{"title":"Research on Improved RAIM Algorithm Based on Parity Vector Method","authors":"Kejin Cao, Yanfeng Hu, Jiang-ning Xu, Bao Li","doi":"10.1109/ITA.2013.58","DOIUrl":"https://doi.org/10.1109/ITA.2013.58","url":null,"abstract":"It's a realistic difficult problem about how to improve the positioning accuracy and the reliability of RAIM algorithms, on the situation that there are not enough available satellites. This dissertation puts forward RAIM algorithms with the elevation information in the areas as marine navigation. Through this method, the information redundancy can be increased. With only 3 satellites, we can realize positioning calculating. With 5 satellites, we can identify one-faulty satellite. With 6 satellites, we can identify simultaneous two-faulty satellites. According to the simulation analysis, this method can effectively improve the availability of fault detection of RAIM algorithms for one-faulty satellite and two-faulty satellites. In practice, it has profound guiding significance for the improvement of the positioning accuracy and the reliability of the receiver.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116454753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting and Tracking Volunteers in Expo Videos","authors":"Jianning Liang, Yan Zhou","doi":"10.1109/ITA.2013.29","DOIUrl":"https://doi.org/10.1109/ITA.2013.29","url":null,"abstract":"A method is introduced for detecting and tracking volunteers in expo surveillance videos. A detection box slides on the images from the videos from left to right and then from up to down. Since the volunteers wear the green clothes, only the patches of enough green pixels are passed for further processing. Then, three kinds of features i.e. RGB color features, SURF features and HOG features are extracted from the patches. These features are sent to a trained cascade boosting classifier to determine whether the patches are the volunteers. In the experiments, the proposed method demonstrates good performances on three videos.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131569484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method of Systemic EMC Evaluation for Missile","authors":"Bingqie Wang, Lei Wang, Q. Du","doi":"10.1109/ITA.2013.105","DOIUrl":"https://doi.org/10.1109/ITA.2013.105","url":null,"abstract":"Systemic EMC evaluation method for missile is presented in the paper for the first time. Systemic EMC performance EMC(S) is defined. EMC probability and interfered probability for sensitive port of receivers and other sensitive equipments are defined as well. EMC(S) evaluation system is founded based on interfered relationship matrices. EMC(S) can be evaluated along with the change of subsystem parameters. It is the foundation of EMC optimized design for missile system.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133118000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Reformation of Education Caused by Cloud Computing","authors":"Guan Xiao-hui, Qian Ya-Guan","doi":"10.1109/ITA.2013.90","DOIUrl":"https://doi.org/10.1109/ITA.2013.90","url":null,"abstract":"The appearance of cloud computing has a great influence on education. It greatly affects the evolution of teaching mode and learning mode in colleges. This paper discusses the use of cloud computing in educational and learning area.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125395705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method of Automatic Semantic Annotation of 3D Model Based on Content Feature","authors":"Zuojun Liu, Lihong Li","doi":"10.1109/ITA.2013.81","DOIUrl":"https://doi.org/10.1109/ITA.2013.81","url":null,"abstract":"In response to the existing problem of 3D model semantic retrieval, a method of automatic semantic annotation of 3D model based on content feature is proposed on the basis of Word Net. According to the similarity of content features, this method selects the annotation vocabularies to construct a vocabulary set. Then, some appropriate vocabularies can be selected from the vocabulary set to annotate the 3D models by the similarity between the 3D model to be annotated and the vocabularies in the vocabulary set. In the experiments, three relative parameters are optimized to improve the performance and efficiency. Proved by the experiments, this method proposed in this paper can solve the semantic gap problem. The performance and efficiency of the method is pretty good.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115035554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MUSIC Based on Orthotropic ULAs for Determining Unidirectional DOAs","authors":"Baofa Sun","doi":"10.1109/ITA.2013.68","DOIUrl":"https://doi.org/10.1109/ITA.2013.68","url":null,"abstract":"This paper applies orthotropic ULAs to determine unidirectional DOAs. MUSIC algorithm based on orthotropic ULAs was given. Simulation experiments show that the algorithm can eliminate mirror image vagueness of MUSIC based on single ULA, and it can distinguish two signals which come from complementary angles.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130830438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Weakly-Secure Network Coding Scheme Against Nodes Conspiracy Attack for Multicast System","authors":"Rong Du, Shenghong Li","doi":"10.1109/ITA.2013.41","DOIUrl":"https://doi.org/10.1109/ITA.2013.41","url":null,"abstract":"Since network information flow can achieve the max-flow in theory and the network throughput is increased by using network coding. At the same time, the security of network coding is of importance as the research of network coding increase. Different from previous wiretapping scenarios where the threat is posed by external wiretappers. We discuss the security in an internal angle: all intermediate nodes comply with the communication protocols which are potential wiretappers and the wiretappers can cooperate with each other to decode the packets sent from the source node. Most existing research on network coding designs with a given topology, we will consider the secure network topology design. In this paper, our purpose is to find the secure transmission topology that is suitable for network coding in transmission system. Based on the secure topology, we use network coding scheme which is weakly secure. Mathematical analysis and computer simulations show that the proposed protocol can prevents cooperative eavesdroppers from acquiring any useful information transmitted from source node to sink node.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117200791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human-Simulated Predictive Control of Variable ZMP Trajectory Tracking for Biped Robot","authors":"Chenglin Jing","doi":"10.1109/ITA.2013.113","DOIUrl":"https://doi.org/10.1109/ITA.2013.113","url":null,"abstract":"A new human-simulated predictive control scheme for biped robot is presented to solve the problems of variable zero-moment point (ZMP) trajectory tracking. To enhance the adaptability of ZMP based walking control, the expected ZMP can be separated as off-line reference ZMP and variable ZMP, and the preview controller and its inverse system can be used to control the trajectory of the center of mass (CoM). But the single predictive control system have a big tracking error for variable ZMP such as rectangular perturbation, the human-simulated predictive control system overcome these shortcomings because of its strong ability to suppress error. The simulation results verify the effectiveness of the proposed method.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126126562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation-Based Research on Adjustment Technology of Ship Block Production Plan","authors":"N. Chen, Zhen Wang, Jianhua Wu","doi":"10.1109/ITA.2013.67","DOIUrl":"https://doi.org/10.1109/ITA.2013.67","url":null,"abstract":"Production plan was an important part of lean shipbuilding. Problems such as semi-finished products waiting, backlog in shipbuilding process were often present due to unreasonable plan. That caused the bottleneck problem of the assembly line. Built an QUEST simulation model of block assembly lines, in which the real plan data was imported. Selected production rhythm balancing, space utilization and plan completion as the system evaluation index to verify the rationality of the plan. Futher discussed the adjustment technologies and solutions of the production plan. Studies shown that simulation technology provides quantitative judgment basis and technical support for making rational shipbuilding production plan under the lean shipbuilding mode.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115370679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Research on Cloud Computing Security","authors":"Ni Zhang, Di Liu, Yunyong Zhang","doi":"10.1109/ITA.2013.91","DOIUrl":"https://doi.org/10.1109/ITA.2013.91","url":null,"abstract":"This paper gives an overview on cloud computing security. To clarify cloud security, a definition and scope of cloud computing security is presented. An ecosystem of cloud security is shown to illustrate what each role in industry can do in turn. Then security impacts of cloud security for both customers and operators are analyzed. To overcome challenges from cloud security, many state-of-the-art technical solutions, e.g., continuation protection mechanism, IDM, data security, and virtualization security are discussed. Finally, best practices on perspective of operator are summarized and a conclusion is conducted.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114882586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}