IEEE Conference Anthology最新文献

筛选
英文 中文
Robust stability of vehicles formations with time delays and uncertainties 具有时滞和不确定性的车辆编队鲁棒稳定性
IEEE Conference Anthology Pub Date : 1900-01-01 DOI: 10.1109/ANTHOLOGY.2013.6784838
Xiangshun Li, Hua-jing Fang
{"title":"Robust stability of vehicles formations with time delays and uncertainties","authors":"Xiangshun Li, Hua-jing Fang","doi":"10.1109/ANTHOLOGY.2013.6784838","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784838","url":null,"abstract":"This paper deals with the problem of stability for vehicles formations system with structured uncertainties and time delays. The vehicles are modeled as general linear continuous-time systems which exchange information according to an undirected communication graph. The feedback control is based only on relative information about vehicle states shared via the communication links. Delay-dependent robust stability of vehicles formations system with uncertainties is analyzed. The sufficient conditions for asymptotical stability are proposed. The analysis framework is based on tools from algebraic graph theory, matrix theory, control theory and linear inequality matrix theory. Finally, an illustrative example is used to show the validity of the theoretical results.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134496322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Passive satellite localization using TDOA/FDOA/AOA measurements 利用TDOA/FDOA/AOA测量的无源卫星定位
IEEE Conference Anthology Pub Date : 1900-01-01 DOI: 10.1109/ANTHOLOGY.2013.6784815
Y. Bin, Wang Lei, Chen Pei Qun, Lu An Nan
{"title":"Passive satellite localization using TDOA/FDOA/AOA measurements","authors":"Y. Bin, Wang Lei, Chen Pei Qun, Lu An Nan","doi":"10.1109/ANTHOLOGY.2013.6784815","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784815","url":null,"abstract":"Dual satellite TDOA/FDOA localization scheme has problems of multiple ambiguous solutions and poor localization results in the sub-satellite area along the dual satellite baseline direction. Passive localization using TDOA and FDOA measurements usually does not have direct solution and requires numerical methods to determine the emitter's geolocation. We suggest a satellite passive localization method fusing the TDOA/FDOA/AOA measurements based on particle swarm optimization(PSO), which provides an evolutionary computation method to solve the nonlinear optimal problem. To be more close to the practical use, the WGS-84 earth model is adopted in this work. However, PSO can not be directly applied to geolocation problem due to the nonlinear constraint of earth surface. We examined a PSO based method which let the particle swarm fly on the earth surface. Computer simulation results show the effectiveness of the new localization method.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127397483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Convergence analysis of an adaptive algorithm for identifying errors-in-variables systems 变量误差系统自适应辨识算法的收敛性分析
IEEE Conference Anthology Pub Date : 1900-01-01 DOI: 10.1109/ANTHOLOGY.2013.6784768
Dan Fan, G. Luo
{"title":"Convergence analysis of an adaptive algorithm for identifying errors-in-variables systems","authors":"Dan Fan, G. Luo","doi":"10.1109/ANTHOLOGY.2013.6784768","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784768","url":null,"abstract":"Dynamic errors-in-variables (EIV) systems, in which both the output and the input variables are corrupted by noises, are widely used in signal processing, communications, and control engineering. Although a number of different methods for identifying dynamic EIV systems have been proposed, the theoretical analysis of their properties has always been a difficult problem. This paper presents the convergence analysis of an adaptive EIV identification algorithm with no input restrictions. The methods of analysis currently available in literature often assume the input signals to be AR or ARMA process and persistent excitation. This restriction is removed for attenuating excitation in this paper. The convergence rate is derived and it is shown that the adaptive estimation can converge fast to the true system parameters values. Numerical simulations is conducted to demonstrate the theoretical analysis.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115198023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective allocation of casualties to hospitals in mass casualty incidents 在大规模伤亡事故中,有效分配伤亡者到医院
IEEE Conference Anthology Pub Date : 1900-01-01 DOI: 10.1109/ANTHOLOGY.2013.6785032
Duncan T. Wilson, G. Hawe, G. Coates, R. Crouch
{"title":"Effective allocation of casualties to hospitals in mass casualty incidents","authors":"Duncan T. Wilson, G. Hawe, G. Coates, R. Crouch","doi":"10.1109/ANTHOLOGY.2013.6785032","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6785032","url":null,"abstract":"The effective allocation of casualties amongst hospitals represents a crucial element of the response to any mass casualty incident. We propose a mathematical model to assist in achieving such a distribution by providing a means to evaluate and compare any proposed allocations. The model incorporates factors identified in the emergency medicine literature as of particular importance, including the availability of specialist treatment facilities and the dynamic nature of hospital capacity. The proposed model's application is demonstrated via a hypothetical mass casualty incident.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115918662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modeling and quantitative real-time analysis of Ethernet based on CSMA/CD 基于CSMA/CD的以太网建模与定量实时分析
IEEE Conference Anthology Pub Date : 1900-01-01 DOI: 10.1109/ANTHOLOGY.2013.6784965
Xia Jiqiang, Cao Quan, Bai Ronggang
{"title":"Modeling and quantitative real-time analysis of Ethernet based on CSMA/CD","authors":"Xia Jiqiang, Cao Quan, Bai Ronggang","doi":"10.1109/ANTHOLOGY.2013.6784965","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784965","url":null,"abstract":"The communication delay uncertainty of Ethernet has become a major obstacle in application on industrial control. To solve the problem, it's very important to exactly model and carry out quantitative research on the real-time performance of Ethernet. This paper proposes a new solution to accomplish the modeling of Ethernet based on CSMA/CD media access method and Binary Exponential Back-up algorithm, especially giving the accurate calculation formula of the net collisions adopting the multiple integrals method. On the basis of this model, some evaluation indexes including collision probability, failure probability and average time for a failure are selected to complete the quantitative analysis on Ethernet with different number of stations. Moreover, the paper comparatively studies the influence of the different network parameters on the Ethernet real-time performance. Finally, the correctness of the mathematical model is verified by the MATLAB simulation.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114885019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Capability requirement planning of Weapon System-of-systems based on Interval Weighted Constraint Network 基于区间加权约束网络的武器系统的能力需求规划
IEEE Conference Anthology Pub Date : 1900-01-01 DOI: 10.1109/ANTHOLOGY.2013.6785026
Yajie Dou, Long Li, Yingwu Chen, Kewei Yang
{"title":"Capability requirement planning of Weapon System-of-systems based on Interval Weighted Constraint Network","authors":"Yajie Dou, Long Li, Yingwu Chen, Kewei Yang","doi":"10.1109/ANTHOLOGY.2013.6785026","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6785026","url":null,"abstract":"Capability-Based requirements management and planning thoughts and methods have gone increasingly deep into the development of Weapon System-of-Systems (WSoS). In the traditional top-to-bottom capability requirement planning (CRP) methods, the constraints among different capabilities indexes acquired from the tasks decomposition are neglected, which leads to the irrationalities and conflicts between different WSoS capability requirement indexes. Based on the analysis and description of capability requirements planning problem, the constraints are divided into five types and extracted from WSoS according multiple views thoughts. In addition, Interval Weighted Constraint Network (IWCN) is introduced and a consistency detection algorithm and a conflicts elimination strategy are proposed to achieve a capabilities requirement plan satisfying the tasks requirements and the capabilities indexes constraints. Finally, the practical applicability within a Joint Operations System of Systems (JOSoS) based on the space force capability requirement scheme planning is demonstrated, which proves the validation of the method built in this study.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117349745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel malware variants detection method based On function-call graph 一种基于函数调用图的恶意软件变体检测方法
IEEE Conference Anthology Pub Date : 1900-01-01 DOI: 10.1109/ANTHOLOGY.2013.6784887
Lingfei Wu, Ming Xu, Jian Xu, Ning Zheng, Haiping Zhang
{"title":"A novel malware variants detection method based On function-call graph","authors":"Lingfei Wu, Ming Xu, Jian Xu, Ning Zheng, Haiping Zhang","doi":"10.1109/ANTHOLOGY.2013.6784887","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784887","url":null,"abstract":"Code obfuscation plays a significant role in metamorphic malware. Moreover, identifying a metamorphic malware variant is a challenge task, because its obfuscation engine can easily generate various variants with different forms while maintaining the same functionality to escape detection. This paper presents a novel approach to recognize metamorphic malware based on programs' function-call graphs. Graph-coloring and cosine similarity techniques are used to measure the similarity of two programs on the basis of function-call graph. Experimental results have shown that the proposed method can accurately detect the metamorphic malware variants.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123501573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Relationship between individual emergency ability and accident 个人应急能力与事故的关系
IEEE Conference Anthology Pub Date : 1900-01-01 DOI: 10.1109/ANTHOLOGY.2013.6785048
Jiangshi Zhang, He Panpan, Tao Jia, N. Shengli
{"title":"Relationship between individual emergency ability and accident","authors":"Jiangshi Zhang, He Panpan, Tao Jia, N. Shengli","doi":"10.1109/ANTHOLOGY.2013.6785048","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6785048","url":null,"abstract":"The deficiency of individual safety behavior ability is an important cause of accidents but related researches are not enough to prove it. This paper carried out experiments in a certain coal mine, sampling 134 miners, completing the scale evaluation, semi-structure interview, spatial perception evaluation, sound and light response ability evaluation and motion stability evaluation, and finally analyzed the data by spss17.0. Through the experiments, the basic data on miners' above behavior ability is established. The data shows there is a correlation between individual spatial perception, sound and light response and behavior, injur & risk; the higher the individual safety behavior ability is, the more the safety behavior and the better the safety situation. Enterprises should pay attention to the evaluation of individual safety behavior ability, scientifically select and equip staff to realize “pre-control before the accident”. Abased on this, a primary norm of individual safety behavior ability is established and realizes selecting parts of employees weaker in individual safety behavior ability.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126181781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The transistor-level fault-tolerant design under changeful temperatures 多变温度下晶体管级容错设计
IEEE Conference Anthology Pub Date : 1900-01-01 DOI: 10.1109/ANTHOLOGY.2013.6784863
Kui Zou, Jingsong He
{"title":"The transistor-level fault-tolerant design under changeful temperatures","authors":"Kui Zou, Jingsong He","doi":"10.1109/ANTHOLOGY.2013.6784863","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784863","url":null,"abstract":"In the real-world applications, many environment factors are unknown. Temperature is a considerable one of those factors because electronic systems' performance can be significantly influenced by their working temperatures. Nowadays, existing researches on the robustness of the system are mainly focusing on extreme temperatures. However, for many real applications, the working temperatures could be variable. So it is significant to consider the system's stability at unknown temperatures. This paper provides an algorithm to evolve gate-logic circuit which has better fault-tolerant performance under changeful temperatures. The diversifying strategy and fault-tolerant evaluating strategy are introduced. Experimental results demonstrate that, the NOT gate provided by this paper can work normal in a largest temperature range from −200°C to 200°C. Meanwhile, we can infer from the random temperature experiment that, the proposed circuit has better performance compared to conventional NOT gate.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129510108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Teaching analysis based on association rule mining 基于关联规则挖掘的教学分析
IEEE Conference Anthology Pub Date : 1900-01-01 DOI: 10.1109/ANTHOLOGY.2013.6784997
Chen Weiyu, Jianan
{"title":"Teaching analysis based on association rule mining","authors":"Chen Weiyu, Jianan","doi":"10.1109/ANTHOLOGY.2013.6784997","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784997","url":null,"abstract":"Association rule in data mining could found interesting link between a large amounts of data set. Using the improved Apriori algorithm on analyzing the grades of students' course, which revealed the relationship and influence on learning effect during each chapter, distinguish the key factors that affect their achievement. After that we can conclude valuable information to provide guidance for improving teaching and learning effectiveness.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129714919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信