{"title":"An Adaptive Grid Division algorithm for target location in wireless sensor networks","authors":"Guoming Tang, Yi Xie, Daquan Tang, Jiuyang Tang","doi":"10.1109/ANTHOLOGY.2013.6784741","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784741","url":null,"abstract":"Target location and tracking have been an important fundamental technology in wireless sensor networks. Distance irrelevant location algorithm is one of the most popular methods in target location application. This kind of algorithm mostly locates the target by getting the target approximate area and calculating its centroid. Because of the large calculating quantity and bad real-time capability of the traditional methods in solving the centroid of irregular approximate area, a universal Adaptive grId Division (AID) method was proposed. By grid dividing and scanning towards the WSNs deploying area, a target approximate area was got and the location precision was adaptively adjusted according to the grid granularity. The results of experiment show that AID has a higher real-time capability under similar precision with traditional methods.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132263452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk of failures induced by deferred maintenance for a component under inspection policy","authors":"Gu Hongqiang, Jianmin Zhao","doi":"10.1109/ANTHOLOGY.2013.6785059","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6785059","url":null,"abstract":"In this paper, an analytical model is developed for evaluating the risk of deferred repair under an inspection policy. The models of failures and risk evaluation are developed using probability, stochastic process and the delay time concept. The cases of perfect inspection and imperfect inspection are considered respectively. The performance of the proposed model is illustrated by an example, and the effect of time delay of repair on the risk is analysed.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123276356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The applicability of network management systems in small businesses","authors":"B. Thornton, ChengCheng Li","doi":"10.1109/ANTHOLOGY.2013.6784999","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784999","url":null,"abstract":"This paper looks at some of the common maintenance tasks required by industry regulations such as PCI-DSS and state and federal regulators and evaluates the applicability of network management systems in complying with these requirements. The sample network tested includes 10 Windows servers, 30 Windows workstations, and 10 additional network elements from various vendors. Network management offerings from Spiceworks, ManageEngine, and GFI are tested and evaluated.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122448758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of indexing techniques for GIS spatial data","authors":"Li Wei, Xu Yuhan, Xu Xuerong","doi":"10.1109/ANTHOLOGY.2013.6784989","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784989","url":null,"abstract":"With the rapid development of computer technology, the application of GIS is increasingly widespread. Those GIS data which need to be processed become larger. So it's more and more important for high-speed and efficient query on the data. Spatial index is the vital technique for improving storage efficiency and affecting spatial retrieve performance of spatial data. This paper focuses on the technology of the spatial index in the hashing and quadtree-based.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126620016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Abnormality analysis for densely-populated public places based on Bayesian inference forecasting","authors":"Q. Ma, Chao Qi","doi":"10.1109/ANTHOLOGY.2013.6785017","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6785017","url":null,"abstract":"Gathering is an important sign of social security event in public places. Timely detection of abnormal gathering contributes to effective warning, thereby avoiding the occurrence of serious events. In this paper, we identify abnormal situation according to a reasonable safe range based on people flow characteristics of public places. We employ Bayesian inference forecasting approach to cope with emergency forecasting and early warning.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126926005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on a method for analysis of ship traffic density in harbor water area based on GIS","authors":"F. Zhu, L. Lei","doi":"10.1109/ANTHOLOGY.2013.6785051","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6785051","url":null,"abstract":"To some extent, ship traffic density reflects the busy degree and risk degree of the vessel traffic water. Allegedly, the number of ship collision accidents is directly proportional to the quadratic of ship traffic density. Therefore, how to find out the crowded area with high ship traffic density in the port waters and to focus on monitoring ship and to optimize marine traffic flow, which are the urgent problems for the maritime safety administration. Based on analyzing the concept of ship traffic density and distribution of ship traffic density in marine traffic engineering, combining the advantages of spatial analysis in GIS(Geographic Information System) and the application of marine traffic engineering, this paper proposes a high-efficiency computing method of ship traffic density distribution in harbor water area based on GIS developer kit. A prototype experiment system for computing ship traffic density was built and applied to a harbor water area. The result indicates that this proposed method is feasible and efficient.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"33 42","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114088314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient process model for distributed software application developments","authors":"Jing-Chiou Liou","doi":"10.1109/ANTHOLOGY.2013.6784913","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784913","url":null,"abstract":"One of the problems we face today for software development is how we can comply with the speed of change in the business environment. To address the issue, we present a new paradigm called Progressive Development Model that gradually releases the software components according to the current business needs. In this paper, we also present a design pattern of software architecture optimized for Progress Development Model. Under the design pattern, system functionalities are identified into two components: Core and user functions. With a standardized interface called AIL, staged user functions can be attached onto the core without breaking or deforming the overall architecture. The development model is especially suitable for the distributed software applications development that is getting its popularity recently.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115975996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on detection of small-sized range-spread target by using chaotic Duffing oscillator","authors":"Xiaoying Deng, Haibo Liu, Li Wang, T. Liu","doi":"10.1109/ANTHOLOGY.2013.6784845","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784845","url":null,"abstract":"A chaotic detection scheme for a small-sized range-spread target in white Gaussian noise is developed. The basic idea is that a chaotic oscillator system is less influenced by noise, but it is very sensitive to periodic or pseudo-periodic signals. Firstly we concatenate the echoes with the same interested range cells from three successive pulses transmitted by high resolution radar end to end into a time series. The time series has certain pseudo-periodicity. Then the pseudo-periodic signal generated artificially is introduced into a Duffing oscillator system which is in the critical chaotic phase state. By adjusting the intensity of the noisy signal according to the estimated noise power, the false alarm ratio can be kept within an acceptable range. Then we determine the presence or absence of a target by judging the negative or positive maximal Lyapunove exponent of the Duffing equation. The Monte Carlo simulations for a small-sized range-spread target show that the proposed method significantly outperforms the traditional integrator detector and can improve about 2–5 dB in signal-to-noise ratio performance versus the integrator.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"446 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124989317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Urgency evaluation of emergency demand in emergency logistics operation based on FAHP","authors":"Daqiang Chen, Yanan Fang","doi":"10.1109/ANTHOLOGY.2013.6785075","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6785075","url":null,"abstract":"This paper focused on urgency evaluation of emergency demand in emergency logistics operation. Based on researches on key problems in emergency demand of material in disaster relief operation, an urgency evaluation index system of emergency demand was discussed and analyzed with the idea of information matching between demand and supply. Given the uncertainty, subjectivity and ambiguity of human knowledge in the index system, a fuzzy analytic hierarchy process (FAHP) was applied to accommodate the inherent uncertainty, and the urgency of emergency demand were calculated. Finally, a numerical example illustrating the application of this method to the urgency and ranking of emergency demand in logistic operation was given.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125243599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Testing substitutability based on WSDL","authors":"Wei Liu, Yong Yang, Liang Zhang","doi":"10.1109/ANTHOLOGY.2013.6784849","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784849","url":null,"abstract":"Composition plays a cornerstone role for SOC in constructing applications, in which each component is a service with its exposing interface in WSDL. One overlooked potential downside to SOC is the high possibility of component service failure. Even a single component goes down, the whole application could wreak havoc. To prevent an application from such disaster, it would be best to exploit plenty services on the Internet to substitute the defective component. However, the simple idea results in a lot of challenges, such as how to rescue the application via service substitution, how to guarantee the compatibility after the replacement with rest components, and how to realize the substitution based on limited information of WSDLs. In this paper, we provide a solution to meet all above challenges. It consists of a formalism to test the substitutability, a mechanism to fulfil the judgement and a implemented tool.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122409800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}