{"title":"An adaptive filtering method to improve measurement accuracy of walking robot attitude","authors":"Bi Sheng, Min Hua-qing, Luo Bin, Li Chun","doi":"10.1109/CYBER.2011.6011766","DOIUrl":"https://doi.org/10.1109/CYBER.2011.6011766","url":null,"abstract":"The objective of this work is to improve the measurement accuracy of robot attitude with an adaptive filter method. Two main topics are highlighted in this work. The first topic is to build the Kalman filtering fusion equation of the acceleration and angular velocity (gyroscope) sensors. The second topic is to show that a Sage-husa adaptive Kalman filtering method is simplified and improved for the system, and an adaptive R is realized, then the exact attitude information is achieved. The experimental results are presented to show that the Sage-husa adaptive Kalman filtering method outperforms the traditional Kalman method in this paper in terms of noise reduction.","PeriodicalId":131682,"journal":{"name":"2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125532663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new hybrid routing protocol in WSNs","authors":"Guangcong Liu, Hua Zhang, Fangjie Lei, Dongli Wei","doi":"10.1109/CYBER.2011.6011788","DOIUrl":"https://doi.org/10.1109/CYBER.2011.6011788","url":null,"abstract":"In view of the limitations of resources of WSNs, the uncertainty of network topology and self-organization character of WSNs, a new hybrid routing protocol is proposed in this paper. This protocol judge the current state of the node and routing selecting through the performance of residual energy of node. Each node in the network communicates with each other by the way of \"best effort to transmit data \" and \"forced to establish adaptive dynamic cluster head\". Simulation results show that this protocol has a high production rate of the cluster head and reliable packet delivery rate, and it can effectively reduce the network loads and network energy consumption.","PeriodicalId":131682,"journal":{"name":"2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems","volume":"7 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125654976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The study of Detecting and Controlling System of Mineral Pulp Level","authors":"Liu Yuan, Li Zhekun, F. Junyu, Wang Feng","doi":"10.1109/CYBER.2011.6011792","DOIUrl":"https://doi.org/10.1109/CYBER.2011.6011792","url":null,"abstract":"In this paper we established the Detecting and Controlling System of Mineral Pulp Level. It abandoned the traditional PID control method. The system adopted an advanced adaptive fuzzy PID control method, applying the Labview to built Monitoring and Controlling System in current time for flotation column, which achieved the real-time monitoring of floatation column liquid level control system and can guarantee the floatation column level in stability and suitability at the same time, together with highly automation degree, convenient operation and it can achieve the remote and local human-machine conversation.","PeriodicalId":131682,"journal":{"name":"2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122184854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A low-PAPR OFDM algorithm with the guaranty for data security","authors":"Dong Jian-e, Zhao Tong Lin, Z. Hui","doi":"10.1109/CYBER.2011.6011762","DOIUrl":"https://doi.org/10.1109/CYBER.2011.6011762","url":null,"abstract":"In order to overcome the high PAPR of OFDM (Orthogonal Frequency Division Multiplexing) signal, a construction method of multi-phase orthogonal matrix family is proposed and its nature is analyzed in this paper, at the same time, two kinds of low-PAPR OFDM algorithm for guaranting the data security are designed by using multi-phase orthogonal matrix. Theoretical analysis and simulation results show that the matrix number of orthogonal matrix family is N!×NN. Through taking any matrix as a key and multiplying the OFDM input signals, the PAPR can be reduced without introducing error rate, and the data security is guaranteed at the same time.","PeriodicalId":131682,"journal":{"name":"2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116122613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved algorithm for computing 2P + Q on elliptic curves","authors":"Yanfeng Qi, Maozhi Xu, Chunming Tang","doi":"10.1109/CYBER.2011.6011776","DOIUrl":"https://doi.org/10.1109/CYBER.2011.6011776","url":null,"abstract":"In this paper we propose an efficient algorithm for computing 2P + Q on elliptic curves. We also analyze this algorithm and improve the computation of point multiplication with our algorithm.","PeriodicalId":131682,"journal":{"name":"2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122391671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survivability recovery of information system based on component availability","authors":"Qin Xia, Zhiwen Wang","doi":"10.1109/CYBER.2011.6011797","DOIUrl":"https://doi.org/10.1109/CYBER.2011.6011797","url":null,"abstract":"A mechanism of survivability recovery, whereby component is the basic unit of being fixed, is presented for information system in this paper. Services provided are classified into complete service, acceptable service and interrupted service by the degree of dependence on failed critical component. The survivability of information system is measured by component availability. Procedure of survivability recovery can be divided into two phases in time domain. The first phase is to restore interrupted service by fixing the failed critical components. Acceptable service can be perfected by fixing the disabled non-critical components in the second phase. The experiment is carried out by applying the mechanism mentioned above in a networked teaching system. The results shows that it is effective to determine recovery actions and activating sequence, increase the capability of recovering rapidly and diversify methods of recovering survivability in information system. The work done by author has a major guiding significance in analyzing and recovering survivability for actual information systems.","PeriodicalId":131682,"journal":{"name":"2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126857305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel fast and effictive video retrieval system for surveillance application","authors":"Aixing Li, Fengqi Yu, Keqing Shi","doi":"10.1109/CYBER.2011.6011783","DOIUrl":"https://doi.org/10.1109/CYBER.2011.6011783","url":null,"abstract":"Fast and effective indexing and retrieval from large amount of surveillance videos are very important issues. This paper proposes a novel object-semantic-based surveillance video indexing and retrieval system, which is mainly composed of two modules: video analysis and video retrieval. In the video analysis, the systems first segments video objects (VO) from surveillance videos, and the fundamental semantic information is then extracted and indexed into the database. A normal approach of Gaussian Mixed Model (GMM) is applied in video object extraction (VOE) and video object segmentation (VOS). During retrieval, the query is converted to semantic information without re-processing the surveillance videos. Color, edge orientation histograms and SIFT (Scale Invariant Feature Transforms), as the key features and similarity measurement, are considered together to accurately match the video objects (VOM). The experiment shows that a user can retrieve the required videos effectively.","PeriodicalId":131682,"journal":{"name":"2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130330607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Movement coupling analysis on the wrist of 165Kg spot welding robot","authors":"Li Cheng, Hongguang Wang, Yuwang Liu","doi":"10.1109/CYBER.2011.6011802","DOIUrl":"https://doi.org/10.1109/CYBER.2011.6011802","url":null,"abstract":"The driven system of 165Kg spot welding robot is introduced and the movement coupling of the wrist is analyzed in detail. The influence formulas of movement coupling to each joint of the wrist are derived theoretically. Furthermore, the kinematics simulation of the wrist is carried out by the software of Solidworks. The simulation results are in agreement with the theoretical calculation, which proves the validity of the transmission analysis. These can be used as reference for transmission design and motion control of industrial robots.","PeriodicalId":131682,"journal":{"name":"2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129407577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic monitoring of mine hoist braking system based on PLCs","authors":"Qian Wang, Xingming Xiao, Chi Ma, Xiao-fang Xing","doi":"10.1109/CYBER.2011.6011778","DOIUrl":"https://doi.org/10.1109/CYBER.2011.6011778","url":null,"abstract":"In order to ensure the reliability and security of the mine hoist, the typical fault mechanism of braking system is analyzed by establishing brake performance analysis models. The fault analysis tree is constructed by the theory of Fussell-Vesely and the method of how to monitor fault parameters is discussed. The industrial test results indicate that some malfunction, such as lack of braking effort, failure of disc spring and block of hydraulic cylinder can be found by the run parameters of brake. Finally, the equipment is developed using the PLCs, which makes dynamic monitoring of hoist braking system come true.","PeriodicalId":131682,"journal":{"name":"2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131439829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generation of test data based on genetic algorithms and program dependence analysis","authors":"Rong Jin, Shujuan Jiang, Hongchang Zhang","doi":"10.1109/CYBER.2011.6011775","DOIUrl":"https://doi.org/10.1109/CYBER.2011.6011775","url":null,"abstract":"A novel approach to generating test data for branch testing is presented. First, we propose an approach to decrease the number of branches by branch selection based on CDG (Control-Dependence Graph) and priority assignment. Then, we present path selection algorithm to obtain the path constraints, which are relatively easier for test data generator based on GA (Genetic Algorithm). Finally, the technique transforms the path constraints into the appropriate fitness function, and then GA is used to generate multiple test cases. Comparing with existing approaches based on GA, the proposed approach can effectively improve the efficiency of program coverage and test data generation.","PeriodicalId":131682,"journal":{"name":"2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130449887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}