2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems最新文献

筛选
英文 中文
An adaptive filtering method to improve measurement accuracy of walking robot attitude 一种提高步行机器人姿态测量精度的自适应滤波方法
Bi Sheng, Min Hua-qing, Luo Bin, Li Chun
{"title":"An adaptive filtering method to improve measurement accuracy of walking robot attitude","authors":"Bi Sheng, Min Hua-qing, Luo Bin, Li Chun","doi":"10.1109/CYBER.2011.6011766","DOIUrl":"https://doi.org/10.1109/CYBER.2011.6011766","url":null,"abstract":"The objective of this work is to improve the measurement accuracy of robot attitude with an adaptive filter method. Two main topics are highlighted in this work. The first topic is to build the Kalman filtering fusion equation of the acceleration and angular velocity (gyroscope) sensors. The second topic is to show that a Sage-husa adaptive Kalman filtering method is simplified and improved for the system, and an adaptive R is realized, then the exact attitude information is achieved. The experimental results are presented to show that the Sage-husa adaptive Kalman filtering method outperforms the traditional Kalman method in this paper in terms of noise reduction.","PeriodicalId":131682,"journal":{"name":"2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125532663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A new hybrid routing protocol in WSNs 一种新的WSNs混合路由协议
Guangcong Liu, Hua Zhang, Fangjie Lei, Dongli Wei
{"title":"A new hybrid routing protocol in WSNs","authors":"Guangcong Liu, Hua Zhang, Fangjie Lei, Dongli Wei","doi":"10.1109/CYBER.2011.6011788","DOIUrl":"https://doi.org/10.1109/CYBER.2011.6011788","url":null,"abstract":"In view of the limitations of resources of WSNs, the uncertainty of network topology and self-organization character of WSNs, a new hybrid routing protocol is proposed in this paper. This protocol judge the current state of the node and routing selecting through the performance of residual energy of node. Each node in the network communicates with each other by the way of \"best effort to transmit data \" and \"forced to establish adaptive dynamic cluster head\". Simulation results show that this protocol has a high production rate of the cluster head and reliable packet delivery rate, and it can effectively reduce the network loads and network energy consumption.","PeriodicalId":131682,"journal":{"name":"2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems","volume":"7 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125654976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The study of Detecting and Controlling System of Mineral Pulp Level 矿浆液位检测与控制系统的研究
Liu Yuan, Li Zhekun, F. Junyu, Wang Feng
{"title":"The study of Detecting and Controlling System of Mineral Pulp Level","authors":"Liu Yuan, Li Zhekun, F. Junyu, Wang Feng","doi":"10.1109/CYBER.2011.6011792","DOIUrl":"https://doi.org/10.1109/CYBER.2011.6011792","url":null,"abstract":"In this paper we established the Detecting and Controlling System of Mineral Pulp Level. It abandoned the traditional PID control method. The system adopted an advanced adaptive fuzzy PID control method, applying the Labview to built Monitoring and Controlling System in current time for flotation column, which achieved the real-time monitoring of floatation column liquid level control system and can guarantee the floatation column level in stability and suitability at the same time, together with highly automation degree, convenient operation and it can achieve the remote and local human-machine conversation.","PeriodicalId":131682,"journal":{"name":"2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122184854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A low-PAPR OFDM algorithm with the guaranty for data security 一种保证数据安全的低papr OFDM算法
Dong Jian-e, Zhao Tong Lin, Z. Hui
{"title":"A low-PAPR OFDM algorithm with the guaranty for data security","authors":"Dong Jian-e, Zhao Tong Lin, Z. Hui","doi":"10.1109/CYBER.2011.6011762","DOIUrl":"https://doi.org/10.1109/CYBER.2011.6011762","url":null,"abstract":"In order to overcome the high PAPR of OFDM (Orthogonal Frequency Division Multiplexing) signal, a construction method of multi-phase orthogonal matrix family is proposed and its nature is analyzed in this paper, at the same time, two kinds of low-PAPR OFDM algorithm for guaranting the data security are designed by using multi-phase orthogonal matrix. Theoretical analysis and simulation results show that the matrix number of orthogonal matrix family is N!×NN. Through taking any matrix as a key and multiplying the OFDM input signals, the PAPR can be reduced without introducing error rate, and the data security is guaranteed at the same time.","PeriodicalId":131682,"journal":{"name":"2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116122613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An improved algorithm for computing 2P + Q on elliptic curves 椭圆曲线上2P + Q的一种改进算法
Yanfeng Qi, Maozhi Xu, Chunming Tang
{"title":"An improved algorithm for computing 2P + Q on elliptic curves","authors":"Yanfeng Qi, Maozhi Xu, Chunming Tang","doi":"10.1109/CYBER.2011.6011776","DOIUrl":"https://doi.org/10.1109/CYBER.2011.6011776","url":null,"abstract":"In this paper we propose an efficient algorithm for computing 2P + Q on elliptic curves. We also analyze this algorithm and improve the computation of point multiplication with our algorithm.","PeriodicalId":131682,"journal":{"name":"2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122391671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Survivability recovery of information system based on component availability 基于组件可用性的信息系统生存性恢复
Qin Xia, Zhiwen Wang
{"title":"Survivability recovery of information system based on component availability","authors":"Qin Xia, Zhiwen Wang","doi":"10.1109/CYBER.2011.6011797","DOIUrl":"https://doi.org/10.1109/CYBER.2011.6011797","url":null,"abstract":"A mechanism of survivability recovery, whereby component is the basic unit of being fixed, is presented for information system in this paper. Services provided are classified into complete service, acceptable service and interrupted service by the degree of dependence on failed critical component. The survivability of information system is measured by component availability. Procedure of survivability recovery can be divided into two phases in time domain. The first phase is to restore interrupted service by fixing the failed critical components. Acceptable service can be perfected by fixing the disabled non-critical components in the second phase. The experiment is carried out by applying the mechanism mentioned above in a networked teaching system. The results shows that it is effective to determine recovery actions and activating sequence, increase the capability of recovering rapidly and diversify methods of recovering survivability in information system. The work done by author has a major guiding significance in analyzing and recovering survivability for actual information systems.","PeriodicalId":131682,"journal":{"name":"2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126857305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel fast and effictive video retrieval system for surveillance application 一种新型、快速、高效的监控视频检索系统
Aixing Li, Fengqi Yu, Keqing Shi
{"title":"A novel fast and effictive video retrieval system for surveillance application","authors":"Aixing Li, Fengqi Yu, Keqing Shi","doi":"10.1109/CYBER.2011.6011783","DOIUrl":"https://doi.org/10.1109/CYBER.2011.6011783","url":null,"abstract":"Fast and effective indexing and retrieval from large amount of surveillance videos are very important issues. This paper proposes a novel object-semantic-based surveillance video indexing and retrieval system, which is mainly composed of two modules: video analysis and video retrieval. In the video analysis, the systems first segments video objects (VO) from surveillance videos, and the fundamental semantic information is then extracted and indexed into the database. A normal approach of Gaussian Mixed Model (GMM) is applied in video object extraction (VOE) and video object segmentation (VOS). During retrieval, the query is converted to semantic information without re-processing the surveillance videos. Color, edge orientation histograms and SIFT (Scale Invariant Feature Transforms), as the key features and similarity measurement, are considered together to accurately match the video objects (VOM). The experiment shows that a user can retrieve the required videos effectively.","PeriodicalId":131682,"journal":{"name":"2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130330607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Movement coupling analysis on the wrist of 165Kg spot welding robot 165Kg点焊机器人腕部运动耦合分析
Li Cheng, Hongguang Wang, Yuwang Liu
{"title":"Movement coupling analysis on the wrist of 165Kg spot welding robot","authors":"Li Cheng, Hongguang Wang, Yuwang Liu","doi":"10.1109/CYBER.2011.6011802","DOIUrl":"https://doi.org/10.1109/CYBER.2011.6011802","url":null,"abstract":"The driven system of 165Kg spot welding robot is introduced and the movement coupling of the wrist is analyzed in detail. The influence formulas of movement coupling to each joint of the wrist are derived theoretically. Furthermore, the kinematics simulation of the wrist is carried out by the software of Solidworks. The simulation results are in agreement with the theoretical calculation, which proves the validity of the transmission analysis. These can be used as reference for transmission design and motion control of industrial robots.","PeriodicalId":131682,"journal":{"name":"2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129407577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic monitoring of mine hoist braking system based on PLCs 基于plc的矿井提升机制动系统动态监控
Qian Wang, Xingming Xiao, Chi Ma, Xiao-fang Xing
{"title":"Dynamic monitoring of mine hoist braking system based on PLCs","authors":"Qian Wang, Xingming Xiao, Chi Ma, Xiao-fang Xing","doi":"10.1109/CYBER.2011.6011778","DOIUrl":"https://doi.org/10.1109/CYBER.2011.6011778","url":null,"abstract":"In order to ensure the reliability and security of the mine hoist, the typical fault mechanism of braking system is analyzed by establishing brake performance analysis models. The fault analysis tree is constructed by the theory of Fussell-Vesely and the method of how to monitor fault parameters is discussed. The industrial test results indicate that some malfunction, such as lack of braking effort, failure of disc spring and block of hydraulic cylinder can be found by the run parameters of brake. Finally, the equipment is developed using the PLCs, which makes dynamic monitoring of hoist braking system come true.","PeriodicalId":131682,"journal":{"name":"2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131439829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Generation of test data based on genetic algorithms and program dependence analysis 基于遗传算法和程序依赖分析的测试数据生成
Rong Jin, Shujuan Jiang, Hongchang Zhang
{"title":"Generation of test data based on genetic algorithms and program dependence analysis","authors":"Rong Jin, Shujuan Jiang, Hongchang Zhang","doi":"10.1109/CYBER.2011.6011775","DOIUrl":"https://doi.org/10.1109/CYBER.2011.6011775","url":null,"abstract":"A novel approach to generating test data for branch testing is presented. First, we propose an approach to decrease the number of branches by branch selection based on CDG (Control-Dependence Graph) and priority assignment. Then, we present path selection algorithm to obtain the path constraints, which are relatively easier for test data generator based on GA (Genetic Algorithm). Finally, the technique transforms the path constraints into the appropriate fitness function, and then GA is used to generate multiple test cases. Comparing with existing approaches based on GA, the proposed approach can effectively improve the efficiency of program coverage and test data generation.","PeriodicalId":131682,"journal":{"name":"2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130449887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信