By Topic

Industrial Control and Electronics Engineering (ICICEE), 2012 International Conference on

Date 23-25 Aug. 2012

Filter Results

Displaying Results 1 - 25 of 551
  • [Cover art]

    Page(s): C4
    Save to Project icon | Request Permissions | PDF file iconPDF (1534 KB)  
    Freely Available from IEEE
  • [Title page i]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (25 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (113 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (118 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): v - xxxviii
    Save to Project icon | Request Permissions | PDF file iconPDF (228 KB)  
    Freely Available from IEEE
  • Welcome

    Page(s): xxxix - xl
    Save to Project icon | Request Permissions | PDF file iconPDF (56 KB)  
    Freely Available from IEEE
  • Conference Committees

    Page(s): xli - xlii
    Save to Project icon | Request Permissions | PDF file iconPDF (77 KB)  
    Freely Available from IEEE
  • Reviewers

    Page(s): xliii
    Save to Project icon | Request Permissions | PDF file iconPDF (74 KB)  
    Freely Available from IEEE
  • Automated Online Estimation of Fines in Ore on Conveyer Belt Using Image Analysis

    Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (493 KB) |  | HTML iconHTML  

    Excessive fines fed to metallurgical plants, power stations and other fixed or fluidized bed reactors can cause major problems by adversely affecting the flow of gas through the solid burden. In this industrial case study, the novel application of machine vision to monitor coal on conveyer feed systems is described. By using an adaptive thresholding and watershed transform, the fines in the stratified coal could be reliably estimated. We use the feature compactness to select and segment rock particles since crushed rocks tend to have round shape. The watershed transform is also used to split touching rock particles segmented from the adaptive thresholding. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cross-term Reduction Using Wigner Hough Transform and Back Estimation

    Page(s): 5 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (495 KB) |  | HTML iconHTML  

    This paper presents some algorithms to reduce the cross-terms, which are unfortunate mathematical artifacts in the calculation of Wigner Ville Distribution (WVD) of a multi-component signal. The experiments are carried out for linear FM signals which have a line representation in the spectral domain. When the WVD of a multi-component signal is calculated, sometimes the cross-terms will show higher peaks compared to the main signal components. There have been many methods proposed to filter out these cross terms, so that the signal can be precisely represented in the time-frequency domain. In this paper, a method based on Hough Transform is used for the same purpose. A line in the time-frequency domain can be represented as a point in the Hough transformed domain. Once we identify the coordinates of this point in the transformed domain, we can estimate the properties of the line in the time-frequency domain which corresponds exactly to the actual signal components. This paper proposes a new idea of back estimation to filter out only the components corresponding to cross-terms from the time-frequency domain of WVD. This paper also briefs about the implementation of the algorithms in Matlab for different values of signal to noise ratios. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Acquisition Digital Baseband Module for Multichannel GPS Receiver

    Page(s): 9 - 13
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (437 KB) |  | HTML iconHTML  

    This paper presents a model based design technique for implementing acquisition module in the GPS receiver, by using FFT based code phase search acquisition algorithm. This is used to find out from which satellite the signal is coming to the GPS receiver. SFF-SDR Lyrtech board has been used to implement this module. The results, after further processing by tracking module, give the code phase and the carrier frequency of the signal. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Digital Camouflage Characteristics of Color Vision

    Page(s): 14 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (334 KB) |  | HTML iconHTML  

    Human beings depend on vision to accept the outside information. The color plays an important role in the vision. In the process of design digital camouflage, it is important to know about color characteristic from the angles on physics, physiology and psychology. The paper analyzes the fundamental characteristics of digital camouflages from the points of view on the theories on color, It designs a mixed-color experiment for testing the different effect in the case of different distance. The result gives an important reference for design the camouflage. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Controllable Quantum Sequential Signature and Vote Scheme

    Page(s): 17 - 19
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (219 KB) |  | HTML iconHTML  

    In order to realize digital signature and vote validly and reliably in multi-user environment, a controllable quantum sequential signature and vote scheme is put forward. The signature of cryptograph and users validation are achieved by using the property of quantum entanglement swapping in Bell states;The choice of target users and the transmission of signature-information between users are implemented by controllable quantum teleportation; The quantum key and one-time pad ensures the safety of our scheme. The verification for each terminal and the center is required in this scheme, so it can position where the error happens accurately; The signature-user is ensured unknown to other users in this scheme, and the same to the comment by the signature-user. It has better performance in confidentiality and practicability compared with previous work. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and Design of Gene Analytical Instrument Based on PMT

    Page(s): 20 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (252 KB) |  | HTML iconHTML  

    A gene analysis system using photo multiplier tubes as the optical sensor is introduced in this article. This system consists of msp430f149 processor, optical system, location control system, signal acquisition and processing unit. The system can analyze the reagent's gene through detecting the fluorescence emitted from reagent. It has merits of high speed and high precision compared with real-time detection. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and Implementation of Mobile GIS Based on Mobile Widget Technology

    Page(s): 22 - 25
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (215 KB) |  | HTML iconHTML  

    Mobile GIS has developed into a popular and important research direction of GIS. The system implements the browse query of mobile GIS on the mobile terminal applications, using Mobile Widget and Mobile Maps Widget as Technology platform. Taking school and Jiuzhai Valley for example, in this system platform users can easily locate and browse digital map in the mobile terminal, and can carry out real-time query on school and tourist attractions. Analysis on instance and running results show that: mobile users can achieve fast and convenient location and demand for real-time viewing digital maps via mobile terminal, and has changed the traditional, location-based service mechanism and achieve the interaction free of time and space constraints. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MAP Based Blind Super-Resolution

    Page(s): 26 - 28
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (199 KB) |  | HTML iconHTML  

    Super-resolution is the process of obtaining a high resolution image from multiple low resolution images. In most of the super-resolution algorithms, the blur parameter of a LR-image model always have to be manually set as a default value, this is not a good solution. In this paper, we propose a method which can adaptively estimate the blur parameter. Fusing all low-resolution images, we will get the initial image. When it is used in MAP algorithm, no more than 10 iterations is sufficient to get a stable solution. Compared with other MAP algorithms, this algorithm can greatly reduce the computation demand. Experiments show that when is applied to real image sequences, it can preserve the image edges and details. and the reconstructed image is clear. The propose algorithm is very different. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time Simulation of Rain and Snow in Virtual Environment

    Page(s): 29 - 32
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (177 KB) |  | HTML iconHTML  

    Analyzing on traditional methods, this paper presents a new method for simulation of real-time rain and snow in large-scale scene. The basic idea of the method is to scheme the attributes of rain and snow, models kinematics model on particle system theory. And the rendering efficiency of particle is also optimized. The results of experimentation have proved that this method is more effective and real-time in the simulation of rain and snow. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Analysis and Repair on Bituminous Pavement Main Distresses of Expressway

    Page(s): 33 - 36
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (122 KB) |  | HTML iconHTML  

    With the traffic load heavy, traffic flow channel, traffic density increases trends, many expressway performances have been gradually began to decay, such as road distresses, carrying capacity, anti-slide sharply worsen. Expressway cannot provide for vehicles, safe, comfortable, fast operation environment. Therefore, timely to expressway maintenance and repair, make its use to recover and improve the performance, extend the use fixed number of year, this way not only for expressway management department provides the huge economic efficiency, but also for the convenience of travel, expressway users to promote social material circulation is ensured. The main distresses of bituminous pavement are analyzed, such as crack, pot hole, bleeding and so on. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Distributed Routing Algorithm for LEO Satellite Network

    Page(s): 37 - 40
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (234 KB) |  | HTML iconHTML  

    In this paper, we introduce the architecture of LEO satellite network first of all, and then conduct a research on a classical distributed algorithm "Datagram Routing Algorithm"(DRA) for LEO satellite network. Our core work focus on optimizing the DRA and giving a corresponding re-routing strategy for optimized algorithm. Finally some simulation experiments evaluating the performance of our novel algorithm and re-routing strategy are demonstrated. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • River System Extraction Based on BP Neural Network and DEM Data

    Page(s): 41 - 43
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1732 KB) |  | HTML iconHTML  

    Extracting river system is the main content of remote sensing hydrological analysis. This paper studies a method of extracting river system based on Back Propagation (BP) neural network and DEM data. The study region is the northwest area of Liangzhu, in Yuhang district Zhejiang province. To simplify the BP network structure, principal component analysis technique is used according to the spectral characteristics of TM image. In addition, slope data derived from DEM is also used as an input layer of BP network. At the same time, the traditional band ratio method is applied to do comparative study. By comparing the two methods, and found: band ratio method can inhibit the vegetation information, but poor accuracy, and the method in this paper can distinguish some noise and water, obtained a more satisfactory results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust Estimation Method via Dependencies between Components

    Page(s): 44 - 47
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (152 KB) |  | HTML iconHTML  

    Trust estimation plays an important role in research of Trusted Computing. However, the method for trust estimation often has the property of oneness for the moment. In this paper, the degree of trust of a component is extended to a vector. To estimate the trust of a component, the relation of dependency between components is studied thoroughly, followed by the concepts of the path and path set. Using the above, a layered structure is presented and finally, the method for trust estimation is proposed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving TLS Protocol Using Identity-Based Double-certificate Mechanism

    Page(s): 48 - 51
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (126 KB) |  | HTML iconHTML  

    Although Identity-Based Cryptography (IBC) has many attractive properties, its application is restricted for lacking of security protocols supporting. To overcome this problem, we propose an improved Transport Layer Security (TLS) protocol using identity-based double-certificate mechanism (IBDC_TLS) in this paper. Firstly, the concept of identity-based double-certificate is presented. Secondly, by designing new cipher suites, IBC is appended to security parameters. At last, by modifying protocol message parameters, the TLS protocol is improved to fit the double-certificate mechanism. The results show that IBDC_TLS has advantages of lightweight and efficiency of IBC and flexibility of key recovery and management of double-certificate mechanism, as well as easy to deploy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Application of Wireless Sensor Network Technology in Earthquake Disaster

    Page(s): 52 - 55
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (140 KB) |  | HTML iconHTML  

    Wireless sensor network technology is brought in the earthquake disaster protection. A dynamic, real-time and changeful earthquake disaster wireless monitoring system is constructed so that it could meet the each requirements of environmental monitoring which has great significance to the earthquake hazard prediction. In the paper, the sensor input interface and equipment control output interface are designed, the acquisition of scene information and front-end wireless nodes of equipment control are developed, utilizing ARM9, expanding various resources interface to be the host hardware of monitoring system, using monitoring function and man-machine interface in the workbench of Linux operating system, through unified coordination command to the front-end wireless nodes to finish the collection and analysis on environment information and comprehensive control of equipment. The system has the characteristic of low cost, strong commonality and expandability, high reliability. It can be easily applied to the environmental monitoring on various occasions to meet customers' different needs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Environmental Information System Based on Flex and MAPGIS K9 IMS

    Page(s): 56 - 58
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (235 KB) |  | HTML iconHTML  

    It is very important to protect the natural environment. Presenting environmental information to the public with the intention of enhancing the understanding of the environment and promoting environmental awareness requires the creation of a new type of environmental information system for the general public(PEIS). The eco-geochemistry information is main information that the public wants to obtain and comprehend through the WWW. Through a practical case study, the eco-geomistry information system to publish in the web is explained in detail. The functions of the system include map display, map output, data query, statistical analysis, environmental evaluation, etc. The paper introduces the technique of Flex and MapGIS K9 IMS, and how to integrate these technique. The principles and methods are not only applicable to the eco-geochemisty information system, but also to any other information system sharing information in the web. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A General Way to Break Hash-based Challenge-and-Response

    Page(s): 59 - 62
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (152 KB) |  | HTML iconHTML  

    Hash-based challenge-and-response protocols are widely used as an authentication scheme in network applications. The authenticator sends a random string as a challenge to the peer, the peer generates a response with a hash function on a pre-shared password combined the received challenge. In this paper, we propose a general and efficient way to break some prevalent hash-based challenge- and-response protocols in use. These protocols are vulnerable to the chosen challenge attack launched by a malicious user, who impersonates the server. We first generate a rainbow table containing hash values of all possible passwords, which is produced by hashing a pre-chosen challenge concatenated with all possible password candidates. Second, we impersonate the authenticator and send the pre-chosen challenge to the peer. Finally, we look up in the rainbow table for the received response from the peer to crack the password. With this tactic, we can do the cost consuming pre-computation once, and then we can always use it to recover all of the peer's passwords with only one additional on-line query. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.