{"title":"Robust stability of vehicles formations with time delays and uncertainties","authors":"Xiangshun Li, Hua-jing Fang","doi":"10.1109/ANTHOLOGY.2013.6784838","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784838","url":null,"abstract":"This paper deals with the problem of stability for vehicles formations system with structured uncertainties and time delays. The vehicles are modeled as general linear continuous-time systems which exchange information according to an undirected communication graph. The feedback control is based only on relative information about vehicle states shared via the communication links. Delay-dependent robust stability of vehicles formations system with uncertainties is analyzed. The sufficient conditions for asymptotical stability are proposed. The analysis framework is based on tools from algebraic graph theory, matrix theory, control theory and linear inequality matrix theory. Finally, an illustrative example is used to show the validity of the theoretical results.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134496322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Passive satellite localization using TDOA/FDOA/AOA measurements","authors":"Y. Bin, Wang Lei, Chen Pei Qun, Lu An Nan","doi":"10.1109/ANTHOLOGY.2013.6784815","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784815","url":null,"abstract":"Dual satellite TDOA/FDOA localization scheme has problems of multiple ambiguous solutions and poor localization results in the sub-satellite area along the dual satellite baseline direction. Passive localization using TDOA and FDOA measurements usually does not have direct solution and requires numerical methods to determine the emitter's geolocation. We suggest a satellite passive localization method fusing the TDOA/FDOA/AOA measurements based on particle swarm optimization(PSO), which provides an evolutionary computation method to solve the nonlinear optimal problem. To be more close to the practical use, the WGS-84 earth model is adopted in this work. However, PSO can not be directly applied to geolocation problem due to the nonlinear constraint of earth surface. We examined a PSO based method which let the particle swarm fly on the earth surface. Computer simulation results show the effectiveness of the new localization method.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127397483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Convergence analysis of an adaptive algorithm for identifying errors-in-variables systems","authors":"Dan Fan, G. Luo","doi":"10.1109/ANTHOLOGY.2013.6784768","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784768","url":null,"abstract":"Dynamic errors-in-variables (EIV) systems, in which both the output and the input variables are corrupted by noises, are widely used in signal processing, communications, and control engineering. Although a number of different methods for identifying dynamic EIV systems have been proposed, the theoretical analysis of their properties has always been a difficult problem. This paper presents the convergence analysis of an adaptive EIV identification algorithm with no input restrictions. The methods of analysis currently available in literature often assume the input signals to be AR or ARMA process and persistent excitation. This restriction is removed for attenuating excitation in this paper. The convergence rate is derived and it is shown that the adaptive estimation can converge fast to the true system parameters values. Numerical simulations is conducted to demonstrate the theoretical analysis.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115198023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective allocation of casualties to hospitals in mass casualty incidents","authors":"Duncan T. Wilson, G. Hawe, G. Coates, R. Crouch","doi":"10.1109/ANTHOLOGY.2013.6785032","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6785032","url":null,"abstract":"The effective allocation of casualties amongst hospitals represents a crucial element of the response to any mass casualty incident. We propose a mathematical model to assist in achieving such a distribution by providing a means to evaluate and compare any proposed allocations. The model incorporates factors identified in the emergency medicine literature as of particular importance, including the availability of specialist treatment facilities and the dynamic nature of hospital capacity. The proposed model's application is demonstrated via a hypothetical mass casualty incident.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115918662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and quantitative real-time analysis of Ethernet based on CSMA/CD","authors":"Xia Jiqiang, Cao Quan, Bai Ronggang","doi":"10.1109/ANTHOLOGY.2013.6784965","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784965","url":null,"abstract":"The communication delay uncertainty of Ethernet has become a major obstacle in application on industrial control. To solve the problem, it's very important to exactly model and carry out quantitative research on the real-time performance of Ethernet. This paper proposes a new solution to accomplish the modeling of Ethernet based on CSMA/CD media access method and Binary Exponential Back-up algorithm, especially giving the accurate calculation formula of the net collisions adopting the multiple integrals method. On the basis of this model, some evaluation indexes including collision probability, failure probability and average time for a failure are selected to complete the quantitative analysis on Ethernet with different number of stations. Moreover, the paper comparatively studies the influence of the different network parameters on the Ethernet real-time performance. Finally, the correctness of the mathematical model is verified by the MATLAB simulation.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114885019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capability requirement planning of Weapon System-of-systems based on Interval Weighted Constraint Network","authors":"Yajie Dou, Long Li, Yingwu Chen, Kewei Yang","doi":"10.1109/ANTHOLOGY.2013.6785026","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6785026","url":null,"abstract":"Capability-Based requirements management and planning thoughts and methods have gone increasingly deep into the development of Weapon System-of-Systems (WSoS). In the traditional top-to-bottom capability requirement planning (CRP) methods, the constraints among different capabilities indexes acquired from the tasks decomposition are neglected, which leads to the irrationalities and conflicts between different WSoS capability requirement indexes. Based on the analysis and description of capability requirements planning problem, the constraints are divided into five types and extracted from WSoS according multiple views thoughts. In addition, Interval Weighted Constraint Network (IWCN) is introduced and a consistency detection algorithm and a conflicts elimination strategy are proposed to achieve a capabilities requirement plan satisfying the tasks requirements and the capabilities indexes constraints. Finally, the practical applicability within a Joint Operations System of Systems (JOSoS) based on the space force capability requirement scheme planning is demonstrated, which proves the validation of the method built in this study.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117349745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lingfei Wu, Ming Xu, Jian Xu, Ning Zheng, Haiping Zhang
{"title":"A novel malware variants detection method based On function-call graph","authors":"Lingfei Wu, Ming Xu, Jian Xu, Ning Zheng, Haiping Zhang","doi":"10.1109/ANTHOLOGY.2013.6784887","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784887","url":null,"abstract":"Code obfuscation plays a significant role in metamorphic malware. Moreover, identifying a metamorphic malware variant is a challenge task, because its obfuscation engine can easily generate various variants with different forms while maintaining the same functionality to escape detection. This paper presents a novel approach to recognize metamorphic malware based on programs' function-call graphs. Graph-coloring and cosine similarity techniques are used to measure the similarity of two programs on the basis of function-call graph. Experimental results have shown that the proposed method can accurately detect the metamorphic malware variants.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123501573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Relationship between individual emergency ability and accident","authors":"Jiangshi Zhang, He Panpan, Tao Jia, N. Shengli","doi":"10.1109/ANTHOLOGY.2013.6785048","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6785048","url":null,"abstract":"The deficiency of individual safety behavior ability is an important cause of accidents but related researches are not enough to prove it. This paper carried out experiments in a certain coal mine, sampling 134 miners, completing the scale evaluation, semi-structure interview, spatial perception evaluation, sound and light response ability evaluation and motion stability evaluation, and finally analyzed the data by spss17.0. Through the experiments, the basic data on miners' above behavior ability is established. The data shows there is a correlation between individual spatial perception, sound and light response and behavior, injur & risk; the higher the individual safety behavior ability is, the more the safety behavior and the better the safety situation. Enterprises should pay attention to the evaluation of individual safety behavior ability, scientifically select and equip staff to realize “pre-control before the accident”. Abased on this, a primary norm of individual safety behavior ability is established and realizes selecting parts of employees weaker in individual safety behavior ability.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126181781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The transistor-level fault-tolerant design under changeful temperatures","authors":"Kui Zou, Jingsong He","doi":"10.1109/ANTHOLOGY.2013.6784863","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784863","url":null,"abstract":"In the real-world applications, many environment factors are unknown. Temperature is a considerable one of those factors because electronic systems' performance can be significantly influenced by their working temperatures. Nowadays, existing researches on the robustness of the system are mainly focusing on extreme temperatures. However, for many real applications, the working temperatures could be variable. So it is significant to consider the system's stability at unknown temperatures. This paper provides an algorithm to evolve gate-logic circuit which has better fault-tolerant performance under changeful temperatures. The diversifying strategy and fault-tolerant evaluating strategy are introduced. Experimental results demonstrate that, the NOT gate provided by this paper can work normal in a largest temperature range from −200°C to 200°C. Meanwhile, we can infer from the random temperature experiment that, the proposed circuit has better performance compared to conventional NOT gate.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129510108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Teaching analysis based on association rule mining","authors":"Chen Weiyu, Jianan","doi":"10.1109/ANTHOLOGY.2013.6784997","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784997","url":null,"abstract":"Association rule in data mining could found interesting link between a large amounts of data set. Using the improved Apriori algorithm on analyzing the grades of students' course, which revealed the relationship and influence on learning effect during each chapter, distinguish the key factors that affect their achievement. After that we can conclude valuable information to provide guidance for improving teaching and learning effectiveness.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129714919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}