{"title":"Acceleration feedback control for teleoperation systems with asymmetric time-varying delays","authors":"Yuling Li, Yixin Yin","doi":"10.1109/IAEAC.2015.7428569","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428569","url":null,"abstract":"Procedure for acceleration feedback control of teleoperation systems with asymmetric time-varying delays is proposed. The acceleration feedback is applied to the master controller, while in the slave side the position error plus damping controller is used. The ISS/IOS small-gain theory is applied to analyze the stability of the closed-loop system, and hence the passivity assumption for the human operator and the environment is not required. Simulation results are presented, which show that the resulting teleoperation system is stable with good tracking performance between the master and the slave.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115662804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of passive filter device in high voltage intelligence","authors":"Zhu Jun, Liu Tian-yu, Huang Qi-yuan, Meng Chang","doi":"10.1109/IAEAC.2015.7428610","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428610","url":null,"abstract":"A passive filter often becomes a key component for the electrical power system. The optimization design of passive filter is the most effective way in performance improving. The formula of calculating the gradient vector and the Hessian matrix is researched and presented. Based on this formula, the objective function of optimization design for filter with loss is derived and the suitable optimization algorithms is made by using the extended circuit technique. The example of flexible and efficient design technique of passive filter is also proved.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115691779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianlong Li, Jinchun Gao, Haiyang Liu, Xiao-lei Ma, Yuan'an Liu
{"title":"A local secure handover authentication scheme based on AAA for NEMO in aeronautical passanger communication environment","authors":"Jianlong Li, Jinchun Gao, Haiyang Liu, Xiao-lei Ma, Yuan'an Liu","doi":"10.1109/IAEAC.2015.7428546","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428546","url":null,"abstract":"The Network Mobility(NEMO), extension of Mobile IPv6, can support the mobility of mobile router(MR) across different air-around access technologies during different phases of flight. However, the past schemes of NEMO lack the identity privacy and signal integrity protection in handover procedure, which makes it unsecurity in aeronautical passanger communication(APC) environment. In this paper, a local secure handover authentication scheme based on AAA(LSHAA) is proposed for NEMO in APC environment. The LSHAA performs the authentication of care-of address in care-of test init/care-of test and prefix in public key infrastructure and certificates. The performance analysis shows that LSHAA can not only manage the signaling mobility and provide lower handover delay but also secure the handover procedure over NBSP and FMIPv6.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121812122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mass ideology-based voting model","authors":"Ziheng Chen","doi":"10.1109/IAEAC.2015.7428681","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428681","url":null,"abstract":"As one of the powerful tools in political science, ideal point estimation is always used to study the pattern behind the senators' voting behavior. In order to give a comprehensive estimation of senators' political positions, some researchers estimated the ideal points on different topics. However, for those senators who are not that polarized, their ideal points are so sensitive to the voting records that even a small change will make a big difference, which may mislead the readers. In this paper, we propose a mass ideology-based voting model taking the senators' latent ideology into consideration. Firstly, we model the senators' general ideal points by using the following links on Twitter due to the reason that we have homophily in social networks. Secondly, we use the roll call data of different bills, which can be decomposed as a combination of different topics, to estimate the senator's adjustment on different topics. Finally, we combine the general ideal points and the adjustments together to analyze the senator's political positions. Additionally, two-stage learning algorithms are also shown in the following section. Compared with the Issued-Adjusted model, our model has an edge on classifying the senators on different topics. This model can also be used to predict the voting behavior. Then, we show a case study of a moderate senator and try to explain her voting behavior for some bills according to our research.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124272042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The design and realization of uniform SPL distribution ranging from 1100Hz to 2000Hz","authors":"Juanjuan Cai, Y. Pang, Yutian Wang, Hui Wang","doi":"10.1109/IAEAC.2015.7428538","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428538","url":null,"abstract":"In the past research, we have realized that uniform sound pressure level (SPL) distribution ranging from 200Hz to 1000Hz with linear loudspeaker array. With the increase of frequency, the width of the main lobe becomes narrower and the side lobe of the pattern becomes larger. The curve of SPL in the test line also fluxes increasingly evidently. It's difficult to optimize the phase of loudspeaker array exclusively aiming at uniform SPL distribution at frequency higher than 1000Hz. In this paper, we propose a non-equidistant loudspeaker array to optimize, as well as the phases and the distances of array from 1100Hz to 1500Hz. It is difficult to control the increasing side lobe value by only optimizing these two parameters in the array from 1600Hz to 2000Hz. So the amplitude is another parameter to be optimized. We also propose a new parameter representing the degree of energy concentration on the target area which is added to optimize the algorithm. The simulation results show that the relative SPL distribution which demonstrates that the target is implemented accurately and the side lobe is decreased effectively.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127270923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method for frequency measurement with ApFFT based on FPGA","authors":"Meng Wang, Xia Zhang","doi":"10.1109/IAEAC.2015.7428745","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428745","url":null,"abstract":"The conventional method of frequency measurement based on traditional fast Fourier transform (FFT) can't provide to an ideal performance due to the fence effect and the leakage of frequency spectrum. As an improved algorithm of the traditional FFT, the all phase FFT (apFFT) spectrum analysis has a perfect performance on suppressing the spectrum leakage and the property of phase invariant. In this paper, a novel method for frequency measurement which takes the advantage of all phase FFT is proposed. This method utilizing two largest spectrum lines of the signal from time-domain provides a higher precision than traditional method. In the paper, a corresponding frequency measurement design based on Field Programmable Gate Array (FPGA) is implemented. The functional simulation results show that the design based on FPGA has better performance compared with the traditional method for frequency measurement.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124918029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constructing energy efficient data aggregation trees based on information entropy in wireless sensor networks","authors":"Mingxin Yang","doi":"10.1109/IAEAC.2015.7428609","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428609","url":null,"abstract":"Hierarchical structure possesses many advantages in the organization of wireless sensor networks (WSNs). Moreover, the life of a hierarchical WSN can be prolonged since many sensor nodes can be put into the sleep state most of the time. Therefore, in real applications, hierarchical network structure has become the focus of research due to limited energy resources in wireless sensor nodes. Aimed at solving the problem of imbalance on energy consumption of wireless sensor nodes in WSNs, in this paper, we propose a method for the construction of data aggregation trees based on information entropy in which the minimum spanning tree and the theory of information entropy are applied to the design of the protocol to reduce the amount of communication during data transmission. Simulation results show that our proposed method outperforms some comparable approaches in the area of energy efficiency.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126949413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Lv, Yuanlong Li, Shuang Xiang, C. Xia, Jingxin Geng
{"title":"An alert correlation algorithm based on the sequence pattern mining","authors":"Y. Lv, Yuanlong Li, Shuang Xiang, C. Xia, Jingxin Geng","doi":"10.1109/IAEAC.2015.7428739","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428739","url":null,"abstract":"Sequence correlation method has limits in unknown attacks identification and requires pre-defining the causal relationship between attack behavior. To solve this problem, an alert correlation algorithm, denoted as TPrefixSpan, based on the sequence pattern mining is proposed in this paper, based on PrefixSpan algorithm, TPrefixSpan algorithm introduces time interval that can thoroughly narrow, the search space, then time cost on repeated dataset scan in the sequence pattern mining is greatly saved, the efficiency of the PrefixSpan algorithm is ensured. Compared with PrefixSpan algorithm, TPrefixSpan algorithm generates much precise attacks identification. In order to visualize the correlation rules better, a sequence diagram generation algorithm of attack behavior is put forward.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127029525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jun Luo, Guoping Zhang, Hongbo Xu, Yu Zhou, Weidong Yang
{"title":"An energy detection based signal detection method with multiple antennas in cognitive radio","authors":"Jun Luo, Guoping Zhang, Hongbo Xu, Yu Zhou, Weidong Yang","doi":"10.1109/IAEAC.2015.7428544","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428544","url":null,"abstract":"In Cognitive Radio systems, the performance of spectrum sensing will directly affect spectrum reallocation. Energy detection (ED) method is one of the most commonly used signal sensing methods in spectrum sensing, due to its low implementation complexity. ED can achieve a good detection performance when the noise variance is known. However in most cases, the noise variance is estimated. To reduce the impact of uncertainty in noise variance, an ED based signal detection method is proposed in this paper. This method exploits multiple antennas in a simple way to obtain the decision statistic as ED does. A technique is proposed to construct the decision statistic so that it is independent of the noise variance. As a consequence, the proposed method can significantly reduce the effect of noise variance uncertainty. Theoretical formulas are derived to describe the probability of detection and the probability of false alarm, which are free of noise variance uncertainty. The simulation results show that the detection performance of the proposed method can outperform the existing ED detection methods when the number of antenna is greater than four.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114449182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yang Hong-liang, Liu Xin-le, Xu Guo-bao, Xu Zhi-gang, Ma Jin-feng
{"title":"Design of eccentric bunghole cap screwing-pressing machine based on robot vision technique","authors":"Yang Hong-liang, Liu Xin-le, Xu Guo-bao, Xu Zhi-gang, Ma Jin-feng","doi":"10.1109/IAEAC.2015.7428596","DOIUrl":"https://doi.org/10.1109/IAEAC.2015.7428596","url":null,"abstract":"To solve the problem of slow speed, low efficiency, and poor reliability on bunghole positioning and cap screwing-pressing, A cap screwing-pressing device was designed, which fixed robot flange together with CCD plane. The uncertain bunghole center is positioned and coordinate conversion, and the end-executor is led to the position at the eccentric bunghole center accurately and rapidity through TCP/IP communications. The bunghole was positioned quickly and precisely, error of within 0.8mm. Simultaneously, the two processes of screwing cap and pressing cap are finished at one localization. The practical application shows that the equipment is reliable and high sealing efficiency.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129956381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}