By Topic

Pervasive Computing Signal Processing and Applications (PCSPA), 2010 First International Conference on

Date 17-19 Sept. 2010

Filter Results

Displaying Results 1 - 25 of 327
  • [Front cover]

    Publication Year: 2010 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (1422 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (62 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (110 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (119 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010 , Page(s): v - xxvii
    Save to Project icon | Request Permissions | PDF file iconPDF (200 KB)  
    Freely Available from IEEE
  • Preface

    Publication Year: 2010 , Page(s): xxviii
    Save to Project icon | Request Permissions | PDF file iconPDF (137 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010 , Page(s): xxix
    Save to Project icon | Request Permissions | PDF file iconPDF (154 KB)  
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2010 , Page(s): xxx - xxxi
    Save to Project icon | Request Permissions | PDF file iconPDF (149 KB)  
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2010 , Page(s): xxxii
    Save to Project icon | Request Permissions | PDF file iconPDF (118 KB)  
    Freely Available from IEEE
  • Thin Bed Prediction Processing Technique Based on Generalized S Transform

    Publication Year: 2010 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (567 KB) |  | HTML iconHTML  

    S transform has the characteristic of short Fourier transform and wavelet transform, but the basic wavelet in S transform is invariable and it isn't the same with seismic data absolutely. So a generalized S transform is discussed in the paper and used to predict thin bed. Simulation experiments and processing results of real data reveal that generalized S transform is feasible and effective to predict the seismic thin bed. And generalized S transform provides an effective tool for the processing and interpretation of seismic data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimation and Registration of Relative System Biases in Fire-Control Radar Network

    Publication Year: 2010 , Page(s): 5 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (416 KB) |  | HTML iconHTML  

    Fire-control radar network uses data fusion to form more accurate estimate of a target track, the prerequisite of normal data fusion is the system bias registration. In fire-control radar network, due to the existence of the approximating bias of coordinate conversion model and time synchronization bias, data fusion process brings the immitted system biases besides inherent system biases. This paper developed a system bias registration method based on Kalman filtering theory. The inherent system bias and immitted system bias are considered for modeling. The simulation results are presented and discussed. It is found that the method given in this paper is in effect. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of Pervasive Computing System Support Theory

    Publication Year: 2010 , Page(s): 9 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (411 KB) |  | HTML iconHTML  

    Based on the research of Pervasive Computing connotation, development and theoretical system architecture, this Paper advanced the support theory of Pervasive Computing system for the first time and analyzed the key technology of the Pervasive Computing system support theory. This paper orients the development of the Pervasive Computing system support theory, and it is very important for the research of Pervasive Computing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Denoising Based on Curvelet Transform and Continuous Threshold

    Publication Year: 2010 , Page(s): 13 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (798 KB) |  | HTML iconHTML  

    Curvelet transform is more suitable than wavelet transform for planar image processing. The theory of curvelet transform is introduced. Noise-image is carried on decomposition based on curvelet transform, and distribution characteristics of noise are analyzed. Applying a quantization method of using threshold of which the function is continuous and differentiable is proposed, to remedy disadvantages of quantization methods of using traditional thresholds. Then the method of image denoising is confirmed. The experimental results show that applying the proposed approach can obtain better quality, compared with other methods. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamical Approach for Spectral Estimation under Reverberation

    Publication Year: 2010 , Page(s): 17 - 20
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (928 KB) |  | HTML iconHTML  

    The problem of spectral estimation in reverberation noise is considered in this paper. Since the reverberation is inherently deterministic, a new complexity measure called the phase space volume (PSV) is introduced for estimation instead of using the conventional probabilistic measures. We show that the unknown spectral of a signal embedded in reverberation noise can be obtained by minimizing the PSV (MPSV) of the received signal in a reconstructed phase space. Simulations are carried out to analyze the efficiency of the MPSV method for spectral estimation in reverberation noise. To illustrate the usefulness of the MPSV technique in solving real life problems, the problem of echo estimation in real reverberation is considered. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on the Corrosion and Anodic Oxidation of Carbide Thin Films

    Publication Year: 2010 , Page(s): 21 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (425 KB) |  | HTML iconHTML  

    We discuss a result of corrosion and Anodic Oxidation occurring on anode of silicon carbide electrodes in this paper. Electrode behavior are investigated to produce a evaluation of oxidation. In the final we discussed the effects of film stress that produced by anodic oxidation, and suggestions to prevent corrosion are also be presented here. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Order Tracking of Speed-Up Signals for Gearbox Based on TMS320C5402

    Publication Year: 2010 , Page(s): 25 - 28
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (349 KB) |  | HTML iconHTML  

    In the analysis of the non-stationary vibration signals during speed-up and speed-down, the real state can not be reflected by the traditional spectral analysis because of the "frequency smear" phenomenon; At the same time, the conventional method of acquiring the rotating speed has the problem of the interpolatation errors and influence the effect of order analysis. To solve the above problems, computed order tracking based on DSP (Digital Signal Processor) is used in this paper. Precision measurement of the speed signal is realized with precision timing of TMS320C5402, while the vibration signal acquisition is completed with the McBsp(Multi-channel Buffered Serial Port) simultaneously. And real-time order tracking based on DSP is achieved. Finally, the validity of the method is testified through the experiment on the launching signal of a certain self-propelled gun gearbox. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Logistics Management System Design under Pervasive Computing Environment

    Publication Year: 2010 , Page(s): 29 - 32
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (335 KB) |  | HTML iconHTML  

    Pervasive computing as the third mode of computing is being applied in all aspects of life. The paper has given out a new design of logistic by using products and theory of pervasive. Design of modern logistics management system, under using of pervasive computing environment, will make Logistics industry achieve greater efficiency and more relaxed management environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Optical Air Chamber of Infrared Gas Sensor

    Publication Year: 2010 , Page(s): 33 - 36
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (559 KB) |  | HTML iconHTML  

    In this paper, design method of optical air chamber for infrared gas sensor is described in detail based on the principle of infrared absorption by gas molecule. IRL715 infrared light source and PYS3228 pyroelectric detector with double filters are adopted to detect signal. The optical air chamber is processed with waterproof and dustproof treatment. Effect analysis for sensor performance of two different optical air chamber structures, which are side opening and top opening, is carried into execution through accurate experiments. Experiment results reveal that structure of optical air chamber has significant effect on the capability of sensor. Comparing with top opening structure, the side opening structure can improve sensitivity and accuracy of optical air chamber to a great extent. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Methods of Smart Structural Dynamic Response Analysis of SINS

    Publication Year: 2010 , Page(s): 37 - 40
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (384 KB) |  | HTML iconHTML  

    In order to solve the SINS active vibration control, propose a kind of flexible plate used in SINS of intelligent structure matrix of active vibration control method. This method in establishing flexible sheet on the basis of dynamic model, value-based modal analysis of force to extract the necessary space model reduction mode, based on modal force of piezoelectric element determination criterion optimum allocation scheme, effectively reduced the number of sensors/driver and ensure that the optimal modal control. Using ANAYS software intelligent flexible sheet of dynamic response simulation, results show that this method is used to strap down inertial navigation system, the feasibility of active vibration control. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Robust Joint Space Tracking Method Based on Particle Filter

    Publication Year: 2010 , Page(s): 41 - 44
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1348 KB) |  | HTML iconHTML  

    We propose a novel object tracking algorithm based on modeling the target appearance in a joint space. In contrast with traditional histogram-based trackers which discard all spatial information, the joint space takes both the photometric and spatial information into account. Within this joint space, the target is modeled in a Gaussian mixtures manner where a richer description of the target is captured to increase robustness in tracking. The particle filter procedure is employed for sampling and dealing with the problem of getting trapped in local optimum. Finally, the updating step enables tracking to continue under severe occlusion. Experimental results on a number of challenging sequences demonstrate the effectiveness of the technique. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Provably Secure Certificateless Authenticated Key Agreement Protocol in the Standard Model

    Publication Year: 2010 , Page(s): 45 - 48
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (434 KB) |  | HTML iconHTML  

    Inspired by the certificateless public key encryption scheme proposed by Jong et al, we present a new certificateless authenticated key agreement protocol (CLAK). It is provably secure in the standard model. CLAK protocol provides perfect forward secrecy. Compared with a certificateless authenticated key agreement protocol which is only provable secure in the random oracle model, the new protocol is improved with respect to the security properties, computation and communication cost. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comprehensive Approach of SA Based Software Deployment Reliability Estimation in Neural Networks

    Publication Year: 2010 , Page(s): 49 - 53
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (342 KB) |  | HTML iconHTML  

    Software architecture (SA) has been widely advocated as an effective abstraction for modeling, implementing, and evolving complex software systems such as those in distributed, decentralized, heterogeneous and pervasive environments. We intend to investigate two problems related to the domain of those environments: software deployment and reliability. Though many approaches for Architecture-based reliability research, little work has been done in incorporating software deployment into SA based reliability estimation. This paper presents a new comprehensive approach of reliability estimation considering software deployment in neural networks. Additionally, we explain software component replica and different software component deployment architectures in neural networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Spam Traffic Characterizatione Mechanism

    Publication Year: 2010 , Page(s): 54 - 57
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (367 KB) |  | HTML iconHTML  

    In this paper, we propose a new method to characterize unwanted email traffic. In order to survey a significant, diverse, and representative set of Internet email traffic, we use an extended deterministic finite automata (EFSA) model to express email session and then choose some parameters to capture email traffic characterization. We apply our mechanism to two different volumes of email traffic data captured respectively near an email gateway of a small company and at a country-edged core router of a large commercial Internet Service Provider in China. Experiment results show that there are significant unwanted email traffic in both the backbone link and the local gateway. Our method is effective and practical, which can be employed to design more effective rules or investigate possible countermeasure strategies that an administrator may pursue for reducing unwanted traffic. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Implement of UBL in the E-Business

    Publication Year: 2010 , Page(s): 58 - 61
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (392 KB) |  | HTML iconHTML  

    This paper introduces the evolution of the Universal Business Language (UBL), an OASIS standard to encode and customize business documents. This paper shows UBL's peculiarities and shows how UBL document works through two document examples. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Universal Generic Object Design

    Publication Year: 2010 , Page(s): 62 - 65
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (379 KB) |  | HTML iconHTML  

    Generic object design is a descendant of other programming methods, which concentrate on objects, using objects as the core element in solving problems. Given a generic sense on object, generic object design can be a thinking method, a designing method, or a basic implementation method. We can get a universal and flexible designing process across many fields, not only within software programming. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.