2012 International Conference on Control Engineering and Communication Technology最新文献

筛选
英文 中文
Research on Marine Data Collection and Transmission System Based on Lwip Protocol 基于Lwip协议的海洋数据采集与传输系统研究
Hui Wang, Wenyu Cai
{"title":"Research on Marine Data Collection and Transmission System Based on Lwip Protocol","authors":"Hui Wang, Wenyu Cai","doi":"10.1109/ICCECT.2012.203","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.203","url":null,"abstract":"Due to the status quo that serial data transmission capacity cannot meet the demand of marine environment real-time detection in the marine data acquisition system. This paper designs and implements a faster Ethernet data transmission system, which can be connected with each other by Interconnection device. For the system based on single node, it consists of sensor modules, processing board. The latter constitutes of STM32F107VC processor, a lightweight LwIP protocol stack based on it. By means of transplanting LwIP protocol stack into processer, we implemented a two-way data transmission system between serial data and Ethernet data in application layer. In our measurements, we choose different frame lengths from 100 to 500 bytes as variable, by comparisons, we find that transferring rate through Ethernet is superior to RS232\", \"RS485\", \"CAN bus from 100 bytes to 500 bytes which meets the design requirement.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132144159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improved Leach Communication Protocol for WSN 改进的WSN浸出通信协议
Fuzhe Zhao, You Xu, Ru Li, Wei Zhang
{"title":"Improved Leach Communication Protocol for WSN","authors":"Fuzhe Zhao, You Xu, Ru Li, Wei Zhang","doi":"10.1109/ICCECT.2012.60","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.60","url":null,"abstract":"LEACH is a classical communication routing protocol designed for WSN to reduce the energy consumption of each sensor node. Based on the original LEACH protocol, we propose a new method of choosing cluster-heads which decreases unnecessary consumption of energy spent on computing of each node during each round. Because the traditional choosing formula neglecting to the change of nodes' energy will make the nodes acting as cluster-heads (CHs) too many times die early owing to consume too much energy. In order to make the energy distribute more even in the network, the consideration of the dynamic change of sensor nodes' energy will be introduced during the selection of CHs. Simulations show that our improved protocol performs better than the original LEACH.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131787406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
A New Duffing-Lorenz Chaotic Algorithm and Its Application in Image Encryption 一种新的Duffing-Lorenz混沌算法及其在图像加密中的应用
Jianming Liu, Huijing Lv
{"title":"A New Duffing-Lorenz Chaotic Algorithm and Its Application in Image Encryption","authors":"Jianming Liu, Huijing Lv","doi":"10.1109/ICCECT.2012.251","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.251","url":null,"abstract":"The Duffing and Lorenz chaotic algorithm proposed of today are too simple in structure and have inadequate parameters, so that they are not suitable for the encryption in cryptography. By mixing the Duffing chaotic algorithm with the Lorenz chaotic algorithm, a new six-dimensional chaotic cryptographic algorithm with a more complex structure is proposed. The Lyapunov exponent simulation shows that the new chaotic algorithm has strong chaotic features. It can be used in the image encryption after undergoing a newly designed dynamic mapping.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122943795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Coexistence Study and Interference Analysis in LTE Networks LTE网络的共存研究与干扰分析
Tingting Cai, J. Deng
{"title":"Coexistence Study and Interference Analysis in LTE Networks","authors":"Tingting Cai, J. Deng","doi":"10.1109/ICCECT.2012.241","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.241","url":null,"abstract":"This paper studies the issue of adjacent channel coexistence interference between LTE systems. It mainly researches macro cell and micro cell/pico cell coexistence scenario in LTE systems, introduces in detail some key technology like Network topology, power control and the ACIR model. By using uncertainty analysis method or system level simulation method, we finally get additional isolation requirements of different interference link situations in different interference scenes, and in the end we give some effective measures and suggestions for avoiding adjacent channel interference in the network deployment.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127801699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Kinematics Analysis and Simulation on Formation-Based Space Net Dragging Process 基于地层的空间网拖拽过程运动学分析与仿真
Zhijie Gao, Dongfang Yang, Haibo Min, F. Sun
{"title":"Kinematics Analysis and Simulation on Formation-Based Space Net Dragging Process","authors":"Zhijie Gao, Dongfang Yang, Haibo Min, F. Sun","doi":"10.1109/ICCECT.2012.119","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.119","url":null,"abstract":"Formation-based space net capture is a novel mode for spacecraft capturing and docking. After the object is successfully captured by space net, the relative movement model is firstly established based on the orbit elements after the target has been captured. Then, main disturbance elements for the spacecraft in the process of space net dragging are analyzed in detail. Besides, numerical simulations are carried out, whose results show that the formation mode is an effective means for investigating the complex compounded body movement. Moreover, the movement law between spacecraft and its capture target is derived via simulation. It turns out that the target will surround the spacecraft around its orbit.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127874819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Chaotic Threshold Criterion Based on the Difference of Solution
Xuelian Liu, Chunyang Wang, Bo Xiao
{"title":"Research on Chaotic Threshold Criterion Based on the Difference of Solution","authors":"Xuelian Liu, Chunyang Wang, Bo Xiao","doi":"10.1109/ICCECT.2012.107","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.107","url":null,"abstract":"In the processing of weak signal detection using chaotic oscillator, chaotic threshold criterion is always attention of experts at home and abroad. In this paper, according to Duffing equation's almost periodicity, a new threshold criterion method based on difference of chaotic system solution is proposed. For comparison between the method and phase plane method, these methods all can realize chaotic threshold criterion under the same conditions. Simulation results are presented to validate the proposed threshold criterion method. Furthermore, from the simulation results, it can be seen that the proposed method is simple algorithm, high accuracy, unaffected by human and outperforms the other methods.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121389948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Filled Function Method for Solving Variational Inequality Problems 求解变分不等式问题的填充函数法
Liuyang Yuan, Z. Wan, Jiawei Chen
{"title":"A Filled Function Method for Solving Variational Inequality Problems","authors":"Liuyang Yuan, Z. Wan, Jiawei Chen","doi":"10.1109/ICCECT.2012.91","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.91","url":null,"abstract":"In this paper a filled function method is suggested for solving finite dimensional variational inequality problems over sets defined by systems of equalities and inequalities. Firstly, based on the Karush-Kuhn-Tucker (KKT) conditions of the variational inequality problems, the original problem is converted into a corresponding constrained optimization problem. Subsequently, a new filled function with one parameter is proposed for solving the constrained optimization problem. Some properties of the filled function are studied and discussed. Finally, an algorithm based on the proposed filled function for solving variational inequality problems is presented. The implementation of the algorithm on several test problems is reported with numerical results.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117327314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Adaptive Kernel Bandwidth Mean-Shift Target Tracking Algorithm 一种自适应核带宽均值偏移目标跟踪算法
Chang-you Wang, Haiqiang Zhang, Fu-ping Yang
{"title":"An Adaptive Kernel Bandwidth Mean-Shift Target Tracking Algorithm","authors":"Chang-you Wang, Haiqiang Zhang, Fu-ping Yang","doi":"10.1109/ICCECT.2012.264","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.264","url":null,"abstract":"As the traditional Mean-Shift tracking algorithm fix the bandwidth of kernel function\", \"it can not effectively track the target when the scale of tracking target has a distinct change. In response to this shortage, a target tracking algorithm which combines target detection and contour tracking with Mean- Shift tracking algorithm is proposed. It uses the contour information of the real-time for the tracking target and updates adaptability the kernel bandwidth of Mean-Shift tracking algorithm. Experimental results show that the improved algorithm has a good adaptability when the scale of the target change.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115220566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design on Test Method of Network-Based Intrusion Detection System 基于网络的入侵检测系统测试方法设计
Liang Shen, Yuanyuan Yang, Zhijia Wang, Xiaoxiao Zhang, J. Gu
{"title":"Design on Test Method of Network-Based Intrusion Detection System","authors":"Liang Shen, Yuanyuan Yang, Zhijia Wang, Xiaoxiao Zhang, J. Gu","doi":"10.1109/ICCECT.2012.198","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.198","url":null,"abstract":"Based on the research work of network-based intrusion detection system testing principles and conditions, this paper seeks the solution to unify practical research content and GA/T 403.1-2002 reasonably. Precisely, a more comprehensive and reasonable network-based intrusion detection system testing methodology as well as a complete testing work flow is proposed. Based on these foundations, design and realization of a testing tool is finished. As a result, the problems such as difficult to be tested and compared in the original testing project will be solved.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"57 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124483143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of Comprehensive Evaluation Method Integrated by Delphi and GAHP in Optimal Siting of Electric Vehicle Charging Station 德尔菲与GAHP相结合的综合评价方法在电动汽车充电站优化选址中的应用
Yu Liu, Buxiang Zhou, Chao Feng, Shouwen Pu
{"title":"Application of Comprehensive Evaluation Method Integrated by Delphi and GAHP in Optimal Siting of Electric Vehicle Charging Station","authors":"Yu Liu, Buxiang Zhou, Chao Feng, Shouwen Pu","doi":"10.1109/ICCECT.2012.42","DOIUrl":"https://doi.org/10.1109/ICCECT.2012.42","url":null,"abstract":"The Analytic Hierarchy Process (AHP)'s judgment matrix is used to quantify a variety of qualitative factors. Combined with the original quantitative information, the integrated decision will be made. This article uses the Delphi to solve the personal one-sidedness problem of expert judgments. The Grey Analytic Hierarchy Process (GAHP) is made up of AHP and grey statistics decision which can handle the uncertain grey factor. Delphi and GAHP are used to form a new comprehensive evaluation method. This new method is applied to make up the comprehensive evaluation index system of electric vehicle charging station hail and define indicators' weights. Based on this, the rationality comprehensive evaluation value of each optional hail will be defined and provide the basis for optimal decision of charging station locating. A practical example proves that this method has good practicability.","PeriodicalId":153613,"journal":{"name":"2012 International Conference on Control Engineering and Communication Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121998547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信