated navigation system. INS is regarded as the primary navigation equipment, and other systems are aided navigation equipments. Firstly, errors of INS, GNSS, SAR and BA are modeled and chosen as system states of integrated navigation. Based on self-adaptive filter algorithm, output information of INS and GNSS are fused in INS/GNSS integrated navigation filter, and output information of INS, SAR and BA are fused in INS/SAR/BA integrated navigation filter. Then the federated filter frame is designed, and estimations of system states from INS/GNSS and INS/SAR/BA local filters are fused once more in the master filter independently. Consequently global optimal estimations of system states are given by the master filter, which are used to correct errors of INS. Simulation results show that, position accuracy of INS/GNSS/SAR/BA integrated navigation reaches ± 11.6m, attitude accuracy reaches ±0.52′, velocity accuracy reaches ± 0.14m/s, and its reliability is very excellent when noise statistics characteristics of some navigation equipment are variational in the navigation process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web user clustering analysis based on KMeans algorithm

    Page(s): V2-6 - V2-9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (374 KB) |  | HTML iconHTML  

    As one of the most important tasks of Web Usage Mining (WUM), web user clustering, which establishes groups of users exhibiting similar browsing patterns, provides useful knowledge to personalized web services. In this paper, we cluster web users with KMeans algorithm based on web user log data. Given a set of web users and their associated historical web usage data, we study their behavior characteristic and cluster them. Experiment results show the feasibility and efficiency of such algorithm application. Web user clusters generated in this way can provide novel and useful knowledge for various personalized web applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Removal of attitude errors based on multi-target multi-sensor environment in earth-centered earth-fixed coordinates

    Page(s): V2-10 - V2-14
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (704 KB) |  | HTML iconHTML  

    This paper describes a sensor registration methodology to estimate attitude biases in a multi-target multi-sensor environment. First, the available pairwise sensor alignment algorithm in Earth-Centered Earth-Fixed (ECEF) coordinates is introduced. However, for the multi-target multi-sensor environment, this method will result in non-unique alignment solutions, which is undesirable for many applications. Thus, we used expanded-dimension idea to establish a multi-target multi-sensor model for eliminating attitude errors. Simulation results reveal that this algorithm can reduce the convergence time and improve the precision of alignment solution compared to pairwise sensor registration methodology. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Peers' attribute data prediction in a p2p network based on the Grey Prediction Model and its improvements

    Page(s): V2-15 - V2-19
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (798 KB) |  | HTML iconHTML  

    A Prediction Model and two improved models are proposed and analyzed in this paper, aiming to solving the task of peers' attribute data prediction in a p2p network. The simulation results demonstrate that the Basic Grey Prediction Model performs well under the condition that the accumulation of Raw Data Series complies with the positive or negative growth of an exponential function. When this condition cannot be satisfied, the Residual Error Improvement Model can significantly increase the accuracy of the prediction. Additionally, the Grey Prediction Model with New Dynamic Information of Equal Dimension is suitable when the long term prediction is concerned. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of three-phase inverter based on SPWM

    Page(s): V2-20 - V2-23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (821 KB) |  | HTML iconHTML  

    Wind energy resource is green energy of non-polluting and makes a least impact on the environment among kinds of energy. Therefore, in order to promote economic and social development and ease the conventional energy resources limited and the problem of environmental pollution, wind energy and other renewable resources have be paid attention to in various countries. In this paper the structure of the PWM inverter are analyzed and overall design scheme of three-phase inverter is designed, then the stability of the inverter controller closed-loop control system is described. The paper also presents the parameters of the experimental system design and implementation of software flowchart of thought of the control. In addition laboratory systems are made and the experiment is carried out. The results of the experiment have verified the correctness of the analysis and design. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of AES algorithm in digital cinema projection system based on DaVinci technology

    Page(s): V2-24 - V2-27
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1605 KB) |  | HTML iconHTML  

    To solve the security issues of digital cinema projection equipments, and avoid video data to be illegal theft or malicious tampering, this paper proposes a new type of design for encrypting digital movies using advanced symmetric encryption algorithm - AES128 with TMS320DM6446 and DaVinci technology. The project takes full advantage of the characteristics of high efficiency and programming flexibility of DaVinci processor, through allocating internal and external resources of the processor chip rationally, and using the DMA, it only needs a small overhead to make digital movies protected. Meanwhile, for the strategies of different applications, this paper also gives encryption methods of different security levels. The test results show digital movies encrypted by AES128 can not play normally, which ensures the security of digital movies. The technology and methods adopted in the system are practical and worthy of using abroad. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contention-based congestion control in wireless ad hoc networks

    Page(s): V2-28 - V2-32
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (507 KB) |  | HTML iconHTML  

    The performance of traditional TCP congestion control protocol degrades when congestion and contention increase in ad hoc networks that use the IEEE 802.11 DCF. Many of the problems result from medium contention at the media access control (MAC) layer. In this paper, we present a new contention-based congestion control (CBCC) method according to a novel congestion information from MAC layer. This proposal aims to avoid the congestion nodes and guarantee better performance in terms of delay, packet delivery ratio, and throughput. By monitoring the number of one node entry the backoff algorithm, our CBCC scheme can calculate the congestion metric called backoff state ratio, a more accurate metric to characterize the network congestion status. Node uses this indication to determine whether to drop a packet or not. Simulation results show that the algorithm can greatly increase the network throughput and effectively control the network congestion at the MAC layer. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new method of image enhancement under impulsive noise based on adaptive filtering

    Page(s): V2-33 - V2-36
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (544 KB) |  | HTML iconHTML  

    This paper presents a new adaptive filtering algorithm for image enhancement basing on several image enhancement algorithms, under α stable impulsive noise. The algorithm defines a new fractional lower order moment to adjust the weight of adaptive filter. It has a better robustness to impulsive noise. Simulation results show that the new algorithm is more effective to restrain spike noise under proper parameter compared with traditional algorithm based on a stable impulsive noise. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Controlling a one degree of freedom arm, using fuzzy controller

    Page(s): V2-37 - V2-41
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1548 KB) |  | HTML iconHTML  

    Nowadays, Quadrotor helicopters are becoming very popular platform for unmanned aerial vehicle (UAV) research, due to their capability of hovering, vertical takeoff and landing (VTOL) and simplicity of their design and maintenance. To date, the control of most Quadrotor aerial robots have been based on their dynamical models, but in this research it's been tried to control the vehicle without any model. In this paper, a fuzzy controller will be designed to regulate the attitude of one degree of freedom (DOF) arm, and then in our future efforts we will try to control a large Quadrotor with the help of four controllers, based on aforementioned method. At the end of this paper, the experimental result for controlling the attitude of one degree of freedom arm will be presented and the advantages of this type of controller will be discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A constant acceleration local-world model for complex networks

    Page(s): V2-42 - V2-44
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (356 KB) |  | HTML iconHTML  

    In many real-world networks, the rates of node and link addition are time dependent. The nodes in a community within a network are much more connected to each other than to the others outside the community in the same network. A constant acceleration local-world model has been proposed to capture and describe the essential topological properties of real networks. A mean-field method has been used to calculate analytically the connectivity distribution and the scaling exponents. By contrast, we apply a master-equation approach to such network development. At last, the constant acceleration local-world model is applied to characterize the Internet against BA model, demonstrating the superiority of the new model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A weighted cooperative spectrum sensing in cognitive radio networks

    Page(s): V2-45 - V2-48
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (918 KB) |  | HTML iconHTML  

    In cognitive radio networks (CRNs), different received signal-to-noise ratios (SNRs) of secondary users (SUs) lead to different reliability of their local spectrum sensing decisions, and then greatly affect sensing capability of cooperative spectrum sensing. Cooperative spectrum sensing with traditional hard decisions can not improve sensing capability efficiently due to allocating the same weight to SUs' decisions. Therefore, a weighted cooperative spectrum sensing (WCSS) is proposed for CRNs to improve sensing capability. It obtains weights of SUs' decisions from their average received SNRs, integrates both their independent decisions and weights to fuse data, and makes a final sensing decision. Simulation results show that compared to cooperative spectrum sensing with traditional hard decisions, WCSS performs better at low SNR. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gateway system for CAN and FlexRay in automotive ECU networks

    Page(s): V2-49 - V2-53
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (934 KB) |  | HTML iconHTML  

    Automotive gateway system is necessary because several communication protocols is used and need to communicate between other. CAN bus is one of the most popular buses, and FlexRay has the unique advantages of high speed, large bandwidth and reliability. In this paper, a gateway for CAN and FlexRay in automotive has been proposed. The gateway can convert data between CAN and FlexRay protocols that minimize the differences frame format, communication paradigm and speed, through using Gateway Global Algorithm. In addition, the gateway system can return conversion result that presents on PC with USBCAN. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maneuvering object tracking under large-area occlusive condition using mean shift embedded IMM filter

    Page(s): V2-54 - V2-58
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (958 KB) |  | HTML iconHTML  

    Visual tracking is the act of consistently locating a desired feature in each image of a given input sequence and it is typically complicated by several factors such as noise of sensors, motion in the scene, motion on the part of the observer and real-time constraints. In this paper, a novel visual tracking approach is proposed by jointly using mean shift and IMM, which can effectively deal with the visual tracking problem. The proposed approach can also resolve the target large-area occlusions. Based on the experimental results provided, it can be concluded that our proposed approach is rational and effective. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The research on image mosaics for intelligent video surveillance

    Page(s): V2-59 - V2-62
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (852 KB) |  | HTML iconHTML  

    This paper concerns the problem of the wide filed-of-view on intelligent video surveillance system and presents an image mosaics solution based on scale invariant feature transform (SIFT) algorithm to get the wider view. Image mosaics contain mainly two parts: image registration and image fusion. The SIFT algorithm is improved to meet the requirements of the intelligent video surveillance system, and the SIFT feature points are extracted efficiently for image registration in this paper. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fire control system with SVF method

    Page(s): V2-63 - V2-66
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (933 KB) |  | HTML iconHTML  

    Afire control system with space virtual feedback (SVF) is presented. The whole tracking systems is close-looped by the space virtual feedback line which is the line of sight (LOS). But the parts in the system, such as tracking subsystem and servo subsystem, run in the state of open-loop. Because the SVF tracking method is used in the system, the corrector can be removed in this system architecture. So the tracking performances of the whole system are improved well. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An advanced entropy-based DDOS detection scheme

    Page(s): V2-67 - V2-71
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (864 KB) |  | HTML iconHTML  

    Prior work has shown entropy-based DDOS detection is suitable for detecting low-rate DOS. A key challenge in this approach is to determine the most suitable threshold for detecting DDOS attacks accurately. To address this challenge, we propose an advanced entropy-based (AEB) scheme, which divides variable rate DDOS attacks into different fields and treats each field with different methods. Compared with prior entropy-based approaches, our scheme has significant better performance on distinguishing waves of legal traffic and flash crowds from low-rate DOS. We validate the effectiveness of our scheme by conducting extensive simulation in NS-2. Both theoretical analysis and experimental results show that our scheme can efficiently detect DDOS attacks with high accuracy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An economical design of an AUV for navigation and Ocean Floor Research

    Page(s): V2-72 - V2-75
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1071 KB) |  | HTML iconHTML  

    In this paper we propose a design of an Autonomous Underwater Vehicle that can perform some primary functions and can be of great relevance to numerous underwater predicaments for the researchers. We are focussing on fields like Vehicle Hydrodynamics, Underwater Propulsion, Underwater Sensing, Mechanical Systems, Underwater Acoustics and Power Systems. Formulating our design on all the above characteristics we wish to focus on divisions of Defence and Ocean floor Research. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Domain based routing algorithm for DTN (The single copy case)

    Page(s): V2-76 - V2-79
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (339 KB) |  | HTML iconHTML  

    In order to improve delivery ratio and reduce average delay and network cost in Delay and disruption Tolerant Network (DTN), This paper puts forward a domain based single copy routing algorithm (DBR) for BirdNet, which is a special DTN based on mobile sensor nodes installed on birds with GPS function enabled. In this algorithm, the GPS position information from the bird is used, to assign the mobile node to domains, to calculate delivery predictability, so that the invalid and duplicate data transmission will be less. By preceding measures, this algorithm can reduce the transmission delay as well as improve delivery ratio. Furthermore, the way of assign nodes to domain significantly reduces the routing protocol packets between nodes, which decreases the energy consumption, and extends the lifetime of nodes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New rotor structure mitigating vibration and noise in switched reluctance motor

    Page(s): V2-80 - V2-84
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1484 KB) |  | HTML iconHTML  

    Vibration and noise are the fetters which restrict the development of switched reluctance motor drive; this paper presented a new rotor structure which mitigates motor's vibration and noise effectively. Based on the permeability theory, set holes on the rotor without filling materials in order to reduce the magnetic flux at the aligned position, further more, reduce the radial force amplitude from the motor's noise origin. Also, finite element software is employed to analysis motor's performance under different controlling modes including single phase excited mode, double phase excited mode. Parametric simulations are carried out to analysis how the key structure parameters influence the motor's output performance. The simulation results form the basis of new structure optimization. And, a prototype 8/6 switched reluctance motor is tested, and the obtained test results show that motor with this kind of rotor structure keeps the output capability while has a less acoustic noise and vibration. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of water resources and environment management information system based on ArcIMS

    Page(s): V2-85 - V2-88
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (824 KB) |  | HTML iconHTML  

    This paper present a water resource and environment management information system based on GIS technology. The system select ArcIMS product as service platform, then use the EJB technology to encapsulate the map realization. The paper describes the key technology in the development of system, including the architecture of system, the class to encapsulate the map realization and the function of the system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predictive power and rate control for mobile wireless networks with time-varying delay

    Page(s): V2-89 - V2-93
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (370 KB) |  | HTML iconHTML  

    Power and rate control is an important requirement for code-division multiple access (CDMA) mobile wireless networks. However, almost all existing control algorithms assume that the time delay is known and fixed. This paper investigates power and rate control of CDMA mobile wireless networks with unknown and time varying transmission delay in communication channels. To compensate for the time-varying delay, a novel predictive power and rate control algorithm is presented based on time delay estimation. Simulation results are given to demonstrate the effectiveness of the proposed algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on inverting control of PV grid-connected LED street lighting system

    Page(s): V2-94 - V2-96
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (640 KB) |  | HTML iconHTML  

    The lighting system consisting of LED street light system, power grid, photovoltaic (PV) arrays and inverting control system of grid-connected PV was investigated. The excess power generated from PV can be transported into power grid through an inverter which changes direct current (DC) into alternating current (AC) using current hysteresis control. PLC controls when to light LED and whether the battery or power grid gives power to LED according to a preset program. The simulation results show that PLC and the inverter control is an effective and simple method to realize these functions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on metadata extraction of traffic security information

    Page(s): V2-97 - V2-99
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (141 KB) |  | HTML iconHTML  

    If we full and effective use of the Web on the distribution of a large number of traffic security information, and then it can provide people with integrated safety professional, personalized information services. In order to quickly retrieve traffic security information resources, description method for the metadata of traffic security information resources is proposed combined with the Dublin Core Metadata. Meanwhile, we design meta database of large-scale traffic security information and study metadata extraction. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.