2010 First International Conference on Pervasive Computing, Signal Processing and Applications

17-19 Sept. 2010

Filter Results

Displaying Results 1 - 25 of 327
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1422 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - xxvii
    Request permission for commercial reuse | PDF file iconPDF (200 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2010, Page(s): xxviii
    Request permission for commercial reuse | PDF file iconPDF (137 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s): xxix
    Request permission for commercial reuse | PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2010, Page(s):xxx - xxxi
    Request permission for commercial reuse | PDF file iconPDF (149 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2010, Page(s): xxxii
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Thin Bed Prediction Processing Technique Based on Generalized S Transform

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (567 KB) | HTML iconHTML

    S transform has the characteristic of short Fourier transform and wavelet transform, but the basic wavelet in S transform is invariable and it isn't the same with seismic data absolutely. So a generalized S transform is discussed in the paper and used to predict thin bed. Simulation experiments and processing results of real data reveal that generalized S transform is feasible and effective to pre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimation and Registration of Relative System Biases in Fire-Control Radar Network

    Publication Year: 2010, Page(s):5 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    Fire-control radar network uses data fusion to form more accurate estimate of a target track, the prerequisite of normal data fusion is the system bias registration. In fire-control radar network, due to the existence of the approximating bias of coordinate conversion model and time synchronization bias, data fusion process brings the immitted system biases besides inherent system biases. This pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of Pervasive Computing System Support Theory

    Publication Year: 2010, Page(s):9 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (411 KB) | HTML iconHTML

    Based on the research of Pervasive Computing connotation, development and theoretical system architecture, this Paper advanced the support theory of Pervasive Computing system for the first time and analyzed the key technology of the Pervasive Computing system support theory. This paper orients the development of the Pervasive Computing system support theory, and it is very important for the resea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Denoising Based on Curvelet Transform and Continuous Threshold

    Publication Year: 2010, Page(s):13 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (798 KB) | HTML iconHTML

    Curvelet transform is more suitable than wavelet transform for planar image processing. The theory of curvelet transform is introduced. Noise-image is carried on decomposition based on curvelet transform, and distribution characteristics of noise are analyzed. Applying a quantization method of using threshold of which the function is continuous and differentiable is proposed, to remedy disadvantag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamical Approach for Spectral Estimation under Reverberation

    Publication Year: 2010, Page(s):17 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (928 KB) | HTML iconHTML

    The problem of spectral estimation in reverberation noise is considered in this paper. Since the reverberation is inherently deterministic, a new complexity measure called the phase space volume (PSV) is introduced for estimation instead of using the conventional probabilistic measures. We show that the unknown spectral of a signal embedded in reverberation noise can be obtained by minimizing the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on the Corrosion and Anodic Oxidation of Carbide Thin Films

    Publication Year: 2010, Page(s):21 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    We discuss a result of corrosion and Anodic Oxidation occurring on anode of silicon carbide electrodes in this paper. Electrode behavior are investigated to produce a evaluation of oxidation. In the final we discussed the effects of film stress that produced by anodic oxidation, and suggestions to prevent corrosion are also be presented here. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Order Tracking of Speed-Up Signals for Gearbox Based on TMS320C5402

    Publication Year: 2010, Page(s):25 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    In the analysis of the non-stationary vibration signals during speed-up and speed-down, the real state can not be reflected by the traditional spectral analysis because of the "frequency smear" phenomenon; At the same time, the conventional method of acquiring the rotating speed has the problem of the interpolatation errors and influence the effect of order analysis. To solve the above problems, c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Logistics Management System Design under Pervasive Computing Environment

    Publication Year: 2010, Page(s):29 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    Pervasive computing as the third mode of computing is being applied in all aspects of life. The paper has given out a new design of logistic by using products and theory of pervasive. Design of modern logistics management system, under using of pervasive computing environment, will make Logistics industry achieve greater efficiency and more relaxed management environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Optical Air Chamber of Infrared Gas Sensor

    Publication Year: 2010, Page(s):33 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (559 KB) | HTML iconHTML

    In this paper, design method of optical air chamber for infrared gas sensor is described in detail based on the principle of infrared absorption by gas molecule. IRL715 infrared light source and PYS3228 pyroelectric detector with double filters are adopted to detect signal. The optical air chamber is processed with waterproof and dustproof treatment. Effect analysis for sensor performance of two d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Methods of Smart Structural Dynamic Response Analysis of SINS

    Publication Year: 2010, Page(s):37 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    In order to solve the SINS active vibration control, propose a kind of flexible plate used in SINS of intelligent structure matrix of active vibration control method. This method in establishing flexible sheet on the basis of dynamic model, value-based modal analysis of force to extract the necessary space model reduction mode, based on modal force of piezoelectric element determination criterion ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Robust Joint Space Tracking Method Based on Particle Filter

    Publication Year: 2010, Page(s):41 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1348 KB) | HTML iconHTML

    We propose a novel object tracking algorithm based on modeling the target appearance in a joint space. In contrast with traditional histogram-based trackers which discard all spatial information, the joint space takes both the photometric and spatial information into account. Within this joint space, the target is modeled in a Gaussian mixtures manner where a richer description of the target is ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Provably Secure Certificateless Authenticated Key Agreement Protocol in the Standard Model

    Publication Year: 2010, Page(s):45 - 48
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (434 KB) | HTML iconHTML

    Inspired by the certificateless public key encryption scheme proposed by Jong et al, we present a new certificateless authenticated key agreement protocol (CLAK). It is provably secure in the standard model. CLAK protocol provides perfect forward secrecy. Compared with a certificateless authenticated key agreement protocol which is only provable secure in the random oracle model, the new protocol ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comprehensive Approach of SA Based Software Deployment Reliability Estimation in Neural Networks

    Publication Year: 2010, Page(s):49 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    Software architecture (SA) has been widely advocated as an effective abstraction for modeling, implementing, and evolving complex software systems such as those in distributed, decentralized, heterogeneous and pervasive environments. We intend to investigate two problems related to the domain of those environments: software deployment and reliability. Though many approaches for Architecture-based ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Spam Traffic Characterizatione Mechanism

    Publication Year: 2010, Page(s):54 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (367 KB) | HTML iconHTML

    In this paper, we propose a new method to characterize unwanted email traffic. In order to survey a significant, diverse, and representative set of Internet email traffic, we use an extended deterministic finite automata (EFSA) model to express email session and then choose some parameters to capture email traffic characterization. We apply our mechanism to two different volumes of email traffic d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Implement of UBL in the E-Business

    Publication Year: 2010, Page(s):58 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    This paper introduces the evolution of the Universal Business Language (UBL), an OASIS standard to encode and customize business documents. This paper shows UBL's peculiarities and shows how UBL document works through two document examples. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Universal Generic Object Design

    Publication Year: 2010, Page(s):62 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB) | HTML iconHTML

    Generic object design is a descendant of other programming methods, which concentrate on objects, using objects as the core element in solving problems. Given a generic sense on object, generic object design can be a thinking method, a designing method, or a basic implementation method. We can get a universal and flexible designing process across many fields, not only within software programming. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.