{"title":"Research on Marine Data Collection and Transmission System Based on Lwip Protocol","authors":"Hui Wang, Wenyu Cai","doi":"10.1109/ICCECT.2012.203","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.203","url":null,"abstract":"Due to the status quo that serial data transmission capacity cannot meet the demand of marine environment real-time detection in the marine data acquisition system. This paper designs and implements a faster Ethernet data transmission system, which can be connected with each other by Interconnection device. For the system based on single node, it consists of sensor modules, processing board. The latter constitutes of STM32F107VC processor, a lightweight LwIP protocol stack based on it. By means of transplanting LwIP protocol stack into processer, we implemented a two-way data transmission system between serial data and Ethernet data in application layer. In our measurements, we choose different frame lengths from 100 to 500 bytes as variable, by comparisons, we find that transferring rate through Ethernet is superior to RS232\", \"RS485\", \"CAN bus from 100 bytes to 500 bytes which meets the design requirement.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132144159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Leach Communication Protocol for WSN","authors":"Fuzhe Zhao, You Xu, Ru Li, Wei Zhang","doi":"10.1109/ICCECT.2012.60","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.60","url":null,"abstract":"LEACH is a classical communication routing protocol designed for WSN to reduce the energy consumption of each sensor node. Based on the original LEACH protocol, we propose a new method of choosing cluster-heads which decreases unnecessary consumption of energy spent on computing of each node during each round. Because the traditional choosing formula neglecting to the change of nodes' energy will make the nodes acting as cluster-heads (CHs) too many times die early owing to consume too much energy. In order to make the energy distribute more even in the network, the consideration of the dynamic change of sensor nodes' energy will be introduced during the selection of CHs. Simulations show that our improved protocol performs better than the original LEACH.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131787406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Duffing-Lorenz Chaotic Algorithm and Its Application in Image Encryption","authors":"Jianming Liu, Huijing Lv","doi":"10.1109/ICCECT.2012.251","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.251","url":null,"abstract":"The Duffing and Lorenz chaotic algorithm proposed of today are too simple in structure and have inadequate parameters, so that they are not suitable for the encryption in cryptography. By mixing the Duffing chaotic algorithm with the Lorenz chaotic algorithm, a new six-dimensional chaotic cryptographic algorithm with a more complex structure is proposed. The Lyapunov exponent simulation shows that the new chaotic algorithm has strong chaotic features. It can be used in the image encryption after undergoing a newly designed dynamic mapping.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122943795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coexistence Study and Interference Analysis in LTE Networks","authors":"Tingting Cai, J. Deng","doi":"10.1109/ICCECT.2012.241","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.241","url":null,"abstract":"This paper studies the issue of adjacent channel coexistence interference between LTE systems. It mainly researches macro cell and micro cell/pico cell coexistence scenario in LTE systems, introduces in detail some key technology like Network topology, power control and the ACIR model. By using uncertainty analysis method or system level simulation method, we finally get additional isolation requirements of different interference link situations in different interference scenes, and in the end we give some effective measures and suggestions for avoiding adjacent channel interference in the network deployment.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127801699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Kinematics Analysis and Simulation on Formation-Based Space Net Dragging Process","authors":"Zhijie Gao, Dongfang Yang, Haibo Min, F. Sun","doi":"10.1109/ICCECT.2012.119","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.119","url":null,"abstract":"Formation-based space net capture is a novel mode for spacecraft capturing and docking. After the object is successfully captured by space net, the relative movement model is firstly established based on the orbit elements after the target has been captured. Then, main disturbance elements for the spacecraft in the process of space net dragging are analyzed in detail. Besides, numerical simulations are carried out, whose results show that the formation mode is an effective means for investigating the complex compounded body movement. Moreover, the movement law between spacecraft and its capture target is derived via simulation. It turns out that the target will surround the spacecraft around its orbit.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127874819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Chaotic Threshold Criterion Based on the Difference of Solution","authors":"Xuelian Liu, Chunyang Wang, Bo Xiao","doi":"10.1109/ICCECT.2012.107","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.107","url":null,"abstract":"In the processing of weak signal detection using chaotic oscillator, chaotic threshold criterion is always attention of experts at home and abroad. In this paper, according to Duffing equation's almost periodicity, a new threshold criterion method based on difference of chaotic system solution is proposed. For comparison between the method and phase plane method, these methods all can realize chaotic threshold criterion under the same conditions. Simulation results are presented to validate the proposed threshold criterion method. Furthermore, from the simulation results, it can be seen that the proposed method is simple algorithm, high accuracy, unaffected by human and outperforms the other methods.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121389948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Filled Function Method for Solving Variational Inequality Problems","authors":"Liuyang Yuan, Z. Wan, Jiawei Chen","doi":"10.1109/ICCECT.2012.91","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.91","url":null,"abstract":"In this paper a filled function method is suggested for solving finite dimensional variational inequality problems over sets defined by systems of equalities and inequalities. Firstly, based on the Karush-Kuhn-Tucker (KKT) conditions of the variational inequality problems, the original problem is converted into a corresponding constrained optimization problem. Subsequently, a new filled function with one parameter is proposed for solving the constrained optimization problem. Some properties of the filled function are studied and discussed. Finally, an algorithm based on the proposed filled function for solving variational inequality problems is presented. The implementation of the algorithm on several test problems is reported with numerical results.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117327314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Adaptive Kernel Bandwidth Mean-Shift Target Tracking Algorithm","authors":"Chang-you Wang, Haiqiang Zhang, Fu-ping Yang","doi":"10.1109/ICCECT.2012.264","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.264","url":null,"abstract":"As the traditional Mean-Shift tracking algorithm fix the bandwidth of kernel function\", \"it can not effectively track the target when the scale of tracking target has a distinct change. In response to this shortage, a target tracking algorithm which combines target detection and contour tracking with Mean- Shift tracking algorithm is proposed. It uses the contour information of the real-time for the tracking target and updates adaptability the kernel bandwidth of Mean-Shift tracking algorithm. Experimental results show that the improved algorithm has a good adaptability when the scale of the target change.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115220566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liang Shen, Yuanyuan Yang, Zhijia Wang, Xiaoxiao Zhang, J. Gu
{"title":"Design on Test Method of Network-Based Intrusion Detection System","authors":"Liang Shen, Yuanyuan Yang, Zhijia Wang, Xiaoxiao Zhang, J. Gu","doi":"10.1109/ICCECT.2012.198","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.198","url":null,"abstract":"Based on the research work of network-based intrusion detection system testing principles and conditions, this paper seeks the solution to unify practical research content and GA/T 403.1-2002 reasonably. Precisely, a more comprehensive and reasonable network-based intrusion detection system testing methodology as well as a complete testing work flow is proposed. Based on these foundations, design and realization of a testing tool is finished. As a result, the problems such as difficult to be tested and compared in the original testing project will be solved.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"57 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124483143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Comprehensive Evaluation Method Integrated by Delphi and GAHP in Optimal Siting of Electric Vehicle Charging Station","authors":"Yu Liu, Buxiang Zhou, Chao Feng, Shouwen Pu","doi":"10.1109/ICCECT.2012.42","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.42","url":null,"abstract":"The Analytic Hierarchy Process (AHP)'s judgment matrix is used to quantify a variety of qualitative factors. Combined with the original quantitative information, the integrated decision will be made. This article uses the Delphi to solve the personal one-sidedness problem of expert judgments. The Grey Analytic Hierarchy Process (GAHP) is made up of AHP and grey statistics decision which can handle the uncertain grey factor. Delphi and GAHP are used to form a new comprehensive evaluation method. This new method is applied to make up the comprehensive evaluation index system of electric vehicle charging station hail and define indicators' weights. Based on this, the rationality comprehensive evaluation value of each optional hail will be defined and provide the basis for optimal decision of charging station locating. A practical example proves that this method has good practicability.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121998547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}