{"title":"Shield yourself from pattern detection","authors":"Lan Yao, Fuxiang Gao, Ge Yu","doi":"10.1109/CYBER.2013.6705455","DOIUrl":"https://doi.org/10.1109/CYBER.2013.6705455","url":null,"abstract":"In a Wireless Body Area Network (WBAN), biosensors are implanted or worn in/on an individual to acquire medical data for a clinical diagnosis or physical monitoring. To achieve confidentiality and privacy of a WBAN, authentication and crypto contribute a lot. However, besides data itself, the pattern of data transmission contains more secretes than it seems to. Various medical sensors deliver data in different patterns and these patterns leak the fact of what sensors are used, which implies diseases the individual has, and how urgent the situation of a patient is. To hide a pattern, we design a container, which packs real data session in a type-independent transmission model at transmission layer. All valid data packets are equably sent at the frequency of container and at the same length to clutter the inherent pace of valid data transmission and other parameters. To construct a container, extra consumption is due for extra container packets. We also find a strategy PAS to achieve an optimized solution of minimizing it while protecting transmission pattern from eavesdropping.","PeriodicalId":146993,"journal":{"name":"2013 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125347882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determining the minimum scan scope of UTop-k queries in uncertain databases","authors":"Zhao Zhibin, Yu Yang, Bao Yu-bin, Y. Ge","doi":"10.1109/CYBER.2013.6705453","DOIUrl":"https://doi.org/10.1109/CYBER.2013.6705453","url":null,"abstract":"The semantic of UTop-k query is based on the possible world model, and the greatest challenge in processing UTop-k queries is the explosion of possible world space. In this paper, we propose two novel algorithms, MSSUTop-k and Quick MSSUTop-k, for determining the minimum scan scope for UTop-k query processing. MSSUTop-k can achieve accurate results, but have more costly in time complexity. Oppositely, Quick MSSUTop-k achieve approximate results, and performs better in time cost. We conduct extensive experiments to evaluate the performance of our proposed algorithms, and analyze the relationship between score distribution and the minimum scan scope of UTop-k queries.","PeriodicalId":146993,"journal":{"name":"2013 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129254918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed flocking of lagrangian systems with global connectivity maintenance","authors":"Yutian Mao, L. Dou, H. Fang, Jing Chen","doi":"10.1109/CYBER.2013.6705422","DOIUrl":"https://doi.org/10.1109/CYBER.2013.6705422","url":null,"abstract":"Distributed control strategies with connectivity maintenance are proposed for addressing connected flocking of a team of lagrangian systems. First, a completely distributed estimation strategy is devised for estimating the algebraic connectivity, i.e., the second smallest eigenvalue of graph Laplacian, as well as the corresponding eigenvector. Furthermore, based on the estimated parameters, a cooperative flocking algorithm is developed which could steer the agents to the desired flocking motion and to keep the algebraic connectivity to be bounded below by a positive number, which guarantees global network connectivity preservation during maneuvers. Different from the local connectivity maintenance method which keeps some fixed edges for all time, the proposed algorithm guarantees the connectivity while allowing any existing edge to be broken, which enhances the flexibility and adaptability for the overall system. Finally, nontrivial simulation results are presented to show the effectiveness of the proposed control algorithm.","PeriodicalId":146993,"journal":{"name":"2013 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132369730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Route design of the target drone","authors":"Zhuang Kai, Bo Yuming, Tao De-jin, Wang Jun","doi":"10.1109/CYBER.2013.6705441","DOIUrl":"https://doi.org/10.1109/CYBER.2013.6705441","url":null,"abstract":"During the firing tests of the weapon system, there are three options for the testing target: the typical target such as the real plane; the mirror image of the typical target; the target drone. However, the previous two kinds of targets were not suitable for the test, then the target drone would be a best option. Based on the typical route, this paper designed the route for the target drone according to the simulation theory, ensuring the equality of the following steady state errors. Then an example was given to confirm the validity of this method. At last, how to convert the average hit rate about target drone to the typical target was proposed.","PeriodicalId":146993,"journal":{"name":"2013 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123851238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A linear complementarity system approach to macroscopic freeway traffic modeling","authors":"R. Zhong, F. Yuan, T. Pan","doi":"10.1109/CYBER.2013.6705413","DOIUrl":"https://doi.org/10.1109/CYBER.2013.6705413","url":null,"abstract":"In this paper, the (modified) cell transmission model (CTM/MCTM) is formulated as a linear complementarity system (LCS). The LCS formulation of the CTM/MCTM presented here is a discrete time linear system with a complementarity condition. The time evolution of such kind of LCS consists of a series of “events” which cause changes in dynamics and possibly jumps in the state vector. The occurrence of events is governed by certain complementarity conditions which are similar to those in the linear complementarity problem of mathematical programming. The discrete time linear system corresponds to the flow conservation equation of the CTM/MCTM while the complementarity condition governs the sending and receiving function defined by a series of “min” operations in the original CTM/MCTM. Technical difficulties encountered in application of the CTM and its extensions such as the hard nonlinearity caused by the “min” operator can be avoided by the LCS reformulation. On the other hand, by this formulation, the theory of LCS developed in control theory and mathematical programming communities can be applied to the qualitative analysis of the CTM and its modifications. The new formulation makes the CTM convenient for the design of traffic state estimators, ramp metering controllers and for the dynamic traffic assignment purposes. For example, the new model contributes to the dynamic user equilibrium (DUE) problem with physical queueing models as network loading model by converting the DUE problem into a uniform complementarity system. This may benefit the existence issue of DUE with CTM as network loading model which is regarded as an important yet difficult problem. The new formulation can benefit freeway control strategies design by adopting the results from control and mathematical programming communities.","PeriodicalId":146993,"journal":{"name":"2013 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems","volume":"306 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116228521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measurement and analysis of braille stimulus to brain using an EEG: A preliminary study","authors":"Claire E. Shelton, Yudong Luo, Yantao Shen","doi":"10.1109/CYBER.2013.6705476","DOIUrl":"https://doi.org/10.1109/CYBER.2013.6705476","url":null,"abstract":"Braille systems currently available for blind and visually impaired (BVI) individuals are inadequate. Braille books and refreshable displays are large and hard to use during travel. For BVI individuals to truly have access to written materials wherever they are, a portable, adaptable, and user friendly device is needed. One way to achieve this is the use of an electronic stimulation to the fingertip rather than stimulation by mechanical pins actuated by complicate electromechanical mechanism. As the first step, this paper discusses preliminary investigations and findings of the brain signals observed during mechanical Braille stimulation in order to later correlate them with the brain signals observed during electronic Braille stimulation. The next step is to design a portable and adaptable electronic Braille device. The device will use brain signals induced by mechanical Braille stimulation as the control reference for achieving correlated and adaptable electronic Braille stimulation for users.","PeriodicalId":146993,"journal":{"name":"2013 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124751600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Heping Chen, Hongtai Cheng, Biao Zhang, Jianjun Wang, T. Fuhlbrigge, Jian Liu
{"title":"Semiautonomous industrial mobile manipulation for industrial applications","authors":"Heping Chen, Hongtai Cheng, Biao Zhang, Jianjun Wang, T. Fuhlbrigge, Jian Liu","doi":"10.1109/CYBER.2013.6705472","DOIUrl":"https://doi.org/10.1109/CYBER.2013.6705472","url":null,"abstract":"The mobile industrial manipulator(MIM) which combines the advantages of both the mobile robot and industrial robot and owns powerful mobility, flexibility and functionality will be the next generation of robots. However fully autonomous MIM performing various tasks in unstructured or semi-structured environment is very challenging in autonomous localization & navigation, object identification, control and coordination. However, there is a demand in industry for MIMs to be deployed in hazardous, dangerous and/or remotely environments. Therefore, a semi-autonomous MIM is investigated to perform industrial operations. An MIM prototype using a mobile platform and an industrial robot is developed. Manual and autonomous methods are proposed and implemented to control the prototype manually and autonomously. Experiments using the prototype were performed. Experimental results demonstrate that the robot can run autonomously if there is no ambiguity and the operators can interrupt the autonomous mode at any time if needed. The developed prototype and proposed methods have big potential in industrial applications.","PeriodicalId":146993,"journal":{"name":"2013 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121579854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An approach for reactive power configuration for wind power base considering the operation risk of power system","authors":"Xu Yao, Tingting Fang, Xiaohu Li, Zheng Fu, Bolin Zhang, Yi Tang","doi":"10.1109/CYBER.2013.6705432","DOIUrl":"https://doi.org/10.1109/CYBER.2013.6705432","url":null,"abstract":"Due to the unreasonable reactive power configuration for wind power base, disconnection of large-scale wind turbines from grid has caused several times in the world recently. Based on the brief analysis of the process of the accident in wind power base, risk is introduced to make reactive power configuration for wind power base in this paper, considering the cost of investment of reactive power compensation, active power reserve and load shedding. The risk is optimized to be minimized by coordinating adjustable active power reserve, interruptible load and so on. Then the reactive power configuration scheme can be obtained by genetic algorithm. By comparison the proposed method with the traditional methods using the data of an actual grid with wind power in domestic, from the point of the view from economy, stable voltage at PCC and the performance of transient voltage, it shows that the reactive power configuration obtained by the proposed method is better.","PeriodicalId":146993,"journal":{"name":"2013 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127265584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bingtuan Gao, Honggang Song, Jianguo Zhao, C. Gong
{"title":"Dynamics and energy-based control of TORA system on a slope","authors":"Bingtuan Gao, Honggang Song, Jianguo Zhao, C. Gong","doi":"10.1109/CYBER.2013.6705474","DOIUrl":"https://doi.org/10.1109/CYBER.2013.6705474","url":null,"abstract":"The Translational Oscillators with Rotating Actuator (TORA) is an underactuated system which has one actuated rotor and one unactuated translational cart. This paper focuses on dynamics and control design of an underactuated TORA on a slope. Lagrange Equations are employed to achieve the dynamics of the TORA on a slope by selecting position of a cart and rotor angle as the general coordinates and torque acting on the rotor as general force. Based on the passivity of the system, a control Lyapunov function including system energy is designed. Consequently, a stabilizing controller is yielded based on the second Lyapunov stability theorem. Finally, numerical simulations are performed to verify the correctness and feasibility of the dynamic analysis and stabilizing controller.","PeriodicalId":146993,"journal":{"name":"2013 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114705927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Guidance law research for autonomous aerial refueling of UAV","authors":"Wenlong Xu, D. Luo, Lei Yang, Shunxiang Wu","doi":"10.1109/CYBER.2013.6705486","DOIUrl":"https://doi.org/10.1109/CYBER.2013.6705486","url":null,"abstract":"Guidance law is so important that determines whether the autonomous aerial refueling (AAR) of UAV will success. Based on the analysis of the Strategy of Rendezvous for AAR of UAV, different guidance laws for the tanker aircraft and the receiver air craft has put forward. A nonlinear lateral trajectory tracking guidance law is well apply to solve the problem of the guidance to tanker receiver and a trajectory has been designed for the receiver aircraft to solve the problem of the two air crafts to approach well, simulation is also carried out for the methods.","PeriodicalId":146993,"journal":{"name":"2013 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129316993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}