By Topic

Industrial Control and Electronics Engineering (ICICEE), 2012 International Conference on

Date 23-25 Aug. 2012

Filter Results

Displaying Results 1 - 25 of 551
  • [Cover art]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1534 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - xxxviii
    Request permission for commercial reuse | PDF file iconPDF (228 KB)
    Freely Available from IEEE
  • Welcome

    Publication Year: 2012, Page(s):xxxix - xl
    Request permission for commercial reuse | PDF file iconPDF (56 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Committees

    Publication Year: 2012, Page(s):xli - xlii
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012, Page(s): xliii
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Automated Online Estimation of Fines in Ore on Conveyer Belt Using Image Analysis

    Publication Year: 2012, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (493 KB) | HTML iconHTML

    Excessive fines fed to metallurgical plants, power stations and other fixed or fluidized bed reactors can cause major problems by adversely affecting the flow of gas through the solid burden. In this industrial case study, the novel application of machine vision to monitor coal on conveyer feed systems is described. By using an adaptive thresholding and watershed transform, the fines in the strati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cross-term Reduction Using Wigner Hough Transform and Back Estimation

    Publication Year: 2012, Page(s):5 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (495 KB) | HTML iconHTML

    This paper presents some algorithms to reduce the cross-terms, which are unfortunate mathematical artifacts in the calculation of Wigner Ville Distribution (WVD) of a multi-component signal. The experiments are carried out for linear FM signals which have a line representation in the spectral domain. When the WVD of a multi-component signal is calculated, sometimes the cross-terms will show higher... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Acquisition Digital Baseband Module for Multichannel GPS Receiver

    Publication Year: 2012, Page(s):9 - 13
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (437 KB) | HTML iconHTML

    This paper presents a model based design technique for implementing acquisition module in the GPS receiver, by using FFT based code phase search acquisition algorithm. This is used to find out from which satellite the signal is coming to the GPS receiver. SFF-SDR Lyrtech board has been used to implement this module. The results, after further processing by tracking module, give the code phase and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Digital Camouflage Characteristics of Color Vision

    Publication Year: 2012, Page(s):14 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    Human beings depend on vision to accept the outside information. The color plays an important role in the vision. In the process of design digital camouflage, it is important to know about color characteristic from the angles on physics, physiology and psychology. The paper analyzes the fundamental characteristics of digital camouflages from the points of view on the theories on color, It designs ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Controllable Quantum Sequential Signature and Vote Scheme

    Publication Year: 2012, Page(s):17 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    In order to realize digital signature and vote validly and reliably in multi-user environment, a controllable quantum sequential signature and vote scheme is put forward. The signature of cryptograph and users validation are achieved by using the property of quantum entanglement swapping in Bell states;The choice of target users and the transmission of signature-information between users are imple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and Design of Gene Analytical Instrument Based on PMT

    Publication Year: 2012, Page(s):20 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    A gene analysis system using photo multiplier tubes as the optical sensor is introduced in this article. This system consists of msp430f149 processor, optical system, location control system, signal acquisition and processing unit. The system can analyze the reagent's gene through detecting the fluorescence emitted from reagent. It has merits of high speed and high precision compared with real-tim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and Implementation of Mobile GIS Based on Mobile Widget Technology

    Publication Year: 2012, Page(s):22 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    Mobile GIS has developed into a popular and important research direction of GIS. The system implements the browse query of mobile GIS on the mobile terminal applications, using Mobile Widget and Mobile Maps Widget as Technology platform. Taking school and Jiuzhai Valley for example, in this system platform users can easily locate and browse digital map in the mobile terminal, and can carry out rea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MAP Based Blind Super-Resolution

    Publication Year: 2012, Page(s):26 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    Super-resolution is the process of obtaining a high resolution image from multiple low resolution images. In most of the super-resolution algorithms, the blur parameter of a LR-image model always have to be manually set as a default value, this is not a good solution. In this paper, we propose a method which can adaptively estimate the blur parameter. Fusing all low-resolution images, we will get ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time Simulation of Rain and Snow in Virtual Environment

    Publication Year: 2012, Page(s):29 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    Analyzing on traditional methods, this paper presents a new method for simulation of real-time rain and snow in large-scale scene. The basic idea of the method is to scheme the attributes of rain and snow, models kinematics model on particle system theory. And the rendering efficiency of particle is also optimized. The results of experimentation have proved that this method is more effective and r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Analysis and Repair on Bituminous Pavement Main Distresses of Expressway

    Publication Year: 2012, Page(s):33 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (122 KB) | HTML iconHTML

    With the traffic load heavy, traffic flow channel, traffic density increases trends, many expressway performances have been gradually began to decay, such as road distresses, carrying capacity, anti-slide sharply worsen. Expressway cannot provide for vehicles, safe, comfortable, fast operation environment. Therefore, timely to expressway maintenance and repair, make its use to recover and improve ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Distributed Routing Algorithm for LEO Satellite Network

    Publication Year: 2012, Page(s):37 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    In this paper, we introduce the architecture of LEO satellite network first of all, and then conduct a research on a classical distributed algorithm "Datagram Routing Algorithm"(DRA) for LEO satellite network. Our core work focus on optimizing the DRA and giving a corresponding re-routing strategy for optimized algorithm. Finally some simulation experiments evaluating the performance of our novel ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • River System Extraction Based on BP Neural Network and DEM Data

    Publication Year: 2012, Page(s):41 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1732 KB) | HTML iconHTML

    Extracting river system is the main content of remote sensing hydrological analysis. This paper studies a method of extracting river system based on Back Propagation (BP) neural network and DEM data. The study region is the northwest area of Liangzhu, in Yuhang district Zhejiang province. To simplify the BP network structure, principal component analysis technique is used according to the spectral... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust Estimation Method via Dependencies between Components

    Publication Year: 2012, Page(s):44 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    Trust estimation plays an important role in research of Trusted Computing. However, the method for trust estimation often has the property of oneness for the moment. In this paper, the degree of trust of a component is extended to a vector. To estimate the trust of a component, the relation of dependency between components is studied thoroughly, followed by the concepts of the path and path set. U... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving TLS Protocol Using Identity-Based Double-certificate Mechanism

    Publication Year: 2012, Page(s):48 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (126 KB) | HTML iconHTML

    Although Identity-Based Cryptography (IBC) has many attractive properties, its application is restricted for lacking of security protocols supporting. To overcome this problem, we propose an improved Transport Layer Security (TLS) protocol using identity-based double-certificate mechanism (IBDC_TLS) in this paper. Firstly, the concept of identity-based double-certificate is presented. Secondly, by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Application of Wireless Sensor Network Technology in Earthquake Disaster

    Publication Year: 2012, Page(s):52 - 55
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB) | HTML iconHTML

    Wireless sensor network technology is brought in the earthquake disaster protection. A dynamic, real-time and changeful earthquake disaster wireless monitoring system is constructed so that it could meet the each requirements of environmental monitoring which has great significance to the earthquake hazard prediction. In the paper, the sensor input interface and equipment control output interface ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Environmental Information System Based on Flex and MAPGIS K9 IMS

    Publication Year: 2012, Page(s):56 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    It is very important to protect the natural environment. Presenting environmental information to the public with the intention of enhancing the understanding of the environment and promoting environmental awareness requires the creation of a new type of environmental information system for the general public(PEIS). The eco-geochemistry information is main information that the public wants to obtai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A General Way to Break Hash-based Challenge-and-Response

    Publication Year: 2012, Page(s):59 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    Hash-based challenge-and-response protocols are widely used as an authentication scheme in network applications. The authenticator sends a random string as a challenge to the peer, the peer generates a response with a hash function on a pre-shared password combined the received challenge. In this paper, we propose a general and efficient way to break some prevalent hash-based challenge- and-respon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.