{"title":"High Speed Synchronous Serial Port and Research on Glitch Based on the DSP and FPGA","authors":"H. Niu, Weijiang Wang, Zhenjuan Liu","doi":"10.1109/ICCECT.2012.234","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.234","url":null,"abstract":"The DSP (SMJ320C6701) of TI Company coming with multi-channel buffered serial port McBSP and its work timing is introduced. Using the state machine design ideas of VHDL, high-speed synchronous serial communication interface circuit has been completed between McBSP and FPGA. In a synchronous design, the generation mechanism and solutions is given for the glitch signal, which is generated in the simulation of space borne equipment being in adverse environmental conditions.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124287642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Description Method for Spatial Data Service Integration by Resources Virtualization","authors":"Liang Huang, Xinyan Zhu, Wei Guo, Miao Shui","doi":"10.1109/ICCECT.2012.167","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.167","url":null,"abstract":"Spatial data services are increasingly available on the Internet, including OGC (Open Geospatial Consortium) web services and proprietary mapping services (e.g. Google Maps). It makes sense to integrate these heterogeneous services to produce the information demanded in complex applications. For integration, unified descriptions of services are required. In this study, the virtualization idea used in cloud computing is employed to conceal interface differences by translating physical resources into logical resources. Correspondingly a description method for spatial data service integration by resources virtualization is presented. Finally, this article implements a virtual file system using the proposed method. Experiments were conducted to overlay multi-source spatial data services by operating virtual files, including MapWorld, Google Maps and OGC standard services. The effectiveness of the proposed description method is verified by experimental results.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126634367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"3D Visual Simulation of Dam-Break Process at the Dam Breach","authors":"Weiping Guo, Wenqian Li, X. Ao, Xiaoling Wang","doi":"10.1109/ICCECT.2012.252","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.252","url":null,"abstract":"Dam break is a serious social disaster, which causes a great deal of damage to the society and environment in downstream areas. 3D visual simulation of dam-break process at the dam breach is the significant foundation for the dam safety evaluation and insurance. Based on the agent model and its auxiliary model, realistic graph facture, the dynamic visual simulation and output after rendering, 3D visual simulation of instantaneous dam-break process at the dam breach can be proposed. A reservoir located in Shenzhen province is taken as the representative case, visualization of three calculation conditions about No.2 dam is performed, dam-break processes at the dam breach are simulated factually, which can provide the theoretical basis and technical support for the risk decision and management of dam security.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121581326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Segmentation Algorithm for Touching Character Based on the Invariant Moments and Profile Feature","authors":"Junming Chang, Wei Tang, XiangYu Li, Hai Han","doi":"10.1109/ICCECT.2012.159","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.159","url":null,"abstract":"Unsuitable segmentation is the primary cause of recognition errors in optical character recognition. In this paper, after analyzing several representative related approaches, a segmentation algorithm for touching characters based on Hu's invariant moments and profile feature is presented. Hu's invariant moments are extended. By using the concave and convex of string profiles, the cut-off points of the candidates of the touching characters are located. And with the width constraining, the best cut-off points using the extended invariant moments are found out. Experimental results show that this approach is effective and feasible, and also reduce the recognition error because of segmentation errors.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121646266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exponential Stability of k Out of N: G Redundant System","authors":"Zhiying Li, Wenlong Wang","doi":"10.1109/ICCECT.2012.140","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.140","url":null,"abstract":"In this paper we investigate the dominant eigenvalue and stability of k out of N: G redundant system with repair facilities and multiple critical and non-critical errors. By using the method of functional analysis, especially, the linear operator theory on Banach space, we prove the existence of strictly dominant eigenvalue of the system. We show that the dynamic system is linear stable and exponential stable.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123122626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast Inverse Square Root Based Matrix Inverse for MIMO-LTE Systems","authors":"C. Mahapatra, S. Mahboob, V. Leung, T. Stouraitis","doi":"10.1109/ICCECT.2012.253","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.253","url":null,"abstract":"This paper addresses the designing of a low complexity and high speed matrix inversion algorithm using fast inverse square root based on QR-decomposition and systolic array architecture. Matrix operations are the most costly computational module within MIMO-LTE receivers. We have demonstrated a novel approach of matrix inverse to reduce the MIMO receiver module cost in terms of latency and complexity. The cost is reduced by implementing a 4x4 matrix inverse in Xilinx Virtex-6 FPGA by optimizing the module for speed and power by pipelining and achieving a better throughput. The results are compared with state of art techniques of CORDIC based squared givens rotation.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128662549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Development of CMOS Image Sensor Driver Program Based on OMAP3530","authors":"Chen Bing, Xia Wei, Ning Ou","doi":"10.1109/ICCECT.2012.72","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.72","url":null,"abstract":"The image capture system is an important part of the intelligent instrument. To solve the problem of capturing high-resolution image with large amount of data, this design utilizes OMAP3530 with embedded Linux to drive MT9P031 CMOS sensor. It can successfully capture the real-time video and store the still image to the SD card, the user can adjust the exposure time and the gain of the pixel as well. The test shows that the system works well on real-time image capture situation, and it has been used in the project of 3D laser scanner, which can effectively reduce the whole system load with impressive high performance.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125083288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Digital Signature of P2P E-commerce","authors":"Dongjuan Wang, Ling Lu","doi":"10.1109/ICCECT.2012.267","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.267","url":null,"abstract":"P2P e-commerce becomes one of most important e-business models. The paper about e-commerce activities has focused on the trust risk increasingly. To solve identity trust problem in e-commerce transactions, the idea of threshold cryptography is introduced and a distributed digital signature scheme based on the P2P e-commerce is designed in this paper. The threshold program having the trust node and enhancing safty based on the Elliptic Curve digital signature is provided in P2P environment, which uses elliptic encryption technology and safe Elliptic Curves, combining with the threshold system, verifiable secret sharing and proactive secret sharing system. The trust node is responsible for producing the key, the sub-key and distributing sub-key. Then it revokes the key immediately to ensure key security. The threshold signature scheme based on elliptic encryption technology for solving the risks of P2P e-commerce, which architecture of authority is built by trust degree nodes.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121775625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Requirement Modeling and Analysis Based on MDA","authors":"H. Jin, Haihua Yan","doi":"10.1109/ICCECT.2012.199","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.199","url":null,"abstract":"Software development process based on MDA is driven by the behavior of the software system modeling, and UML which is one of the core standards defined by OMG is used to describe various models. Requirement models are described mainly by UML use case diagrams and use case descriptions, and the requirement modeling and analysis were done manually before. This paper proposes a semi-structured method to create requirement models based on the object-oriented idea, and to extract the class diagram from the requirement models according to the defined transition rules. It improves the speed and accuracy of the software development. This paper ends with an example to explain the process of modeling and transition.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121785818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SVC Voltage Regulator Based on Fractional Order PID","authors":"Manyu Liu, Huaying Dong, Guishu Liang","doi":"10.1109/ICCECT.2012.248","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.248","url":null,"abstract":"Contradiction exist between rapid and smooth in the dynamic adjustment process of SVC, however, Fractional order PID controller has two degrees of freedom more than the integer order PID controller, and it has better control performance. This article briefly describes the fractional order PID controller, and through Oustaloup number of filtering methods to achieve a fractional order PID controller, then tuning various parameters of the controller by the genetic algorithm, at last used it in the process of the regulator SVC voltage. The results of Simulation show that:in the application of SVC, fractional order PID control can significantly speed up the speed of the voltage regulator, and accelerate the process of system voltage stability.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126373348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}