Cao Jin, C. Mei, Liu Xiaoqin, He Wei, Deng Zhantao
{"title":"Simulation Analysis of a Symmetrical Micromachined Vibratory Rate Gyroscope","authors":"Cao Jin, C. Mei, Liu Xiaoqin, He Wei, Deng Zhantao","doi":"10.1109/IMCCC.2012.119","DOIUrl":"https://doi.org/10.1109/IMCCC.2012.119","url":null,"abstract":"A symmetrical micromachined vibratory rate gyroscope has been proposed in this paper. The geometrical structure model has been established by 3D model software. Through analyzing the geometrical structure of the micromachined gyroscope, the basic parameters which affect the performance of the microgyroscope sharply have been obtained. Taking advantage of the finite element analysis software ANSYS, the designed model is imported into the analysis bench, meshed reasonably, added the proper constraints. The solution is acquired after some calculation time. By altering the geometrical parameters of the microgyroscope model, the influence factors of the resonant frequency of the microgyroscope have been founded one by one. The related data curves have been obtained automatically, which provides the theoretical basis for the specific structure design of the microgyroscope.","PeriodicalId":394548,"journal":{"name":"2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114675271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Li Sheng, Liu Zhiming, He Jin, Deng Gaoming, Huang Wen
{"title":"A Distributed Botnet Detecting Approach Based on Traffic Flow Analysis","authors":"Li Sheng, Liu Zhiming, He Jin, Deng Gaoming, Huang Wen","doi":"10.1109/IMCCC.2012.36","DOIUrl":"https://doi.org/10.1109/IMCCC.2012.36","url":null,"abstract":"Bonnet is extremely harmful to computer network security which could cause many network attacks(like spam, DDoS, phishing etc). In this paper, we design a distributed Bonnet detecting approach based on network traffic analysis. A botnet detection framework is proposed, which composed of two sections: Data Collection and Filter, Bonnet Detection and Identify. The first section is deployed in distributed hosts in order to capture network traffic data, filter data and classify data. The second section is deployed in centralized place which collectes all data from distributed hosts and detected the botnet using data amalgamation algorithms and characteristic identified algorithms. The detecting approach works efficiently and can detect botnet in the experiment environment.","PeriodicalId":394548,"journal":{"name":"2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117169154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Matched Filtering in Fractional Fourier Domain","authors":"Feng Zhang, R. Tao, Yue Wang","doi":"10.1109/IMCCC.2012.9","DOIUrl":"https://doi.org/10.1109/IMCCC.2012.9","url":null,"abstract":"Matched filtering is an important method in radar signal processing to enhance the radar system performance. In this paper, the concept of the matched filtering is generalized to the fractional Fourier case. The response of the matched filter in fractional Fourier domain to chirp signals is analyzed, and the sidelobe suppression method for matched filtering in the fractional Fourier domain is considered. The theory introduced in this paper is validated by simulations.","PeriodicalId":394548,"journal":{"name":"2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117243908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei Wei, Liu Ming, Gao Weina, Wang Dandan, Liu Jing
{"title":"A New Mind of Wavelet Transform for Handwritten Chinese Character Recognition","authors":"Wei Wei, Liu Ming, Gao Weina, Wang Dandan, Liu Jing","doi":"10.1109/IMCCC.2012.287","DOIUrl":"https://doi.org/10.1109/IMCCC.2012.287","url":null,"abstract":"Featureextraction and classification recognition are the most important parts in the process of off-line handwritten Chinese character recognition. Wavelet transform is put forward by predecessors and is a kind of feature extractional gorithm. It is said that we can use separately one dimensional wavelet transform along the rows and columns two directions and get the result. This paper presents a new direction, Wavelet transform along diagonal direction. It can solve the problem that left falling and right falling can not be directly separated. In addition this paper also proposes a new mind, that is radial Wavelet transform. Used to extract the outer border of the Chinese characters.","PeriodicalId":394548,"journal":{"name":"2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123234426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Communications Scheduling Strategy Oriented to Wide Area Advanced Metering Infrastructure","authors":"Xianji Jin, Lei Lu, Weiming Tong, Zhongwei Li","doi":"10.1109/IMCCC.2012.100","DOIUrl":"https://doi.org/10.1109/IMCCC.2012.100","url":null,"abstract":"Aiming at the information transmission problem of advanced metering infrastructure(AMI) in smart grid, this paper researches the communications scheduling strategy in AMI at a macroscopic view. The AMI system structure and information flow are analyzed, and the power users are classified into several grades by the importance. On the above basis, the defect of conventional scheduling strategy of information transmission is analyzed. In the wide area, an optimized scheduling strategy based on users importance and time critical is proposed to guarantee the important power users' information transmission being handled promptly. The simulation results of the optimized scheduling strategies demonstrate that they can effectively improve the real-time performance and reliability of AMI information transmission.","PeriodicalId":394548,"journal":{"name":"2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122943007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparison of Two Approaches to SINS Initial Alignment for Marching Vehicle","authors":"Chen Hong-yue, Sun Qian","doi":"10.1109/IMCCC.2012.169","DOIUrl":"https://doi.org/10.1109/IMCCC.2012.169","url":null,"abstract":"Classic Kalman filtering algorithm needs a little precise initial value, but coarse alignment precision of SINS for marching vehicle can't ensure meet the requirement in all working conditions. UKF(unscented kalman filter) was proposed to achieve initial alignment of SINS for marching vehicle with DTU(distance transfer unit) aiding. The system equation of error model based on large misalignment angles was expounded, observation equation was derived when the measurement variables were chosen as difference of velocity offered by SINS and velocity reckoned by DTU, and error model was simplified under the situation of small misalignment angles. UKF algorithm based on additive noise model was expounded detailed. Simulation based on vehicular tests data showed that UKF algorithm could achieve initial alignment for marching vehicle, and is more robust to initial value than classic kalman filtering algorithm.","PeriodicalId":394548,"journal":{"name":"2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123128100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating Node Importance in Complex Network Based on Enron Database","authors":"Saisai Yu, Feng Ye, Chi Chi","doi":"10.1109/IMCCC.2012.219","DOIUrl":"https://doi.org/10.1109/IMCCC.2012.219","url":null,"abstract":"With the development of social networks, how to evaluate the importance of node has become an important problem. In this paper, a method of evaluating node importance is proposed based on Email network model. The hierarchical structure is considered during this method and the corresponding evaluation model is proposed also. To illustrate the effect of this method, the difference is compared between it and classic approach, such as degree centrality, closeness centrality and betweenness centrality.","PeriodicalId":394548,"journal":{"name":"2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123146787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Effective RFID Security Protocol Based on Secret Sharing","authors":"Zhijian Gao, Yi Jiang, Z. Lin","doi":"10.1109/IMCCC.2012.188","DOIUrl":"https://doi.org/10.1109/IMCCC.2012.188","url":null,"abstract":"The Hash function is used to design a radio frequency identification (RFID) security protocol, which is based on secret sharing. The improved hash-based identifier variation (HIDV) scheme is adopted to solve the following questions: location privacy, resist replay and forgery attacks. Since the synchronization loss between tag and server is resolved, we can control the denial of service that exists in many RFID security protocols. Compared with other related protocols in security, efficiency and cost, the proposed protocol is proved to be safe, effective and low-cost.","PeriodicalId":394548,"journal":{"name":"2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122066926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A File Integrity Monitoring System Based on Virtual Machine","authors":"Zhu Wang, Tao Huang, Shan Wen","doi":"10.1109/IMCCC.2012.396","DOIUrl":"https://doi.org/10.1109/IMCCC.2012.396","url":null,"abstract":"This paper describes the design and implementation of a file integrity monitoring system, named FSGuard, based on the virtualization software Xen. Monitored system (DomU) runs in full virtualized mode on Xen, therefore it is unable to perceive the existence of the underlying VMM, but its system calls related to file operations are recorded in real time. User mode programs in DomU provide configuration and management interface, so that the administrator can assign a certain DomU to specify the access control policy and a list of files that need to be protected. These characters make FSGuard possible to monitor file operations in real time, and get feedback through the user mode program in DomU.","PeriodicalId":394548,"journal":{"name":"2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125194430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Portable Fault Diagnosis Device for Electric Locomotive","authors":"Cong Wei, Zheng Qian, Shuangshu Tian, Niya Chen","doi":"10.1109/IMCCC.2012.215","DOIUrl":"https://doi.org/10.1109/IMCCC.2012.215","url":null,"abstract":"A portable fault diagnosis device for electric locomotive, which is online operational, is introduced in this paper. It realizes fault analysis and diagnosis, fault information storage and fault treatment method prompting for locomotive. Both software and hardware structure of this device is elaborated in this paper, especially the realization of fault diagnosis methods, data acquisition and communication. The device can effectively improve the speed of fault judgment and process, meanwhile reduce the performance impact of different kinds of fault, therefore, meets the actual demand of locomotive operation and the development trend of automation.","PeriodicalId":394548,"journal":{"name":"2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"50 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124977595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}